public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/
@ 2021-02-01  2:10 Jason Zaman
  0 siblings, 0 replies; 3+ messages in thread
From: Jason Zaman @ 2021-02-01  2:10 UTC (permalink / raw
  To: gentoo-commits

commit:     16e654bd62891f7f1f0466ef9d341e562a038dc0
Author:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
AuthorDate: Mon Feb  1 01:55:02 2021 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Mon Feb  1 01:55:02 2021 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=16e654bd

Update generated policy and doc files

Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 doc/global_tunables.xml              |    10 +
 doc/policy.xml                       | 20618 ++++++++++++++++++---------------
 policy/booleans.conf                 |    91 +-
 policy/modules.conf                  |   197 +-
 policy/modules/kernel/corenetwork.if |   421 -
 policy/modules/kernel/corenetwork.te |     9 +-
 6 files changed, 11149 insertions(+), 10197 deletions(-)

diff --git a/doc/global_tunables.xml b/doc/global_tunables.xml
index 9049a3cd..b05f9818 100644
--- a/doc/global_tunables.xml
+++ b/doc/global_tunables.xml
@@ -26,6 +26,16 @@ Allow unconfined executables to make their stack executable.  This should never,
 </p>
 </desc>
 </tunable>
+<tunable name="allow_raw_memory_access" dftval="false">
+<desc>
+<p>
+Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
+dev/oldmem, /dev/port) access for confined executables.  This is
+extremely dangerous as it can bypass the SELinux protections, and
+should only be used by trusted domains.
+</p>
+</desc>
+</tunable>
 <tunable name="allow_polyinstantiation" dftval="false">
 <desc>
 <p>

diff --git a/doc/policy.xml b/doc/policy.xml
index cfdf3253..0537d461 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -1169,17 +1169,7 @@ Role allowed access.
 </module>
 <module name="dphysswapfile" filename="policy/modules/admin/dphysswapfile.if">
 <summary>Set up, mount/unmount, and delete an swap file.</summary>
-<interface name="dphysswapfile_dontaudit_read_swap" lineno="13">
-<summary>
-Dontaudit acces to the swap file.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="dphysswapfile_admin" lineno="40">
+<interface name="dphysswapfile_admin" lineno="20">
 <summary>
 All of the rules required to
 administrate an dphys-swapfile environment.
@@ -1395,34 +1385,7 @@ Domain allowed access.
 </module>
 <module name="fakehwclock" filename="policy/modules/admin/fakehwclock.if">
 <summary>fake-hwclock - Control fake hardware clock.</summary>
-<interface name="fakehwclock_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run fake-hwclock.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="fakehwclock_run" lineno="41">
-<summary>
-Execute fake-hwclock in the fake-hwclock domain,
-and allow the specified role
-the fake-hwclock domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fakehwclock_admin" lineno="68">
+<interface name="fakehwclock_admin" lineno="19">
 <summary>
 All the rules required to
 administrate an fake-hwclock environment.
@@ -1511,7 +1474,7 @@ Domain allowed access.
 </interface>
 <interface name="firstboot_dontaudit_rw_pipes" lineno="132">
 <summary>
-Do not audit attemps to read and
+Do not audit attempts to read and
 write firstboot unnamed pipes.
 </summary>
 <param name="domain">
@@ -1522,7 +1485,7 @@ Domain to not audit.
 </interface>
 <interface name="firstboot_dontaudit_rw_stream_sockets" lineno="152">
 <summary>
-Do not audit attemps to read and
+Do not audit attempts to read and
 write firstboot unix domain
 stream sockets.
 </summary>
@@ -1685,9 +1648,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="kdumpgui" filename="policy/modules/admin/kdumpgui.if">
-<summary>System-config-kdump GUI.</summary>
-</module>
 <module name="kismet" filename="policy/modules/admin/kismet.if">
 <summary>IEEE 802.11 wireless LAN sniffer.</summary>
 <template name="kismet_role" lineno="18">
@@ -1733,7 +1693,7 @@ Role allowed access.
 </interface>
 <interface name="kismet_read_pid_files" lineno="95">
 <summary>
-Read kismet pid files.
+Read kismet pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -1741,10 +1701,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_pid_files" lineno="115">
+<interface name="kismet_manage_pid_files" lineno="111">
 <summary>
 Create, read, write, and delete
-kismet pid files.
+kismet pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -1752,9 +1712,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_search_lib" lineno="134">
+<interface name="kismet_read_runtime_files" lineno="126">
 <summary>
-Search kismet lib directories.
+Read kismet runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -1762,20 +1722,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_read_lib_files" lineno="153">
-<summary>
-Read kismet lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_manage_lib_files" lineno="174">
+<interface name="kismet_manage_runtime_files" lineno="146">
 <summary>
 Create, read, write, and delete
-kismet lib files.
+kismet runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -1783,10 +1733,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_lib" lineno="194">
+<interface name="kismet_search_lib" lineno="165">
 <summary>
-Create, read, write, and delete
-kismet lib content.
+Search kismet lib directories.
 </summary>
 <param name="domain">
 <summary>
@@ -1794,20 +1743,20 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_read_log" lineno="216">
+<interface name="kismet_read_lib_files" lineno="184">
 <summary>
-Read kismet log files.
+Read kismet lib files.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<rolecap/>
 </interface>
-<interface name="kismet_append_log" lineno="235">
+<interface name="kismet_manage_lib_files" lineno="205">
 <summary>
-Append kismet log files.
+Create, read, write, and delete
+kismet lib files.
 </summary>
 <param name="domain">
 <summary>
@@ -1815,10 +1764,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_log" lineno="255">
+<interface name="kismet_manage_lib" lineno="225">
 <summary>
 Create, read, write, and delete
-kismet log content.
+kismet lib content.
 </summary>
 <param name="domain">
 <summary>
@@ -1826,56 +1775,31 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_admin" lineno="283">
+<interface name="kismet_read_log" lineno="247">
 <summary>
-All of the rules required to
-administrate an kismet environment.
+Read kismet log files.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
 <rolecap/>
 </interface>
-</module>
-<module name="kudzu" filename="policy/modules/admin/kudzu.if">
-<summary>Hardware detection and configuration tools.</summary>
-<interface name="kudzu_domtrans" lineno="13">
-<summary>
-Execute kudzu in the kudzu domain.
-</summary>
-<param name="domain">
+<interface name="kismet_append_log" lineno="266">
 <summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="kudzu_run" lineno="39">
-<summary>
-Execute kudzu in the kudzu domain, and
-allow the specified role the kudzu domain.
+Append kismet log files.
 </summary>
 <param name="domain">
 <summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
+Domain allowed access.
 </summary>
 </param>
-<rolecap/>
 </interface>
-<interface name="kudzu_getattr_exec_files" lineno="58">
+<interface name="kismet_manage_log" lineno="286">
 <summary>
-Get attributes of kudzu executable files.
+Create, read, write, and delete
+kismet log content.
 </summary>
 <param name="domain">
 <summary>
@@ -1883,10 +1807,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kudzu_admin" lineno="83">
+<interface name="kismet_admin" lineno="314">
 <summary>
 All of the rules required to
-administrate an kudzu environment.
+administrate an kismet environment.
 </summary>
 <param name="domain">
 <summary>
@@ -2406,7 +2330,7 @@ Domain Allowed Access
 </summary>
 </param>
 </interface>
-<interface name="portage_domtrans_fetch" lineno="233">
+<interface name="portage_domtrans_fetch" lineno="224">
 <summary>
 Execute tree management functions
 (fetching, layman, ...) in the
@@ -2418,7 +2342,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="portage_run_fetch" lineno="262">
+<interface name="portage_run_fetch" lineno="253">
 <summary>
 Execute tree management functions
 (fetching, layman, ...) in the
@@ -2438,7 +2362,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="portage_domtrans_gcc_config" lineno="281">
+<interface name="portage_domtrans_gcc_config" lineno="272">
 <summary>
 Execute gcc-config in the gcc config domain.
 </summary>
@@ -2448,7 +2372,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="portage_run_gcc_config" lineno="308">
+<interface name="portage_run_gcc_config" lineno="299">
 <summary>
 Execute gcc-config in the gcc config
 domain, and allow the specified role
@@ -2466,7 +2390,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="portage_dontaudit_use_fds" lineno="328">
+<interface name="portage_dontaudit_use_fds" lineno="319">
 <summary>
 Do not audit attempts to use
 portage file descriptors.
@@ -2477,7 +2401,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="portage_dontaudit_search_tmp" lineno="347">
+<interface name="portage_dontaudit_search_tmp" lineno="338">
 <summary>
 Do not audit attempts to search the
 portage temporary directories.
@@ -2488,7 +2412,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="portage_dontaudit_rw_tmp_files" lineno="366">
+<interface name="portage_dontaudit_rw_tmp_files" lineno="357">
 <summary>
 Do not audit attempts to read and write
 the portage temporary files.
@@ -2499,7 +2423,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="portage_eselect_module" lineno="391">
+<interface name="portage_eselect_module" lineno="382">
 <summary>
 Allow the domain to run within an eselect module script.
 </summary>
@@ -2509,7 +2433,7 @@ Domain to allow within an eselect module
 </summary>
 </param>
 </interface>
-<interface name="portage_ro_role" lineno="414">
+<interface name="portage_ro_role" lineno="405">
 <summary>
 Read all portage files
 </summary>
@@ -2524,7 +2448,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_db" lineno="434">
+<interface name="portage_read_db" lineno="425">
 <summary>
 Read portage db files
 </summary>
@@ -2534,7 +2458,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_cache" lineno="454">
+<interface name="portage_read_cache" lineno="445">
 <summary>
 Read portage cache files
 </summary>
@@ -2544,7 +2468,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_config" lineno="475">
+<interface name="portage_read_config" lineno="466">
 <summary>
 Read portage configuration files
 </summary>
@@ -2554,7 +2478,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_ebuild" lineno="497">
+<interface name="portage_read_ebuild" lineno="488">
 <summary>
 Read portage ebuild files
 </summary>
@@ -2564,7 +2488,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_log" lineno="519">
+<interface name="portage_read_log" lineno="510">
 <summary>
 Read portage log files
 </summary>
@@ -2574,7 +2498,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_read_srcrepo" lineno="538">
+<interface name="portage_read_srcrepo" lineno="529">
 <summary>
 Read portage src repository files
 </summary>
@@ -2584,7 +2508,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="portage_dontaudit_write_cache" lineno="560">
+<interface name="portage_dontaudit_write_cache" lineno="551">
 <summary>
 Do not audit writing portage cache files
 </summary>
@@ -2984,20 +2908,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="readahead" filename="policy/modules/admin/readahead.if">
-<summary>Read files into page cache for improved performance.</summary>
-<interface name="readahead_domtrans" lineno="14">
-<summary>
-Execute a domain transition
-to run readahead.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-</module>
 <module name="rkhunter" filename="policy/modules/admin/rkhunter.if">
 <summary>rkhunter - rootkit checker.</summary>
 <interface name="rkhunter_domtrans" lineno="13">
@@ -3319,7 +3229,7 @@ Domain to not audit.
 </interface>
 <interface name="rpm_read_pid_files" lineno="538">
 <summary>
-Read rpm pid files.
+Read rpm pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -3327,10 +3237,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpm_manage_pid_files" lineno="558">
+<interface name="rpm_manage_pid_files" lineno="553">
 <summary>
 Create, read, write, and delete
-rpm pid files.
+rpm pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -3338,10 +3248,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpm_pid_filetrans_rpm_pid" lineno="588">
+<interface name="rpm_pid_filetrans_rpm_pid" lineno="579">
 <summary>
 Create specified objects in pid directories
-with the rpm pid file type.
+with the rpm pid file type.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -3359,7 +3269,18 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="rpm_admin" lineno="613">
+<interface name="rpm_manage_runtime_files" lineno="594">
+<summary>
+Create, read, write, and delete
+rpm runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpm_admin" lineno="620">
 <summary>
 All of the rules required to
 administrate an rpm environment.
@@ -3481,7 +3402,7 @@ Domain allowed access.
 <interface name="samhain_manage_pid_files" lineno="187">
 <summary>
 Create, read, write, and delete
-samhain pid files.
+samhain pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -3489,7 +3410,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samhain_admin" lineno="213">
+<interface name="samhain_admin" lineno="208">
 <summary>
 All of the rules required to
 administrate the samhain environment.
@@ -3521,7 +3442,7 @@ Domain allowed to transition.
 </interface>
 <interface name="sblim_read_pid_files" lineno="32">
 <summary>
-Read gatherd pid files.
+Read gatherd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -3529,7 +3450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sblim_admin" lineno="58">
+<interface name="sblim_admin" lineno="53">
 <summary>
 All of the rules required to
 administrate an sblim environment.
@@ -3547,24 +3468,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="sectoolm" filename="policy/modules/admin/sectoolm.if">
-<summary>Sectool security audit tool.</summary>
-<interface name="sectoolm_role" lineno="18">
-<summary>
-Role access for sectoolm.
-</summary>
-<param name="role" unused="true">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-User domain for the role.
-</summary>
-</param>
-</interface>
-</module>
 <module name="shorewall" filename="policy/modules/admin/shorewall.if">
 <summary>Shoreline Firewall high-level tool for configuring netfilter.</summary>
 <interface name="shorewall_domtrans" lineno="13">
@@ -3598,27 +3501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="shorewall_read_pid_files" lineno="71">
-<summary>
-Read shorewall pid files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="shorewall_rw_pid_files" lineno="85">
-<summary>
-Read and write shorewall pid files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="shorewall_read_lib_files" lineno="99">
+<interface name="shorewall_read_lib_files" lineno="71">
 <summary>
 Read shorewall lib files.
 </summary>
@@ -3628,7 +3511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="shorewall_rw_lib_files" lineno="118">
+<interface name="shorewall_rw_lib_files" lineno="90">
 <summary>
 Read and write shorewall lib files.
 </summary>
@@ -3638,7 +3521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="shorewall_read_tmp_files" lineno="137">
+<interface name="shorewall_read_tmp_files" lineno="109">
 <summary>
 Read shorewall temporary files.
 </summary>
@@ -3648,7 +3531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="shorewall_admin" lineno="163">
+<interface name="shorewall_admin" lineno="135">
 <summary>
 All of the rules required to
 administrate an shorewall environment.
@@ -3741,9 +3624,6 @@ Domain allowed access.
 </param>
 </interface>
 </module>
-<module name="smoltclient" filename="policy/modules/admin/smoltclient.if">
-<summary>The Fedora hardware profiler client.</summary>
-</module>
 <module name="sosreport" filename="policy/modules/admin/sosreport.if">
 <summary>Generate debugging information for system.</summary>
 <interface name="sosreport_domtrans" lineno="13">
@@ -3911,7 +3791,7 @@ The user domain associated with the role.
 </summary>
 </param>
 </template>
-<interface name="sudo_sigchld" lineno="189">
+<interface name="sudo_sigchld" lineno="190">
 <summary>
 Send a SIGCHLD signal to the sudo domain.
 </summary>
@@ -3921,6 +3801,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<tunable name="sudo_all_tcp_connect_http_port" dftval="false">
+<desc>
+<p>
+Determine whether all sudo domains
+can connect to TCP HTTP ports. This
+is needed if an additional authentication
+mechanism via an HTTP server is
+required for users to use sudo.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="sxid" filename="policy/modules/admin/sxid.if">
 <summary>SUID/SGID program monitoring.</summary>
@@ -4137,6 +4028,31 @@ Domain allowed to transition.
 </param>
 </interface>
 </module>
+<module name="usbguard" filename="policy/modules/admin/usbguard.if">
+<summary>
+Usbguard enforces the USB device authorization policy for all USB
+devices.
+</summary>
+<interface name="usbguard_stream_connect" lineno="16">
+<summary>
+Connect to usbguard with a unix domain stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<tunable name="usbguard_user_modify_rule_files" dftval="false">
+<desc>
+<p>
+Determine whether authorized users can control the daemon,
+which requires usbguard-daemon to be able modify its rules in
+/etc/usbguard.
+</p>
+</desc>
+</tunable>
+</module>
 <module name="usbmodules" filename="policy/modules/admin/usbmodules.if">
 <summary>List kernel modules of USB devices.</summary>
 <interface name="usbmodules_domtrans" lineno="13">
@@ -4480,35 +4396,6 @@ Domain allowed access.
 </layer>
 <layer name="apps">
 <summary>Policy modules for applications</summary>
-<module name="ada" filename="policy/modules/apps/ada.if">
-<summary>GNAT Ada95 compiler.</summary>
-<interface name="ada_domtrans" lineno="13">
-<summary>
-Execute the ada program in the ada domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="ada_run" lineno="38">
-<summary>
-Execute ada in the ada domain, and
-allow the specified role the ada domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="awstats" filename="policy/modules/apps/awstats.if">
 <summary>Log file analyzer for advanced statistics.</summary>
 <interface name="awstats_domtrans" lineno="14">
@@ -4654,7 +4541,7 @@ User domain for the role
 </summary>
 </param>
 </interface>
-<interface name="chromium_rw_tmp_pipes" lineno="60">
+<interface name="chromium_rw_tmp_pipes" lineno="67">
 <summary>
 Read-write access to Chromiums' temporary fifo files
 </summary>
@@ -4664,7 +4551,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="chromium_tmp_filetrans" lineno="89">
+<interface name="chromium_tmp_filetrans" lineno="96">
 <summary>
 Automatically use the specified type for resources created in chromium's
 temporary locations
@@ -4685,7 +4572,7 @@ The name of the resource being created
 </summary>
 </param>
 </interface>
-<interface name="chromium_domtrans" lineno="108">
+<interface name="chromium_domtrans" lineno="115">
 <summary>
 Execute a domain transition to the chromium domain (chromium_t)
 </summary>
@@ -4695,7 +4582,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="chromium_run" lineno="133">
+<interface name="chromium_run" lineno="141">
 <summary>
 Execute chromium in the chromium domain and allow the specified role to access the chromium domain
 </summary>
@@ -4710,6 +4597,16 @@ Role allowed access
 </summary>
 </param>
 </interface>
+<tunable name="chromium_dri" dftval="true">
+<desc>
+<p>
+Allow chromium to access direct rendering interface
+</p>
+<p>
+Needed for good performance on complex sites
+</p>
+</desc>
+</tunable>
 <tunable name="chromium_read_system_info" dftval="false">
 <desc>
 <p>
@@ -4979,31 +4876,6 @@ Grant the evolution domains manage rights on all user content
 </desc>
 </tunable>
 </module>
-<module name="firewallgui" filename="policy/modules/apps/firewallgui.if">
-<summary>system-config-firewall dbus system service.</summary>
-<interface name="firewallgui_dbus_chat" lineno="14">
-<summary>
-Send and receive messages from
-firewallgui over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="firewallgui_dontaudit_rw_pipes" lineno="35">
-<summary>
-Do not audit attempts to read and
-write firewallgui unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-</module>
 <module name="games" filename="policy/modules/apps/games.if">
 <summary>Various games.</summary>
 <interface name="games_role" lineno="18">
@@ -5053,24 +4925,6 @@ Domain allowed access.
 </param>
 </interface>
 </module>
-<module name="gift" filename="policy/modules/apps/gift.if">
-<summary>Peer to peer file sharing tool.</summary>
-<interface name="gift_role" lineno="18">
-<summary>
-Role access for gift.
-</summary>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-User domain for the role.
-</summary>
-</param>
-</interface>
-</module>
 <module name="gitosis" filename="policy/modules/apps/gitosis.if">
 <summary>Tools for managing and hosting git repositories.</summary>
 <interface name="gitosis_domtrans" lineno="13">
@@ -5884,7 +5738,7 @@ The type of the user domain.
 </summary>
 </param>
 </template>
-<template name="java_domtrans" lineno="148">
+<interface name="java_domtrans" lineno="148">
 <summary>
 Execute the java program in the java domain.
 </summary>
@@ -5893,7 +5747,7 @@ Execute the java program in the java domain.
 Domain allowed to transition.
 </summary>
 </param>
-</template>
+</interface>
 <interface name="java_run" lineno="178">
 <summary>
 Execute java in the java domain, and
@@ -7037,76 +6891,6 @@ Grant the openoffice domains manage rights on all user content
 </desc>
 </tunable>
 </module>
-<module name="podsleuth" filename="policy/modules/apps/podsleuth.if">
-<summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM).</summary>
-<interface name="podsleuth_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run podsleuth.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="podsleuth_run" lineno="39">
-<summary>
-Execute podsleuth in the podsleuth
-domain, and allow the specified role
-the podsleuth domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
-<module name="ptchown" filename="policy/modules/apps/ptchown.if">
-<summary>helper function for grantpt(3), changes ownship and permissions of pseudotty.</summary>
-<interface name="ptchown_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run ptchown.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="ptchown_exec" lineno="32">
-<summary>
-Execute ptchown in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ptchown_run" lineno="58">
-<summary>
-Execute ptchown in the ptchown
-domain, and allow the specified
-role the ptchown domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="pulseaudio" filename="policy/modules/apps/pulseaudio.if">
 <summary>Pulseaudio network sound server.</summary>
 <interface name="pulseaudio_role" lineno="18">
@@ -7359,7 +7143,7 @@ Domain prefix to be used.
 </summary>
 </param>
 </template>
-<template name="qemu_role" lineno="113">
+<template name="qemu_role" lineno="112">
 <summary>
 Role access for qemu.
 </summary>
@@ -7374,7 +7158,7 @@ User domain for the role.
 </summary>
 </param>
 </template>
-<interface name="qemu_domtrans" lineno="134">
+<interface name="qemu_domtrans" lineno="133">
 <summary>
 Execute a domain transition to run qemu.
 </summary>
@@ -7384,7 +7168,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="qemu_exec" lineno="153">
+<interface name="qemu_exec" lineno="152">
 <summary>
 Execute a qemu in the caller domain.
 </summary>
@@ -7394,7 +7178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_run" lineno="180">
+<interface name="qemu_run" lineno="179">
 <summary>
 Execute qemu in the qemu domain,
 and allow the specified role the
@@ -7412,7 +7196,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="qemu_read_state" lineno="199">
+<interface name="qemu_read_state" lineno="198">
 <summary>
 Read qemu process state files.
 </summary>
@@ -7422,7 +7206,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_setsched" lineno="220">
+<interface name="qemu_setsched" lineno="219">
 <summary>
 Set qemu scheduler.
 </summary>
@@ -7432,7 +7216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_signal" lineno="238">
+<interface name="qemu_signal" lineno="237">
 <summary>
 Send generic signals to qemu.
 </summary>
@@ -7442,7 +7226,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_kill" lineno="256">
+<interface name="qemu_kill" lineno="255">
 <summary>
 Send kill signals to qemu.
 </summary>
@@ -7452,7 +7236,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_stream_connect" lineno="275">
+<interface name="qemu_stream_connect" lineno="274">
 <summary>
 Connect to qemu with a unix
 domain stream socket.
@@ -7463,9 +7247,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_delete_pid_sock_file" lineno="294">
+<interface name="qemu_delete_pid_sock_file" lineno="293">
 <summary>
-Unlink qemu socket
+Unlink qemu socket  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -7473,7 +7257,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_domtrans_unconfined" lineno="313">
+<interface name="qemu_delete_runtime_sock_files" lineno="308">
+<summary>
+Unlink qemu runtime sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="qemu_domtrans_unconfined" lineno="327">
 <summary>
 Execute a domain transition to
 run qemu unconfined.
@@ -7484,7 +7278,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="qemu_manage_tmp_dirs" lineno="333">
+<interface name="qemu_manage_tmp_dirs" lineno="347">
 <summary>
 Create, read, write, and delete
 qemu temporary directories.
@@ -7495,7 +7289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_manage_tmp_files" lineno="353">
+<interface name="qemu_manage_tmp_files" lineno="367">
 <summary>
 Create, read, write, and delete
 qemu temporary files.
@@ -7506,7 +7300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_spec_domtrans" lineno="387">
+<interface name="qemu_spec_domtrans" lineno="401">
 <summary>
 Execute qemu in a specified domain.
 </summary>
@@ -7531,7 +7325,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="qemu_entry_type" lineno="407">
+<interface name="qemu_entry_type" lineno="421">
 <summary>
 Make qemu executable files an
 entrypoint for the specified domain.
@@ -7542,7 +7336,7 @@ The domain for which qemu_exec_t is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="qemu_rw_pid_sock_files" lineno="427">
+<interface name="qemu_rw_pid_sock_files" lineno="441">
 <summary>
 Read/write to qemu socket files in /var/run
 </summary>
@@ -7621,9 +7415,6 @@ Domain allowed access.
 </param>
 </interface>
 </module>
-<module name="sambagui" filename="policy/modules/apps/sambagui.if">
-<summary>system-config-samba dbus service.</summary>
-</module>
 <module name="screen" filename="policy/modules/apps/screen.if">
 <summary>GNU terminal multiplexer.</summary>
 <template name="screen_role_template" lineno="24">
@@ -8449,7 +8240,7 @@ The type of the user domain.
 </summary>
 </param>
 </template>
-<interface name="wm_exec" lineno="112">
+<interface name="wm_exec" lineno="116">
 <summary>
 Execute wm in the caller domain.
 </summary>
@@ -8459,7 +8250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="wm_dbus_chat" lineno="138">
+<interface name="wm_dbus_chat" lineno="142">
 <summary>
 Send and receive messages from
 specified wm over dbus.
@@ -8476,7 +8267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="wm_dontaudit_exec_tmp_files" lineno="159">
+<interface name="wm_dontaudit_exec_tmp_files" lineno="163">
 <summary>
 Do not audit attempts to execute
 files in temporary directories.
@@ -8487,7 +8278,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="wm_dontaudit_exec_tmpfs_files" lineno="178">
+<interface name="wm_dontaudit_exec_tmpfs_files" lineno="182">
 <summary>
 Do not audit attempts to execute
 files in temporary filesystems.
@@ -8498,7 +8289,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="wm_application_domain" lineno="221">
+<interface name="wm_application_domain" lineno="225">
 <summary>
 Create a domain for applications
 that are launched by the window
@@ -8533,7 +8324,7 @@ Type to be used as the source window manager domain.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="wm_write_pipes" lineno="246">
+<interface name="wm_write_pipes" lineno="250">
 <summary>
 Write wm unnamed pipes.
 </summary>
@@ -8575,46 +8366,6 @@ Grant the xscreensaver domains read access to generic user content
 </desc>
 </tunable>
 </module>
-<module name="yam" filename="policy/modules/apps/yam.if">
-<summary>Yum/Apt Mirroring.</summary>
-<interface name="yam_domtrans" lineno="13">
-<summary>
-Execute yam in the yam domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="yam_run" lineno="39">
-<summary>
-Execute yam in the yam domain, and
-allow the specified role the yam domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="yam_read_content" lineno="58">
-<summary>
-Read yam content.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 </layer>
 <layer name="contrib">
 <summary>Gentoo-specific policy modules</summary>
@@ -8910,7 +8661,7 @@ The user domain.
 </summary>
 </param>
 </interface>
-<interface name="dropbox_dbus_chat" lineno="66">
+<interface name="dropbox_dbus_chat" lineno="67">
 <summary>
 Send and receive messages from the dropbox daemon
 over dbus.
@@ -8921,7 +8672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dropbox_read_content" lineno="86">
+<interface name="dropbox_read_content" lineno="87">
 <summary>
 Allow other domains to read dropbox's content files
 </summary>
@@ -8931,7 +8682,7 @@ The domain that is allowed read access to the dropbox_content_t files
 </summary>
 </param>
 </interface>
-<interface name="dropbox_manage_content" lineno="105">
+<interface name="dropbox_manage_content" lineno="106">
 <summary>
 Allow other domains to manage dropbox's content files
 </summary>
@@ -9704,7 +9455,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="vde_connect" lineno="50">
+<interface name="vde_connect" lineno="49">
 <summary>
 </summary>
 <param name="domain">
@@ -9731,7 +9482,7 @@ run init.
 <interface name="corecmd_executable_file" lineno="23">
 <summary>
 Make the specified type usable for files
-that are exectuables, such as binary programs.
+that are executables, such as binary programs.
 This does not include shared libraries.
 </summary>
 <param name="type">
@@ -9742,7 +9493,7 @@ Type to be used for files.
 </interface>
 <interface name="corecmd_bin_entry_type" lineno="44">
 <summary>
-Make general progams in bin an entrypoint for
+Make general programs in bin an entrypoint for
 the specified domain.
 </summary>
 <param name="domain">
@@ -9852,17 +9603,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_symlinks" lineno="249">
-<summary>
-Read symbolic links in bin directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corecmd_read_bin_pipes" lineno="265">
+<interface name="corecmd_read_bin_pipes" lineno="249">
 <summary>
 Read pipes in bin directories.
 </summary>
@@ -9872,7 +9613,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_sockets" lineno="284">
+<interface name="corecmd_read_bin_sockets" lineno="268">
 <summary>
 Read named sockets in bin directories.
 </summary>
@@ -9882,7 +9623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_bin" lineno="324">
+<interface name="corecmd_exec_bin" lineno="308">
 <summary>
 Execute generic programs in bin directories,
 in the caller domain.
@@ -9895,7 +9636,7 @@ in system bin directories (/bin, /sbin, /usr/bin,
 </p>
 <p>
 Typically, this interface should be used when the domain
-executes general system progams within the privileges
+executes general system programs within the privileges
 of the source domain.  Some examples of these programs
 are ls, cp, sed, python, and tar. This does not include
 shells, such as bash.
@@ -9913,7 +9654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_bin_files" lineno="343">
+<interface name="corecmd_manage_bin_files" lineno="327">
 <summary>
 Create, read, write, and delete bin files.
 </summary>
@@ -9923,7 +9664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_files" lineno="362">
+<interface name="corecmd_relabel_bin_files" lineno="346">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -9933,7 +9674,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_mmap_bin_files" lineno="381">
+<interface name="corecmd_mmap_bin_files" lineno="365">
 <summary>
 Mmap a bin file as executable.
 </summary>
@@ -9943,7 +9684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="426">
+<interface name="corecmd_bin_spec_domtrans" lineno="410">
 <summary>
 Execute a file in a bin directory
 in the specified domain but do not
@@ -9979,7 +9720,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_domtrans" lineno="469">
+<interface name="corecmd_bin_domtrans" lineno="453">
 <summary>
 Execute a file in a bin directory
 in the specified domain.
@@ -10013,7 +9754,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_check_exec_shell" lineno="488">
+<interface name="corecmd_check_exec_shell" lineno="472">
 <summary>
 Check if a shell is executable (DAC-wise).
 </summary>
@@ -10023,7 +9764,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_shell" lineno="525">
+<interface name="corecmd_exec_shell" lineno="509">
 <summary>
 Execute shells in the caller domain.
 </summary>
@@ -10051,7 +9792,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="563">
+<interface name="corecmd_shell_spec_domtrans" lineno="547">
 <summary>
 Execute a shell in the target domain.  This
 is an explicit transition, requiring the
@@ -10080,7 +9821,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_domtrans" lineno="597">
+<interface name="corecmd_shell_domtrans" lineno="581">
 <summary>
 Execute a shell in the specified domain.
 </summary>
@@ -10105,7 +9846,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_chroot" lineno="616">
+<interface name="corecmd_exec_chroot" lineno="600">
 <summary>
 Execute chroot in the caller domain.
 </summary>
@@ -10115,7 +9856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_getattr_all_executables" lineno="637">
+<interface name="corecmd_getattr_all_executables" lineno="621">
 <summary>
 Get the attributes of all executable files.
 </summary>
@@ -10126,7 +9867,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_read_all_executables" lineno="658">
+<interface name="corecmd_read_all_executables" lineno="642">
 <summary>
 Read all executable files.
 </summary>
@@ -10137,7 +9878,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_exec_all_executables" lineno="678">
+<interface name="corecmd_exec_all_executables" lineno="662">
 <summary>
 Execute all executable files.
 </summary>
@@ -10148,7 +9889,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="699">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="683">
 <summary>
 Do not audit attempts to execute all executables.
 </summary>
@@ -10158,7 +9899,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_all_executables" lineno="718">
+<interface name="corecmd_manage_all_executables" lineno="702">
 <summary>
 Create, read, write, and all executable files.
 </summary>
@@ -10169,7 +9910,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_relabel_all_executables" lineno="740">
+<interface name="corecmd_relabel_all_executables" lineno="724">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10180,7 +9921,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_mmap_all_executables" lineno="760">
+<interface name="corecmd_mmap_all_executables" lineno="744">
 <summary>
 Mmap all executables as executable.
 </summary>
@@ -10190,7 +9931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="782">
+<interface name="corecmd_relabel_bin_dirs" lineno="766">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10200,7 +9941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="800">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="784">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -11928,7 +11669,7 @@ Receive packets from an unlabeled connection.
 Allow the specified domain to receive packets from an
 unlabeled connection.  On machines that do not utilize
 labeled networking, this will be required on all
-networking domains.  On machines tha do utilize
+networking domains.  On machines that do utilize
 labeled networking, this will be required for any
 networking domain that is allowed to receive
 network traffic that does not have a label.
@@ -12279,7 +12020,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_all_packets" lineno="3362">
+<interface name="corenet_send_all_packets" lineno="3356">
 <summary>
 Send all packets.
 </summary>
@@ -12289,7 +12030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_all_packets" lineno="3380">
+<interface name="corenet_receive_all_packets" lineno="3374">
 <summary>
 Receive all packets.
 </summary>
@@ -12299,7 +12040,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_all_packets" lineno="3398">
+<interface name="corenet_sendrecv_all_packets" lineno="3392">
 <summary>
 Send and receive all packets.
 </summary>
@@ -12309,7 +12050,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_all_packets" lineno="3413">
+<interface name="corenet_relabelto_all_packets" lineno="3407">
 <summary>
 Relabel packets to any packet type.
 </summary>
@@ -12319,7 +12060,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3431">
+<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
 <summary>
 Access unlabeled infiniband pkeys.
 </summary>
@@ -12329,7 +12070,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_access_all_pkeys" lineno="3445">
+<interface name="corenet_ib_access_all_pkeys" lineno="3439">
 <summary>
 Access all labeled infiniband pkeys.
 </summary>
@@ -12339,7 +12080,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_manage_subnet_all_endports" lineno="3463">
+<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
 <summary>
 Manage subnets on all labeled Infiniband endports
 </summary>
@@ -12349,7 +12090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3481">
+<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
 <summary>
 Manage subnet on all unlabeled Infiniband endports
 </summary>
@@ -12359,7 +12100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_recvfrom_labeled" lineno="3500">
+<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
 <summary>
 Rules for receiving labeled SCTP packets.
 </summary>
@@ -12374,7 +12115,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_unconfined" lineno="3523">
+<interface name="corenet_unconfined" lineno="3517">
 <summary>
 Unconfined access to network objects.
 </summary>
@@ -12384,7 +12125,83 @@ The domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3543">
+<interface name="corenet_send_icmp_packets" lineno="3537">
+<summary>
+Send icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
+<summary>
+Do not audit attempts to send icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_icmp_packets" lineno="3575">
+<summary>
+Receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
+<summary>
+Do not audit attempts to receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
+<summary>
+Send and receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
+<summary>
+Do not audit attempts to send and receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_icmp_packets" lineno="3644">
+<summary>
+Relabel packets to icmp the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
 <summary>
 Send and receive TCP traffic on the adb port.
 </summary>
@@ -12395,7 +12212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_adb_port" lineno="3558">
+<interface name="corenet_udp_send_adb_port" lineno="3681">
 <summary>
 Send UDP traffic on the adb port.
 </summary>
@@ -12406,7 +12223,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3573">
+<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
 <summary>
 Do not audit attempts to send UDP traffic on the adb port.
 </summary>
@@ -12417,7 +12234,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3588">
+<interface name="corenet_udp_receive_adb_port" lineno="3711">
 <summary>
 Receive UDP traffic on the adb port.
 </summary>
@@ -12428,7 +12245,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3603">
+<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
 <summary>
 Do not audit attempts to receive UDP traffic on the adb port.
 </summary>
@@ -12439,7 +12256,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3618">
+<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
 <summary>
 Send and receive UDP traffic on the adb port.
 </summary>
@@ -12450,7 +12267,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3634">
+<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the adb port.
@@ -12462,7 +12279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3649">
+<interface name="corenet_tcp_bind_adb_port" lineno="3772">
 <summary>
 Bind TCP sockets to the adb port.
 </summary>
@@ -12473,7 +12290,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3669">
+<interface name="corenet_udp_bind_adb_port" lineno="3792">
 <summary>
 Bind UDP sockets to the adb port.
 </summary>
@@ -12484,7 +12301,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3688">
+<interface name="corenet_tcp_connect_adb_port" lineno="3811">
 <summary>
 Make a TCP connection to the adb port.
 </summary>
@@ -12494,7 +12311,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_client_packets" lineno="3708">
+<interface name="corenet_send_adb_client_packets" lineno="3831">
 <summary>
 Send adb_client packets.
 </summary>
@@ -12505,7 +12322,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3727">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
 <summary>
 Do not audit attempts to send adb_client packets.
 </summary>
@@ -12516,7 +12333,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3746">
+<interface name="corenet_receive_adb_client_packets" lineno="3869">
 <summary>
 Receive adb_client packets.
 </summary>
@@ -12527,7 +12344,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3765">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
 <summary>
 Do not audit attempts to receive adb_client packets.
 </summary>
@@ -12538,7 +12355,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3784">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
 <summary>
 Send and receive adb_client packets.
 </summary>
@@ -12549,7 +12366,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3800">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
 <summary>
 Do not audit attempts to send and receive adb_client packets.
 </summary>
@@ -12560,7 +12377,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3815">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
 <summary>
 Relabel packets to adb_client the packet type.
 </summary>
@@ -12570,7 +12387,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_server_packets" lineno="3835">
+<interface name="corenet_send_adb_server_packets" lineno="3958">
 <summary>
 Send adb_server packets.
 </summary>
@@ -12581,7 +12398,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3854">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
 <summary>
 Do not audit attempts to send adb_server packets.
 </summary>
@@ -12592,7 +12409,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_server_packets" lineno="3873">
+<interface name="corenet_receive_adb_server_packets" lineno="3996">
 <summary>
 Receive adb_server packets.
 </summary>
@@ -12603,7 +12420,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3892">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
 <summary>
 Do not audit attempts to receive adb_server packets.
 </summary>
@@ -12614,7 +12431,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="3911">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
 <summary>
 Send and receive adb_server packets.
 </summary>
@@ -12625,7 +12442,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3927">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
 <summary>
 Do not audit attempts to send and receive adb_server packets.
 </summary>
@@ -12636,7 +12453,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="3942">
+<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
 <summary>
 Relabel packets to adb_server the packet type.
 </summary>
@@ -12646,7 +12463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3964">
+<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
 <summary>
 Send and receive TCP traffic on the afs_bos port.
 </summary>
@@ -12657,7 +12474,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="3979">
+<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
 <summary>
 Send UDP traffic on the afs_bos port.
 </summary>
@@ -12668,7 +12485,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3994">
+<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_bos port.
 </summary>
@@ -12679,7 +12496,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4009">
+<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
 <summary>
 Receive UDP traffic on the afs_bos port.
 </summary>
@@ -12690,7 +12507,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4024">
+<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_bos port.
 </summary>
@@ -12701,7 +12518,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4039">
+<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
 <summary>
 Send and receive UDP traffic on the afs_bos port.
 </summary>
@@ -12712,7 +12529,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4055">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_bos port.
@@ -12724,7 +12541,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4070">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
 <summary>
 Bind TCP sockets to the afs_bos port.
 </summary>
@@ -12735,7 +12552,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4090">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
 <summary>
 Bind UDP sockets to the afs_bos port.
 </summary>
@@ -12746,7 +12563,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4109">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
 <summary>
 Make a TCP connection to the afs_bos port.
 </summary>
@@ -12756,7 +12573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4129">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
 <summary>
 Send afs_bos_client packets.
 </summary>
@@ -12767,7 +12584,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4148">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
 <summary>
 Do not audit attempts to send afs_bos_client packets.
 </summary>
@@ -12778,7 +12595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4167">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
 <summary>
 Receive afs_bos_client packets.
 </summary>
@@ -12789,7 +12606,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4186">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
 <summary>
 Do not audit attempts to receive afs_bos_client packets.
 </summary>
@@ -12800,7 +12617,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4205">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
 <summary>
 Send and receive afs_bos_client packets.
 </summary>
@@ -12811,7 +12628,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4221">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
 <summary>
 Do not audit attempts to send and receive afs_bos_client packets.
 </summary>
@@ -12822,7 +12639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4236">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
 <summary>
 Relabel packets to afs_bos_client the packet type.
 </summary>
@@ -12832,7 +12649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4256">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
 <summary>
 Send afs_bos_server packets.
 </summary>
@@ -12843,7 +12660,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4275">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
 <summary>
 Do not audit attempts to send afs_bos_server packets.
 </summary>
@@ -12854,7 +12671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4294">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
 <summary>
 Receive afs_bos_server packets.
 </summary>
@@ -12865,7 +12682,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4313">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
 <summary>
 Do not audit attempts to receive afs_bos_server packets.
 </summary>
@@ -12876,7 +12693,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4332">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
 <summary>
 Send and receive afs_bos_server packets.
 </summary>
@@ -12887,7 +12704,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4348">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
 <summary>
 Do not audit attempts to send and receive afs_bos_server packets.
 </summary>
@@ -12898,7 +12715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4363">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
 <summary>
 Relabel packets to afs_bos_server the packet type.
 </summary>
@@ -12908,7 +12725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4385">
+<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
 <summary>
 Send and receive TCP traffic on the afs_fs port.
 </summary>
@@ -12919,7 +12736,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4400">
+<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
 <summary>
 Send UDP traffic on the afs_fs port.
 </summary>
@@ -12930,7 +12747,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4415">
+<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_fs port.
 </summary>
@@ -12941,7 +12758,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4430">
+<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
 <summary>
 Receive UDP traffic on the afs_fs port.
 </summary>
@@ -12952,7 +12769,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4445">
+<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_fs port.
 </summary>
@@ -12963,7 +12780,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4460">
+<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
 <summary>
 Send and receive UDP traffic on the afs_fs port.
 </summary>
@@ -12974,7 +12791,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4476">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_fs port.
@@ -12986,7 +12803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4491">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
 <summary>
 Bind TCP sockets to the afs_fs port.
 </summary>
@@ -12997,7 +12814,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4511">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
 <summary>
 Bind UDP sockets to the afs_fs port.
 </summary>
@@ -13008,7 +12825,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4530">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
 <summary>
 Make a TCP connection to the afs_fs port.
 </summary>
@@ -13018,7 +12835,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4550">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
 <summary>
 Send afs_fs_client packets.
 </summary>
@@ -13029,7 +12846,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4569">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
 <summary>
 Do not audit attempts to send afs_fs_client packets.
 </summary>
@@ -13040,7 +12857,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4588">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
 <summary>
 Receive afs_fs_client packets.
 </summary>
@@ -13051,7 +12868,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4607">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
 <summary>
 Do not audit attempts to receive afs_fs_client packets.
 </summary>
@@ -13062,7 +12879,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4626">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
 <summary>
 Send and receive afs_fs_client packets.
 </summary>
@@ -13073,7 +12890,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4642">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
 <summary>
 Do not audit attempts to send and receive afs_fs_client packets.
 </summary>
@@ -13084,7 +12901,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4657">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
 <summary>
 Relabel packets to afs_fs_client the packet type.
 </summary>
@@ -13094,7 +12911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4677">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
 <summary>
 Send afs_fs_server packets.
 </summary>
@@ -13105,7 +12922,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4696">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
 <summary>
 Do not audit attempts to send afs_fs_server packets.
 </summary>
@@ -13116,7 +12933,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4715">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
 <summary>
 Receive afs_fs_server packets.
 </summary>
@@ -13127,7 +12944,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4734">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
 <summary>
 Do not audit attempts to receive afs_fs_server packets.
 </summary>
@@ -13138,7 +12955,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4753">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
 <summary>
 Send and receive afs_fs_server packets.
 </summary>
@@ -13149,7 +12966,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4769">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
 <summary>
 Do not audit attempts to send and receive afs_fs_server packets.
 </summary>
@@ -13160,7 +12977,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4784">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
 <summary>
 Relabel packets to afs_fs_server the packet type.
 </summary>
@@ -13170,7 +12987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4806">
+<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
 <summary>
 Send and receive TCP traffic on the afs_ka port.
 </summary>
@@ -13181,7 +12998,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4821">
+<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
 <summary>
 Send UDP traffic on the afs_ka port.
 </summary>
@@ -13192,7 +13009,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4836">
+<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_ka port.
 </summary>
@@ -13203,7 +13020,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4851">
+<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
 <summary>
 Receive UDP traffic on the afs_ka port.
 </summary>
@@ -13214,7 +13031,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4866">
+<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_ka port.
 </summary>
@@ -13225,7 +13042,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4881">
+<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
 <summary>
 Send and receive UDP traffic on the afs_ka port.
 </summary>
@@ -13236,7 +13053,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4897">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_ka port.
@@ -13248,7 +13065,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="4912">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
 <summary>
 Bind TCP sockets to the afs_ka port.
 </summary>
@@ -13259,7 +13076,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="4932">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
 <summary>
 Bind UDP sockets to the afs_ka port.
 </summary>
@@ -13270,7 +13087,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="4951">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
 <summary>
 Make a TCP connection to the afs_ka port.
 </summary>
@@ -13280,7 +13097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="4971">
+<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
 <summary>
 Send afs_ka_client packets.
 </summary>
@@ -13291,7 +13108,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4990">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
 <summary>
 Do not audit attempts to send afs_ka_client packets.
 </summary>
@@ -13302,7 +13119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5009">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
 <summary>
 Receive afs_ka_client packets.
 </summary>
@@ -13313,7 +13130,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5028">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
 <summary>
 Do not audit attempts to receive afs_ka_client packets.
 </summary>
@@ -13324,7 +13141,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5047">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
 <summary>
 Send and receive afs_ka_client packets.
 </summary>
@@ -13335,7 +13152,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5063">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
 <summary>
 Do not audit attempts to send and receive afs_ka_client packets.
 </summary>
@@ -13346,7 +13163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5078">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
 <summary>
 Relabel packets to afs_ka_client the packet type.
 </summary>
@@ -13356,7 +13173,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5098">
+<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
 <summary>
 Send afs_ka_server packets.
 </summary>
@@ -13367,7 +13184,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5117">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
 <summary>
 Do not audit attempts to send afs_ka_server packets.
 </summary>
@@ -13378,7 +13195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5136">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
 <summary>
 Receive afs_ka_server packets.
 </summary>
@@ -13389,7 +13206,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5155">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
 <summary>
 Do not audit attempts to receive afs_ka_server packets.
 </summary>
@@ -13400,7 +13217,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5174">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
 <summary>
 Send and receive afs_ka_server packets.
 </summary>
@@ -13411,7 +13228,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5190">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
 <summary>
 Do not audit attempts to send and receive afs_ka_server packets.
 </summary>
@@ -13422,7 +13239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5205">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
 <summary>
 Relabel packets to afs_ka_server the packet type.
 </summary>
@@ -13432,7 +13249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5227">
+<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
 <summary>
 Send and receive TCP traffic on the afs_pt port.
 </summary>
@@ -13443,7 +13260,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5242">
+<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
 <summary>
 Send UDP traffic on the afs_pt port.
 </summary>
@@ -13454,7 +13271,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5257">
+<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_pt port.
 </summary>
@@ -13465,7 +13282,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5272">
+<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
 <summary>
 Receive UDP traffic on the afs_pt port.
 </summary>
@@ -13476,7 +13293,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5287">
+<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_pt port.
 </summary>
@@ -13487,7 +13304,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5302">
+<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
 <summary>
 Send and receive UDP traffic on the afs_pt port.
 </summary>
@@ -13498,7 +13315,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5318">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_pt port.
@@ -13510,7 +13327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5333">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
 <summary>
 Bind TCP sockets to the afs_pt port.
 </summary>
@@ -13521,7 +13338,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5353">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
 <summary>
 Bind UDP sockets to the afs_pt port.
 </summary>
@@ -13532,7 +13349,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5372">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
 <summary>
 Make a TCP connection to the afs_pt port.
 </summary>
@@ -13542,7 +13359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5392">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
 <summary>
 Send afs_pt_client packets.
 </summary>
@@ -13553,7 +13370,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5411">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
 <summary>
 Do not audit attempts to send afs_pt_client packets.
 </summary>
@@ -13564,7 +13381,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5430">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
 <summary>
 Receive afs_pt_client packets.
 </summary>
@@ -13575,7 +13392,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5449">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
 <summary>
 Do not audit attempts to receive afs_pt_client packets.
 </summary>
@@ -13586,7 +13403,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5468">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
 <summary>
 Send and receive afs_pt_client packets.
 </summary>
@@ -13597,7 +13414,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5484">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
 <summary>
 Do not audit attempts to send and receive afs_pt_client packets.
 </summary>
@@ -13608,7 +13425,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5499">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
 <summary>
 Relabel packets to afs_pt_client the packet type.
 </summary>
@@ -13618,7 +13435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5519">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
 <summary>
 Send afs_pt_server packets.
 </summary>
@@ -13629,7 +13446,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5538">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
 <summary>
 Do not audit attempts to send afs_pt_server packets.
 </summary>
@@ -13640,7 +13457,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5557">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
 <summary>
 Receive afs_pt_server packets.
 </summary>
@@ -13651,7 +13468,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5576">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
 <summary>
 Do not audit attempts to receive afs_pt_server packets.
 </summary>
@@ -13662,7 +13479,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5595">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
 <summary>
 Send and receive afs_pt_server packets.
 </summary>
@@ -13673,7 +13490,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5611">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
 <summary>
 Do not audit attempts to send and receive afs_pt_server packets.
 </summary>
@@ -13684,7 +13501,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5626">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
 <summary>
 Relabel packets to afs_pt_server the packet type.
 </summary>
@@ -13694,7 +13511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5648">
+<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
 <summary>
 Send and receive TCP traffic on the afs_vl port.
 </summary>
@@ -13705,7 +13522,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5663">
+<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
 <summary>
 Send UDP traffic on the afs_vl port.
 </summary>
@@ -13716,7 +13533,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5678">
+<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_vl port.
 </summary>
@@ -13727,7 +13544,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5693">
+<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
 <summary>
 Receive UDP traffic on the afs_vl port.
 </summary>
@@ -13738,7 +13555,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5708">
+<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_vl port.
 </summary>
@@ -13749,7 +13566,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5723">
+<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
 <summary>
 Send and receive UDP traffic on the afs_vl port.
 </summary>
@@ -13760,7 +13577,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5739">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_vl port.
@@ -13772,7 +13589,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5754">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
 <summary>
 Bind TCP sockets to the afs_vl port.
 </summary>
@@ -13783,7 +13600,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5774">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
 <summary>
 Bind UDP sockets to the afs_vl port.
 </summary>
@@ -13794,7 +13611,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5793">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
 <summary>
 Make a TCP connection to the afs_vl port.
 </summary>
@@ -13804,7 +13621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5813">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
 <summary>
 Send afs_vl_client packets.
 </summary>
@@ -13815,7 +13632,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5832">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
 <summary>
 Do not audit attempts to send afs_vl_client packets.
 </summary>
@@ -13826,7 +13643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5851">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
 <summary>
 Receive afs_vl_client packets.
 </summary>
@@ -13837,7 +13654,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5870">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
 <summary>
 Do not audit attempts to receive afs_vl_client packets.
 </summary>
@@ -13848,7 +13665,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5889">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
 <summary>
 Send and receive afs_vl_client packets.
 </summary>
@@ -13859,7 +13676,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5905">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
 <summary>
 Do not audit attempts to send and receive afs_vl_client packets.
 </summary>
@@ -13870,7 +13687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5920">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
 <summary>
 Relabel packets to afs_vl_client the packet type.
 </summary>
@@ -13880,7 +13697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="5940">
+<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
 <summary>
 Send afs_vl_server packets.
 </summary>
@@ -13891,7 +13708,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5959">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
 <summary>
 Do not audit attempts to send afs_vl_server packets.
 </summary>
@@ -13902,7 +13719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="5978">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
 <summary>
 Receive afs_vl_server packets.
 </summary>
@@ -13913,7 +13730,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5997">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
 <summary>
 Do not audit attempts to receive afs_vl_server packets.
 </summary>
@@ -13924,7 +13741,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6016">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
 <summary>
 Send and receive afs_vl_server packets.
 </summary>
@@ -13935,7 +13752,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6032">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
 <summary>
 Do not audit attempts to send and receive afs_vl_server packets.
 </summary>
@@ -13946,7 +13763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6047">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
 <summary>
 Relabel packets to afs_vl_server the packet type.
 </summary>
@@ -13956,7 +13773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6069">
+<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
 <summary>
 Send and receive TCP traffic on the afs3_callback port.
 </summary>
@@ -13967,7 +13784,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6084">
+<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
 <summary>
 Send UDP traffic on the afs3_callback port.
 </summary>
@@ -13978,7 +13795,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6099">
+<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
 <summary>
 Do not audit attempts to send UDP traffic on the afs3_callback port.
 </summary>
@@ -13989,7 +13806,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6114">
+<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
 <summary>
 Receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14000,7 +13817,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6129">
+<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14011,7 +13828,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6144">
+<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
 <summary>
 Send and receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14022,7 +13839,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6160">
+<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs3_callback port.
@@ -14034,7 +13851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6175">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
 <summary>
 Bind TCP sockets to the afs3_callback port.
 </summary>
@@ -14045,7 +13862,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6195">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
 <summary>
 Bind UDP sockets to the afs3_callback port.
 </summary>
@@ -14056,7 +13873,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6214">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
 <summary>
 Make a TCP connection to the afs3_callback port.
 </summary>
@@ -14066,7 +13883,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6234">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
 <summary>
 Send afs3_callback_client packets.
 </summary>
@@ -14077,7 +13894,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6253">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
 <summary>
 Do not audit attempts to send afs3_callback_client packets.
 </summary>
@@ -14088,7 +13905,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6272">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
 <summary>
 Receive afs3_callback_client packets.
 </summary>
@@ -14099,7 +13916,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6291">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
 <summary>
 Do not audit attempts to receive afs3_callback_client packets.
 </summary>
@@ -14110,7 +13927,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6310">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
 <summary>
 Send and receive afs3_callback_client packets.
 </summary>
@@ -14121,7 +13938,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6326">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
 <summary>
 Do not audit attempts to send and receive afs3_callback_client packets.
 </summary>
@@ -14132,7 +13949,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6341">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
 <summary>
 Relabel packets to afs3_callback_client the packet type.
 </summary>
@@ -14142,7 +13959,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6361">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
 <summary>
 Send afs3_callback_server packets.
 </summary>
@@ -14153,7 +13970,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6380">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
 <summary>
 Do not audit attempts to send afs3_callback_server packets.
 </summary>
@@ -14164,7 +13981,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6399">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
 <summary>
 Receive afs3_callback_server packets.
 </summary>
@@ -14175,7 +13992,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6418">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
 <summary>
 Do not audit attempts to receive afs3_callback_server packets.
 </summary>
@@ -14186,7 +14003,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6437">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
 <summary>
 Send and receive afs3_callback_server packets.
 </summary>
@@ -14197,7 +14014,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6453">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
 <summary>
 Do not audit attempts to send and receive afs3_callback_server packets.
 </summary>
@@ -14208,7 +14025,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6468">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
 <summary>
 Relabel packets to afs3_callback_server the packet type.
 </summary>
@@ -14218,7 +14035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6490">
+<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
 <summary>
 Send and receive TCP traffic on the agentx port.
 </summary>
@@ -14229,7 +14046,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6505">
+<interface name="corenet_udp_send_agentx_port" lineno="6628">
 <summary>
 Send UDP traffic on the agentx port.
 </summary>
@@ -14240,7 +14057,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6520">
+<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
 <summary>
 Do not audit attempts to send UDP traffic on the agentx port.
 </summary>
@@ -14251,7 +14068,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6535">
+<interface name="corenet_udp_receive_agentx_port" lineno="6658">
 <summary>
 Receive UDP traffic on the agentx port.
 </summary>
@@ -14262,7 +14079,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6550">
+<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
 <summary>
 Do not audit attempts to receive UDP traffic on the agentx port.
 </summary>
@@ -14273,7 +14090,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6565">
+<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
 <summary>
 Send and receive UDP traffic on the agentx port.
 </summary>
@@ -14284,7 +14101,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6581">
+<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the agentx port.
@@ -14296,7 +14113,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6596">
+<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
 <summary>
 Bind TCP sockets to the agentx port.
 </summary>
@@ -14307,7 +14124,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6616">
+<interface name="corenet_udp_bind_agentx_port" lineno="6739">
 <summary>
 Bind UDP sockets to the agentx port.
 </summary>
@@ -14318,7 +14135,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6635">
+<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
 <summary>
 Make a TCP connection to the agentx port.
 </summary>
@@ -14328,7 +14145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6655">
+<interface name="corenet_send_agentx_client_packets" lineno="6778">
 <summary>
 Send agentx_client packets.
 </summary>
@@ -14339,7 +14156,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6674">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
 <summary>
 Do not audit attempts to send agentx_client packets.
 </summary>
@@ -14350,7 +14167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6693">
+<interface name="corenet_receive_agentx_client_packets" lineno="6816">
 <summary>
 Receive agentx_client packets.
 </summary>
@@ -14361,7 +14178,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6712">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
 <summary>
 Do not audit attempts to receive agentx_client packets.
 </summary>
@@ -14372,7 +14189,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6731">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
 <summary>
 Send and receive agentx_client packets.
 </summary>
@@ -14383,7 +14200,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6747">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
 <summary>
 Do not audit attempts to send and receive agentx_client packets.
 </summary>
@@ -14394,7 +14211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6762">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
 <summary>
 Relabel packets to agentx_client the packet type.
 </summary>
@@ -14404,7 +14221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6782">
+<interface name="corenet_send_agentx_server_packets" lineno="6905">
 <summary>
 Send agentx_server packets.
 </summary>
@@ -14415,7 +14232,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6801">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
 <summary>
 Do not audit attempts to send agentx_server packets.
 </summary>
@@ -14426,7 +14243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6820">
+<interface name="corenet_receive_agentx_server_packets" lineno="6943">
 <summary>
 Receive agentx_server packets.
 </summary>
@@ -14437,7 +14254,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6839">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
 <summary>
 Do not audit attempts to receive agentx_server packets.
 </summary>
@@ -14448,7 +14265,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6858">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
 <summary>
 Send and receive agentx_server packets.
 </summary>
@@ -14459,7 +14276,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6874">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
 <summary>
 Do not audit attempts to send and receive agentx_server packets.
 </summary>
@@ -14470,7 +14287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="6889">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
 <summary>
 Relabel packets to agentx_server the packet type.
 </summary>
@@ -14480,7 +14297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="6911">
+<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
 <summary>
 Send and receive TCP traffic on the amanda port.
 </summary>
@@ -14491,7 +14308,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amanda_port" lineno="6926">
+<interface name="corenet_udp_send_amanda_port" lineno="7049">
 <summary>
 Send UDP traffic on the amanda port.
 </summary>
@@ -14502,7 +14319,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6941">
+<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
 <summary>
 Do not audit attempts to send UDP traffic on the amanda port.
 </summary>
@@ -14513,7 +14330,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="6956">
+<interface name="corenet_udp_receive_amanda_port" lineno="7079">
 <summary>
 Receive UDP traffic on the amanda port.
 </summary>
@@ -14524,7 +14341,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6971">
+<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
 <summary>
 Do not audit attempts to receive UDP traffic on the amanda port.
 </summary>
@@ -14535,7 +14352,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="6986">
+<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
 <summary>
 Send and receive UDP traffic on the amanda port.
 </summary>
@@ -14546,7 +14363,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7002">
+<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amanda port.
@@ -14558,7 +14375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7017">
+<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
 <summary>
 Bind TCP sockets to the amanda port.
 </summary>
@@ -14569,7 +14386,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7037">
+<interface name="corenet_udp_bind_amanda_port" lineno="7160">
 <summary>
 Bind UDP sockets to the amanda port.
 </summary>
@@ -14580,7 +14397,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7056">
+<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
 <summary>
 Make a TCP connection to the amanda port.
 </summary>
@@ -14590,7 +14407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7076">
+<interface name="corenet_send_amanda_client_packets" lineno="7199">
 <summary>
 Send amanda_client packets.
 </summary>
@@ -14601,7 +14418,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7095">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
 <summary>
 Do not audit attempts to send amanda_client packets.
 </summary>
@@ -14612,7 +14429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7114">
+<interface name="corenet_receive_amanda_client_packets" lineno="7237">
 <summary>
 Receive amanda_client packets.
 </summary>
@@ -14623,7 +14440,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7133">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
 <summary>
 Do not audit attempts to receive amanda_client packets.
 </summary>
@@ -14634,7 +14451,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7152">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
 <summary>
 Send and receive amanda_client packets.
 </summary>
@@ -14645,7 +14462,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7168">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
 <summary>
 Do not audit attempts to send and receive amanda_client packets.
 </summary>
@@ -14656,7 +14473,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7183">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
 <summary>
 Relabel packets to amanda_client the packet type.
 </summary>
@@ -14666,7 +14483,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7203">
+<interface name="corenet_send_amanda_server_packets" lineno="7326">
 <summary>
 Send amanda_server packets.
 </summary>
@@ -14677,7 +14494,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7222">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
 <summary>
 Do not audit attempts to send amanda_server packets.
 </summary>
@@ -14688,7 +14505,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7241">
+<interface name="corenet_receive_amanda_server_packets" lineno="7364">
 <summary>
 Receive amanda_server packets.
 </summary>
@@ -14699,7 +14516,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7260">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
 <summary>
 Do not audit attempts to receive amanda_server packets.
 </summary>
@@ -14710,7 +14527,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7279">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
 <summary>
 Send and receive amanda_server packets.
 </summary>
@@ -14721,7 +14538,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7295">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
 <summary>
 Do not audit attempts to send and receive amanda_server packets.
 </summary>
@@ -14732,7 +14549,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7310">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
 <summary>
 Relabel packets to amanda_server the packet type.
 </summary>
@@ -14742,7 +14559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7332">
+<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
 <summary>
 Send and receive TCP traffic on the amavisd_recv port.
 </summary>
@@ -14753,7 +14570,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7347">
+<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
 <summary>
 Send UDP traffic on the amavisd_recv port.
 </summary>
@@ -14764,7 +14581,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7362">
+<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
 <summary>
 Do not audit attempts to send UDP traffic on the amavisd_recv port.
 </summary>
@@ -14775,7 +14592,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7377">
+<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
 <summary>
 Receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14786,7 +14603,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7392">
+<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
 <summary>
 Do not audit attempts to receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14797,7 +14614,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7407">
+<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
 <summary>
 Send and receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14808,7 +14625,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7423">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amavisd_recv port.
@@ -14820,7 +14637,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7438">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
 <summary>
 Bind TCP sockets to the amavisd_recv port.
 </summary>
@@ -14831,7 +14648,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7458">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
 <summary>
 Bind UDP sockets to the amavisd_recv port.
 </summary>
@@ -14842,7 +14659,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7477">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
 <summary>
 Make a TCP connection to the amavisd_recv port.
 </summary>
@@ -14852,7 +14669,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7497">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
 <summary>
 Send amavisd_recv_client packets.
 </summary>
@@ -14863,7 +14680,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7516">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
 <summary>
 Do not audit attempts to send amavisd_recv_client packets.
 </summary>
@@ -14874,7 +14691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7535">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
 <summary>
 Receive amavisd_recv_client packets.
 </summary>
@@ -14885,7 +14702,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7554">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
 <summary>
 Do not audit attempts to receive amavisd_recv_client packets.
 </summary>
@@ -14896,7 +14713,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7573">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
 <summary>
 Send and receive amavisd_recv_client packets.
 </summary>
@@ -14907,7 +14724,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7589">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_client packets.
 </summary>
@@ -14918,7 +14735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7604">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
 <summary>
 Relabel packets to amavisd_recv_client the packet type.
 </summary>
@@ -14928,7 +14745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7624">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
 <summary>
 Send amavisd_recv_server packets.
 </summary>
@@ -14939,7 +14756,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7643">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
 <summary>
 Do not audit attempts to send amavisd_recv_server packets.
 </summary>
@@ -14950,7 +14767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7662">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
 <summary>
 Receive amavisd_recv_server packets.
 </summary>
@@ -14961,7 +14778,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7681">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
 <summary>
 Do not audit attempts to receive amavisd_recv_server packets.
 </summary>
@@ -14972,7 +14789,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7700">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
 <summary>
 Send and receive amavisd_recv_server packets.
 </summary>
@@ -14983,7 +14800,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7716">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_server packets.
 </summary>
@@ -14994,7 +14811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7731">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
 <summary>
 Relabel packets to amavisd_recv_server the packet type.
 </summary>
@@ -15004,7 +14821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7753">
+<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
 <summary>
 Send and receive TCP traffic on the amavisd_send port.
 </summary>
@@ -15015,7 +14832,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7768">
+<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
 <summary>
 Send UDP traffic on the amavisd_send port.
 </summary>
@@ -15026,7 +14843,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7783">
+<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
 <summary>
 Do not audit attempts to send UDP traffic on the amavisd_send port.
 </summary>
@@ -15037,7 +14854,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7798">
+<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
 <summary>
 Receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15048,7 +14865,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7813">
+<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
 <summary>
 Do not audit attempts to receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15059,7 +14876,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7828">
+<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
 <summary>
 Send and receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15070,7 +14887,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7844">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amavisd_send port.
@@ -15082,7 +14899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7859">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
 <summary>
 Bind TCP sockets to the amavisd_send port.
 </summary>
@@ -15093,7 +14910,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="7879">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
 <summary>
 Bind UDP sockets to the amavisd_send port.
 </summary>
@@ -15104,7 +14921,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="7898">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
 <summary>
 Make a TCP connection to the amavisd_send port.
 </summary>
@@ -15114,7 +14931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="7918">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
 <summary>
 Send amavisd_send_client packets.
 </summary>
@@ -15125,7 +14942,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7937">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
 <summary>
 Do not audit attempts to send amavisd_send_client packets.
 </summary>
@@ -15136,7 +14953,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="7956">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
 <summary>
 Receive amavisd_send_client packets.
 </summary>
@@ -15147,7 +14964,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7975">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
 <summary>
 Do not audit attempts to receive amavisd_send_client packets.
 </summary>
@@ -15158,7 +14975,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7994">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
 <summary>
 Send and receive amavisd_send_client packets.
 </summary>
@@ -15169,7 +14986,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8010">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
 <summary>
 Do not audit attempts to send and receive amavisd_send_client packets.
 </summary>
@@ -15180,7 +14997,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8025">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
 <summary>
 Relabel packets to amavisd_send_client the packet type.
 </summary>
@@ -15190,7 +15007,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8045">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
 <summary>
 Send amavisd_send_server packets.
 </summary>
@@ -15201,7 +15018,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8064">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
 <summary>
 Do not audit attempts to send amavisd_send_server packets.
 </summary>
@@ -15212,7 +15029,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8083">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
 <summary>
 Receive amavisd_send_server packets.
 </summary>
@@ -15223,7 +15040,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8102">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
 <summary>
 Do not audit attempts to receive amavisd_send_server packets.
 </summary>
@@ -15234,7 +15051,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8121">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
 <summary>
 Send and receive amavisd_send_server packets.
 </summary>
@@ -15245,7 +15062,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8137">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
 <summary>
 Do not audit attempts to send and receive amavisd_send_server packets.
 </summary>
@@ -15256,7 +15073,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8152">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
 <summary>
 Relabel packets to amavisd_send_server the packet type.
 </summary>
@@ -15266,7 +15083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8174">
+<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
 <summary>
 Send and receive TCP traffic on the amqp port.
 </summary>
@@ -15277,7 +15094,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8189">
+<interface name="corenet_udp_send_amqp_port" lineno="8312">
 <summary>
 Send UDP traffic on the amqp port.
 </summary>
@@ -15288,7 +15105,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8204">
+<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
 <summary>
 Do not audit attempts to send UDP traffic on the amqp port.
 </summary>
@@ -15299,7 +15116,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8219">
+<interface name="corenet_udp_receive_amqp_port" lineno="8342">
 <summary>
 Receive UDP traffic on the amqp port.
 </summary>
@@ -15310,7 +15127,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8234">
+<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
 <summary>
 Do not audit attempts to receive UDP traffic on the amqp port.
 </summary>
@@ -15321,7 +15138,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8249">
+<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
 <summary>
 Send and receive UDP traffic on the amqp port.
 </summary>
@@ -15332,7 +15149,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8265">
+<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amqp port.
@@ -15344,7 +15161,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8280">
+<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
 <summary>
 Bind TCP sockets to the amqp port.
 </summary>
@@ -15355,7 +15172,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8300">
+<interface name="corenet_udp_bind_amqp_port" lineno="8423">
 <summary>
 Bind UDP sockets to the amqp port.
 </summary>
@@ -15366,7 +15183,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8319">
+<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
 <summary>
 Make a TCP connection to the amqp port.
 </summary>
@@ -15376,7 +15193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8339">
+<interface name="corenet_send_amqp_client_packets" lineno="8462">
 <summary>
 Send amqp_client packets.
 </summary>
@@ -15387,7 +15204,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8358">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
 <summary>
 Do not audit attempts to send amqp_client packets.
 </summary>
@@ -15398,7 +15215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8377">
+<interface name="corenet_receive_amqp_client_packets" lineno="8500">
 <summary>
 Receive amqp_client packets.
 </summary>
@@ -15409,7 +15226,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8396">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
 <summary>
 Do not audit attempts to receive amqp_client packets.
 </summary>
@@ -15420,7 +15237,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8415">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
 <summary>
 Send and receive amqp_client packets.
 </summary>
@@ -15431,7 +15248,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8431">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
 <summary>
 Do not audit attempts to send and receive amqp_client packets.
 </summary>
@@ -15442,7 +15259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8446">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
 <summary>
 Relabel packets to amqp_client the packet type.
 </summary>
@@ -15452,7 +15269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8466">
+<interface name="corenet_send_amqp_server_packets" lineno="8589">
 <summary>
 Send amqp_server packets.
 </summary>
@@ -15463,7 +15280,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8485">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
 <summary>
 Do not audit attempts to send amqp_server packets.
 </summary>
@@ -15474,7 +15291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8504">
+<interface name="corenet_receive_amqp_server_packets" lineno="8627">
 <summary>
 Receive amqp_server packets.
 </summary>
@@ -15485,7 +15302,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8523">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
 <summary>
 Do not audit attempts to receive amqp_server packets.
 </summary>
@@ -15496,7 +15313,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8542">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
 <summary>
 Send and receive amqp_server packets.
 </summary>
@@ -15507,7 +15324,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8558">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
 <summary>
 Do not audit attempts to send and receive amqp_server packets.
 </summary>
@@ -15518,7 +15335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8573">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
 <summary>
 Relabel packets to amqp_server the packet type.
 </summary>
@@ -15528,7 +15345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8595">
+<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
 <summary>
 Send and receive TCP traffic on the aol port.
 </summary>
@@ -15539,7 +15356,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_aol_port" lineno="8610">
+<interface name="corenet_udp_send_aol_port" lineno="8733">
 <summary>
 Send UDP traffic on the aol port.
 </summary>
@@ -15550,7 +15367,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8625">
+<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
 <summary>
 Do not audit attempts to send UDP traffic on the aol port.
 </summary>
@@ -15561,7 +15378,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8640">
+<interface name="corenet_udp_receive_aol_port" lineno="8763">
 <summary>
 Receive UDP traffic on the aol port.
 </summary>
@@ -15572,7 +15389,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8655">
+<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
 <summary>
 Do not audit attempts to receive UDP traffic on the aol port.
 </summary>
@@ -15583,7 +15400,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8670">
+<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
 <summary>
 Send and receive UDP traffic on the aol port.
 </summary>
@@ -15594,7 +15411,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8686">
+<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the aol port.
@@ -15606,7 +15423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8701">
+<interface name="corenet_tcp_bind_aol_port" lineno="8824">
 <summary>
 Bind TCP sockets to the aol port.
 </summary>
@@ -15617,7 +15434,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8721">
+<interface name="corenet_udp_bind_aol_port" lineno="8844">
 <summary>
 Bind UDP sockets to the aol port.
 </summary>
@@ -15628,7 +15445,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8740">
+<interface name="corenet_tcp_connect_aol_port" lineno="8863">
 <summary>
 Make a TCP connection to the aol port.
 </summary>
@@ -15638,7 +15455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_client_packets" lineno="8760">
+<interface name="corenet_send_aol_client_packets" lineno="8883">
 <summary>
 Send aol_client packets.
 </summary>
@@ -15649,7 +15466,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8779">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
 <summary>
 Do not audit attempts to send aol_client packets.
 </summary>
@@ -15660,7 +15477,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8798">
+<interface name="corenet_receive_aol_client_packets" lineno="8921">
 <summary>
 Receive aol_client packets.
 </summary>
@@ -15671,7 +15488,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8817">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
 <summary>
 Do not audit attempts to receive aol_client packets.
 </summary>
@@ -15682,7 +15499,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8836">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
 <summary>
 Send and receive aol_client packets.
 </summary>
@@ -15693,7 +15510,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8852">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
 <summary>
 Do not audit attempts to send and receive aol_client packets.
 </summary>
@@ -15704,7 +15521,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="8867">
+<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
 <summary>
 Relabel packets to aol_client the packet type.
 </summary>
@@ -15714,7 +15531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_server_packets" lineno="8887">
+<interface name="corenet_send_aol_server_packets" lineno="9010">
 <summary>
 Send aol_server packets.
 </summary>
@@ -15725,7 +15542,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="8906">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
 <summary>
 Do not audit attempts to send aol_server packets.
 </summary>
@@ -15736,7 +15553,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_server_packets" lineno="8925">
+<interface name="corenet_receive_aol_server_packets" lineno="9048">
 <summary>
 Receive aol_server packets.
 </summary>
@@ -15747,7 +15564,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8944">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
 <summary>
 Do not audit attempts to receive aol_server packets.
 </summary>
@@ -15758,7 +15575,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="8963">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
 <summary>
 Send and receive aol_server packets.
 </summary>
@@ -15769,7 +15586,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8979">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
 <summary>
 Do not audit attempts to send and receive aol_server packets.
 </summary>
@@ -15780,7 +15597,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="8994">
+<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
 <summary>
 Relabel packets to aol_server the packet type.
 </summary>
@@ -15790,7 +15607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9016">
+<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
 <summary>
 Send and receive TCP traffic on the apcupsd port.
 </summary>
@@ -15801,7 +15618,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9031">
+<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
 <summary>
 Send UDP traffic on the apcupsd port.
 </summary>
@@ -15812,7 +15629,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9046">
+<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
 <summary>
 Do not audit attempts to send UDP traffic on the apcupsd port.
 </summary>
@@ -15823,7 +15640,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9061">
+<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
 <summary>
 Receive UDP traffic on the apcupsd port.
 </summary>
@@ -15834,7 +15651,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9076">
+<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
 <summary>
 Do not audit attempts to receive UDP traffic on the apcupsd port.
 </summary>
@@ -15845,7 +15662,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9091">
+<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
 <summary>
 Send and receive UDP traffic on the apcupsd port.
 </summary>
@@ -15856,7 +15673,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9107">
+<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the apcupsd port.
@@ -15868,7 +15685,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9122">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
 <summary>
 Bind TCP sockets to the apcupsd port.
 </summary>
@@ -15879,7 +15696,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9142">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
 <summary>
 Bind UDP sockets to the apcupsd port.
 </summary>
@@ -15890,7 +15707,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9161">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
 <summary>
 Make a TCP connection to the apcupsd port.
 </summary>
@@ -15900,7 +15717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9181">
+<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
 <summary>
 Send apcupsd_client packets.
 </summary>
@@ -15911,7 +15728,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9200">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
 <summary>
 Do not audit attempts to send apcupsd_client packets.
 </summary>
@@ -15922,7 +15739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9219">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
 <summary>
 Receive apcupsd_client packets.
 </summary>
@@ -15933,7 +15750,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9238">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
 <summary>
 Do not audit attempts to receive apcupsd_client packets.
 </summary>
@@ -15944,7 +15761,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9257">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
 <summary>
 Send and receive apcupsd_client packets.
 </summary>
@@ -15955,7 +15772,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9273">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
 <summary>
 Do not audit attempts to send and receive apcupsd_client packets.
 </summary>
@@ -15966,7 +15783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9288">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
 <summary>
 Relabel packets to apcupsd_client the packet type.
 </summary>
@@ -15976,7 +15793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9308">
+<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
 <summary>
 Send apcupsd_server packets.
 </summary>
@@ -15987,7 +15804,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9327">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
 <summary>
 Do not audit attempts to send apcupsd_server packets.
 </summary>
@@ -15998,7 +15815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9346">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
 <summary>
 Receive apcupsd_server packets.
 </summary>
@@ -16009,7 +15826,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9365">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
 <summary>
 Do not audit attempts to receive apcupsd_server packets.
 </summary>
@@ -16020,7 +15837,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9384">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
 <summary>
 Send and receive apcupsd_server packets.
 </summary>
@@ -16031,7 +15848,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9400">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
 <summary>
 Do not audit attempts to send and receive apcupsd_server packets.
 </summary>
@@ -16042,7 +15859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9415">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
 <summary>
 Relabel packets to apcupsd_server the packet type.
 </summary>
@@ -16052,7 +15869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9437">
+<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
 <summary>
 Send and receive TCP traffic on the apertus_ldp port.
 </summary>
@@ -16063,7 +15880,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9452">
+<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
 <summary>
 Send UDP traffic on the apertus_ldp port.
 </summary>
@@ -16074,7 +15891,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9467">
+<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
 <summary>
 Do not audit attempts to send UDP traffic on the apertus_ldp port.
 </summary>
@@ -16085,7 +15902,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9482">
+<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
 <summary>
 Receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16096,7 +15913,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9497">
+<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
 <summary>
 Do not audit attempts to receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16107,7 +15924,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9512">
+<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
 <summary>
 Send and receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16118,7 +15935,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9528">
+<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the apertus_ldp port.
@@ -16130,7 +15947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9543">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
 <summary>
 Bind TCP sockets to the apertus_ldp port.
 </summary>
@@ -16141,7 +15958,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9563">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
 <summary>
 Bind UDP sockets to the apertus_ldp port.
 </summary>
@@ -16152,7 +15969,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9582">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
 <summary>
 Make a TCP connection to the apertus_ldp port.
 </summary>
@@ -16162,7 +15979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9602">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
 <summary>
 Send apertus_ldp_client packets.
 </summary>
@@ -16173,7 +15990,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9621">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
 <summary>
 Do not audit attempts to send apertus_ldp_client packets.
 </summary>
@@ -16184,7 +16001,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9640">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
 <summary>
 Receive apertus_ldp_client packets.
 </summary>
@@ -16195,7 +16012,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9659">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
 <summary>
 Do not audit attempts to receive apertus_ldp_client packets.
 </summary>
@@ -16206,7 +16023,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9678">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
 <summary>
 Send and receive apertus_ldp_client packets.
 </summary>
@@ -16217,7 +16034,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9694">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_client packets.
 </summary>
@@ -16228,7 +16045,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9709">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
 <summary>
 Relabel packets to apertus_ldp_client the packet type.
 </summary>
@@ -16238,7 +16055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9729">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
 <summary>
 Send apertus_ldp_server packets.
 </summary>
@@ -16249,7 +16066,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9748">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
 <summary>
 Do not audit attempts to send apertus_ldp_server packets.
 </summary>
@@ -16260,7 +16077,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9767">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
 <summary>
 Receive apertus_ldp_server packets.
 </summary>
@@ -16271,7 +16088,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9786">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
 <summary>
 Do not audit attempts to receive apertus_ldp_server packets.
 </summary>
@@ -16282,7 +16099,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9805">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
 <summary>
 Send and receive apertus_ldp_server packets.
 </summary>
@@ -16293,7 +16110,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9821">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_server packets.
 </summary>
@@ -16304,7 +16121,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9836">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
 <summary>
 Relabel packets to apertus_ldp_server the packet type.
 </summary>
@@ -16314,7 +16131,269 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="9858">
+<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
+<summary>
+Send and receive TCP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
+<summary>
+Send UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
+<summary>
+Do not audit attempts to send UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
+<summary>
+Receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
+<summary>
+Do not audit attempts to receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
+<summary>
+Send and receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
+<summary>
+Do not audit attempts to send and receive
+UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
+<summary>
+Bind TCP sockets to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
+<summary>
+Bind UDP sockets to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
+<summary>
+Make a TCP connection to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
+<summary>
+Send aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
+<summary>
+Do not audit attempts to send aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
+<summary>
+Receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
+<summary>
+Do not audit attempts to receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
+<summary>
+Send and receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
+<summary>
+Do not audit attempts to send and receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
+<summary>
+Relabel packets to aptcacher_client the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
+<summary>
+Send aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
+<summary>
+Do not audit attempts to send aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
+<summary>
+Receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
+<summary>
+Do not audit attempts to receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
+<summary>
+Send and receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
+<summary>
+Do not audit attempts to send and receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
+<summary>
+Relabel packets to aptcacher_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
 <summary>
 Send and receive TCP traffic on the armtechdaemon port.
 </summary>
@@ -16325,7 +16404,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="9873">
+<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
 <summary>
 Send UDP traffic on the armtechdaemon port.
 </summary>
@@ -16336,7 +16415,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="9888">
+<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
 <summary>
 Do not audit attempts to send UDP traffic on the armtechdaemon port.
 </summary>
@@ -16347,7 +16426,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="9903">
+<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
 <summary>
 Receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16358,7 +16437,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="9918">
+<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
 <summary>
 Do not audit attempts to receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16369,7 +16448,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="9933">
+<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
 <summary>
 Send and receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16380,7 +16459,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="9949">
+<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the armtechdaemon port.
@@ -16392,7 +16471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="9964">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
 <summary>
 Bind TCP sockets to the armtechdaemon port.
 </summary>
@@ -16403,7 +16482,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="9984">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
 <summary>
 Bind UDP sockets to the armtechdaemon port.
 </summary>
@@ -16414,7 +16493,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10003">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
 <summary>
 Make a TCP connection to the armtechdaemon port.
 </summary>
@@ -16424,7 +16503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10023">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
 <summary>
 Send armtechdaemon_client packets.
 </summary>
@@ -16435,7 +16514,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10042">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
 <summary>
 Do not audit attempts to send armtechdaemon_client packets.
 </summary>
@@ -16446,7 +16525,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10061">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
 <summary>
 Receive armtechdaemon_client packets.
 </summary>
@@ -16457,7 +16536,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10080">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
 <summary>
 Do not audit attempts to receive armtechdaemon_client packets.
 </summary>
@@ -16468,7 +16547,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10099">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
 <summary>
 Send and receive armtechdaemon_client packets.
 </summary>
@@ -16479,7 +16558,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10115">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_client packets.
 </summary>
@@ -16490,7 +16569,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10130">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
 <summary>
 Relabel packets to armtechdaemon_client the packet type.
 </summary>
@@ -16500,7 +16579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10150">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
 <summary>
 Send armtechdaemon_server packets.
 </summary>
@@ -16511,7 +16590,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10169">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
 <summary>
 Do not audit attempts to send armtechdaemon_server packets.
 </summary>
@@ -16522,7 +16601,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10188">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
 <summary>
 Receive armtechdaemon_server packets.
 </summary>
@@ -16533,7 +16612,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10207">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
 <summary>
 Do not audit attempts to receive armtechdaemon_server packets.
 </summary>
@@ -16544,7 +16623,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10226">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
 <summary>
 Send and receive armtechdaemon_server packets.
 </summary>
@@ -16555,7 +16634,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10242">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_server packets.
 </summary>
@@ -16566,7 +16645,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10257">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
 <summary>
 Relabel packets to armtechdaemon_server the packet type.
 </summary>
@@ -16576,7 +16655,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10279">
+<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
 <summary>
 Send and receive TCP traffic on the asterisk port.
 </summary>
@@ -16587,7 +16666,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10294">
+<interface name="corenet_udp_send_asterisk_port" lineno="10838">
 <summary>
 Send UDP traffic on the asterisk port.
 </summary>
@@ -16598,7 +16677,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10309">
+<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
 <summary>
 Do not audit attempts to send UDP traffic on the asterisk port.
 </summary>
@@ -16609,7 +16688,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10324">
+<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
 <summary>
 Receive UDP traffic on the asterisk port.
 </summary>
@@ -16620,7 +16699,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10339">
+<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
 <summary>
 Do not audit attempts to receive UDP traffic on the asterisk port.
 </summary>
@@ -16631,7 +16710,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10354">
+<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
 <summary>
 Send and receive UDP traffic on the asterisk port.
 </summary>
@@ -16642,7 +16721,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10370">
+<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the asterisk port.
@@ -16654,7 +16733,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10385">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
 <summary>
 Bind TCP sockets to the asterisk port.
 </summary>
@@ -16665,7 +16744,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10405">
+<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
 <summary>
 Bind UDP sockets to the asterisk port.
 </summary>
@@ -16676,7 +16755,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10424">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
 <summary>
 Make a TCP connection to the asterisk port.
 </summary>
@@ -16686,7 +16765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="10444">
+<interface name="corenet_send_asterisk_client_packets" lineno="10988">
 <summary>
 Send asterisk_client packets.
 </summary>
@@ -16697,7 +16776,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10463">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
 <summary>
 Do not audit attempts to send asterisk_client packets.
 </summary>
@@ -16708,7 +16787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="10482">
+<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
 <summary>
 Receive asterisk_client packets.
 </summary>
@@ -16719,7 +16798,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10501">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
 <summary>
 Do not audit attempts to receive asterisk_client packets.
 </summary>
@@ -16730,7 +16809,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10520">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
 <summary>
 Send and receive asterisk_client packets.
 </summary>
@@ -16741,7 +16820,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10536">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
 <summary>
 Do not audit attempts to send and receive asterisk_client packets.
 </summary>
@@ -16752,7 +16831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="10551">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
 <summary>
 Relabel packets to asterisk_client the packet type.
 </summary>
@@ -16762,7 +16841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="10571">
+<interface name="corenet_send_asterisk_server_packets" lineno="11115">
 <summary>
 Send asterisk_server packets.
 </summary>
@@ -16773,7 +16852,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10590">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
 <summary>
 Do not audit attempts to send asterisk_server packets.
 </summary>
@@ -16784,7 +16863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="10609">
+<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
 <summary>
 Receive asterisk_server packets.
 </summary>
@@ -16795,7 +16874,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10628">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
 <summary>
 Do not audit attempts to receive asterisk_server packets.
 </summary>
@@ -16806,7 +16885,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="10647">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
 <summary>
 Send and receive asterisk_server packets.
 </summary>
@@ -16817,7 +16896,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10663">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
 <summary>
 Do not audit attempts to send and receive asterisk_server packets.
 </summary>
@@ -16828,7 +16907,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="10678">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
 <summary>
 Relabel packets to asterisk_server the packet type.
 </summary>
@@ -16838,7 +16917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="10700">
+<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
 <summary>
 Send and receive TCP traffic on the audit port.
 </summary>
@@ -16849,7 +16928,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_audit_port" lineno="10715">
+<interface name="corenet_udp_send_audit_port" lineno="11259">
 <summary>
 Send UDP traffic on the audit port.
 </summary>
@@ -16860,7 +16939,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="10730">
+<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
 <summary>
 Do not audit attempts to send UDP traffic on the audit port.
 </summary>
@@ -16871,7 +16950,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_audit_port" lineno="10745">
+<interface name="corenet_udp_receive_audit_port" lineno="11289">
 <summary>
 Receive UDP traffic on the audit port.
 </summary>
@@ -16882,7 +16961,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10760">
+<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
 <summary>
 Do not audit attempts to receive UDP traffic on the audit port.
 </summary>
@@ -16893,7 +16972,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="10775">
+<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
 <summary>
 Send and receive UDP traffic on the audit port.
 </summary>
@@ -16904,7 +16983,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10791">
+<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the audit port.
@@ -16916,7 +16995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="10806">
+<interface name="corenet_tcp_bind_audit_port" lineno="11350">
 <summary>
 Bind TCP sockets to the audit port.
 </summary>
@@ -16927,7 +17006,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_audit_port" lineno="10826">
+<interface name="corenet_udp_bind_audit_port" lineno="11370">
 <summary>
 Bind UDP sockets to the audit port.
 </summary>
@@ -16938,7 +17017,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="10845">
+<interface name="corenet_tcp_connect_audit_port" lineno="11389">
 <summary>
 Make a TCP connection to the audit port.
 </summary>
@@ -16948,7 +17027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_client_packets" lineno="10865">
+<interface name="corenet_send_audit_client_packets" lineno="11409">
 <summary>
 Send audit_client packets.
 </summary>
@@ -16959,7 +17038,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="10884">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
 <summary>
 Do not audit attempts to send audit_client packets.
 </summary>
@@ -16970,7 +17049,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_client_packets" lineno="10903">
+<interface name="corenet_receive_audit_client_packets" lineno="11447">
 <summary>
 Receive audit_client packets.
 </summary>
@@ -16981,7 +17060,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10922">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
 <summary>
 Do not audit attempts to receive audit_client packets.
 </summary>
@@ -16992,7 +17071,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="10941">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
 <summary>
 Send and receive audit_client packets.
 </summary>
@@ -17003,7 +17082,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10957">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
 <summary>
 Do not audit attempts to send and receive audit_client packets.
 </summary>
@@ -17014,7 +17093,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="10972">
+<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
 <summary>
 Relabel packets to audit_client the packet type.
 </summary>
@@ -17024,7 +17103,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_server_packets" lineno="10992">
+<interface name="corenet_send_audit_server_packets" lineno="11536">
 <summary>
 Send audit_server packets.
 </summary>
@@ -17035,7 +17114,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11011">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
 <summary>
 Do not audit attempts to send audit_server packets.
 </summary>
@@ -17046,7 +17125,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11030">
+<interface name="corenet_receive_audit_server_packets" lineno="11574">
 <summary>
 Receive audit_server packets.
 </summary>
@@ -17057,7 +17136,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11049">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
 <summary>
 Do not audit attempts to receive audit_server packets.
 </summary>
@@ -17068,7 +17147,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11068">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
 <summary>
 Send and receive audit_server packets.
 </summary>
@@ -17079,7 +17158,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11084">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
 <summary>
 Do not audit attempts to send and receive audit_server packets.
 </summary>
@@ -17090,7 +17169,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11099">
+<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
 <summary>
 Relabel packets to audit_server the packet type.
 </summary>
@@ -17100,7 +17179,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11121">
+<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
 <summary>
 Send and receive TCP traffic on the auth port.
 </summary>
@@ -17111,7 +17190,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_auth_port" lineno="11136">
+<interface name="corenet_udp_send_auth_port" lineno="11680">
 <summary>
 Send UDP traffic on the auth port.
 </summary>
@@ -17122,7 +17201,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11151">
+<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
 <summary>
 Do not audit attempts to send UDP traffic on the auth port.
 </summary>
@@ -17133,7 +17212,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11166">
+<interface name="corenet_udp_receive_auth_port" lineno="11710">
 <summary>
 Receive UDP traffic on the auth port.
 </summary>
@@ -17144,7 +17223,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11181">
+<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
 <summary>
 Do not audit attempts to receive UDP traffic on the auth port.
 </summary>
@@ -17155,7 +17234,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11196">
+<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
 <summary>
 Send and receive UDP traffic on the auth port.
 </summary>
@@ -17166,7 +17245,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11212">
+<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the auth port.
@@ -17178,7 +17257,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11227">
+<interface name="corenet_tcp_bind_auth_port" lineno="11771">
 <summary>
 Bind TCP sockets to the auth port.
 </summary>
@@ -17189,7 +17268,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11247">
+<interface name="corenet_udp_bind_auth_port" lineno="11791">
 <summary>
 Bind UDP sockets to the auth port.
 </summary>
@@ -17200,7 +17279,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11266">
+<interface name="corenet_tcp_connect_auth_port" lineno="11810">
 <summary>
 Make a TCP connection to the auth port.
 </summary>
@@ -17210,7 +17289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_client_packets" lineno="11286">
+<interface name="corenet_send_auth_client_packets" lineno="11830">
 <summary>
 Send auth_client packets.
 </summary>
@@ -17221,7 +17300,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11305">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
 <summary>
 Do not audit attempts to send auth_client packets.
 </summary>
@@ -17232,7 +17311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11324">
+<interface name="corenet_receive_auth_client_packets" lineno="11868">
 <summary>
 Receive auth_client packets.
 </summary>
@@ -17243,7 +17322,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11343">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
 <summary>
 Do not audit attempts to receive auth_client packets.
 </summary>
@@ -17254,7 +17333,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11362">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
 <summary>
 Send and receive auth_client packets.
 </summary>
@@ -17265,7 +17344,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11378">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
 <summary>
 Do not audit attempts to send and receive auth_client packets.
 </summary>
@@ -17276,7 +17355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11393">
+<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
 <summary>
 Relabel packets to auth_client the packet type.
 </summary>
@@ -17286,7 +17365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_server_packets" lineno="11413">
+<interface name="corenet_send_auth_server_packets" lineno="11957">
 <summary>
 Send auth_server packets.
 </summary>
@@ -17297,7 +17376,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11432">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
 <summary>
 Do not audit attempts to send auth_server packets.
 </summary>
@@ -17308,7 +17387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_server_packets" lineno="11451">
+<interface name="corenet_receive_auth_server_packets" lineno="11995">
 <summary>
 Receive auth_server packets.
 </summary>
@@ -17319,7 +17398,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11470">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
 <summary>
 Do not audit attempts to receive auth_server packets.
 </summary>
@@ -17330,7 +17409,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="11489">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
 <summary>
 Send and receive auth_server packets.
 </summary>
@@ -17341,7 +17420,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11505">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
 <summary>
 Do not audit attempts to send and receive auth_server packets.
 </summary>
@@ -17352,7 +17431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="11520">
+<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
 <summary>
 Relabel packets to auth_server the packet type.
 </summary>
@@ -17362,7 +17441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="11542">
+<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
 <summary>
 Send and receive TCP traffic on the bgp port.
 </summary>
@@ -17373,7 +17452,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_bgp_port" lineno="11557">
+<interface name="corenet_udp_send_bgp_port" lineno="12101">
 <summary>
 Send UDP traffic on the bgp port.
 </summary>
@@ -17384,7 +17463,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11572">
+<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
 <summary>
 Do not audit attempts to send UDP traffic on the bgp port.
 </summary>
@@ -17395,7 +17474,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="11587">
+<interface name="corenet_udp_receive_bgp_port" lineno="12131">
 <summary>
 Receive UDP traffic on the bgp port.
 </summary>
@@ -17406,7 +17485,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11602">
+<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
 <summary>
 Do not audit attempts to receive UDP traffic on the bgp port.
 </summary>
@@ -17417,7 +17496,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="11617">
+<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
 <summary>
 Send and receive UDP traffic on the bgp port.
 </summary>
@@ -17428,7 +17507,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11633">
+<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the bgp port.
@@ -17440,7 +17519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="11648">
+<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
 <summary>
 Bind TCP sockets to the bgp port.
 </summary>
@@ -17451,7 +17530,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="11668">
+<interface name="corenet_udp_bind_bgp_port" lineno="12212">
 <summary>
 Bind UDP sockets to the bgp port.
 </summary>
@@ -17462,7 +17541,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="11687">
+<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
 <summary>
 Make a TCP connection to the bgp port.
 </summary>
@@ -17472,7 +17551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_client_packets" lineno="11707">
+<interface name="corenet_send_bgp_client_packets" lineno="12251">
 <summary>
 Send bgp_client packets.
 </summary>
@@ -17483,7 +17562,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11726">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
 <summary>
 Do not audit attempts to send bgp_client packets.
 </summary>
@@ -17494,7 +17573,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="11745">
+<interface name="corenet_receive_bgp_client_packets" lineno="12289">
 <summary>
 Receive bgp_client packets.
 </summary>
@@ -17505,7 +17584,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11764">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
 <summary>
 Do not audit attempts to receive bgp_client packets.
 </summary>
@@ -17516,7 +17595,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="11783">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
 <summary>
 Send and receive bgp_client packets.
 </summary>
@@ -17527,7 +17606,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11799">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
 <summary>
 Do not audit attempts to send and receive bgp_client packets.
 </summary>
@@ -17538,7 +17617,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="11814">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
 <summary>
 Relabel packets to bgp_client the packet type.
 </summary>
@@ -17548,7 +17627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_server_packets" lineno="11834">
+<interface name="corenet_send_bgp_server_packets" lineno="12378">
 <summary>
 Send bgp_server packets.
 </summary>
@@ -17559,7 +17638,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11853">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
 <summary>
 Do not audit attempts to send bgp_server packets.
 </summary>
@@ -17570,7 +17649,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="11872">
+<interface name="corenet_receive_bgp_server_packets" lineno="12416">
 <summary>
 Receive bgp_server packets.
 </summary>
@@ -17581,7 +17660,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11891">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
 <summary>
 Do not audit attempts to receive bgp_server packets.
 </summary>
@@ -17592,7 +17671,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="11910">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
 <summary>
 Send and receive bgp_server packets.
 </summary>
@@ -17603,7 +17682,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="11926">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
 <summary>
 Do not audit attempts to send and receive bgp_server packets.
 </summary>
@@ -17614,7 +17693,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="11941">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
 <summary>
 Relabel packets to bgp_server the packet type.
 </summary>
@@ -17624,7 +17703,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="11963">
+<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
 <summary>
 Send and receive TCP traffic on the bitcoin port.
 </summary>
@@ -17635,7 +17714,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="11978">
+<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
 <summary>
 Send UDP traffic on the bitcoin port.
 </summary>
@@ -17646,7 +17725,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="11993">
+<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
 <summary>
 Do not audit attempts to send UDP traffic on the bitcoin port.
 </summary>
@@ -17657,7 +17736,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12008">
+<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
 <summary>
 Receive UDP traffic on the bitcoin port.
 </summary>
@@ -17668,7 +17747,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12023">
+<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
 <summary>
 Do not audit attempts to receive UDP traffic on the bitcoin port.
 </summary>
@@ -17679,7 +17758,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12038">
+<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
 <summary>
 Send and receive UDP traffic on the bitcoin port.
 </summary>
@@ -17690,7 +17769,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12054">
+<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the bitcoin port.
@@ -17702,7 +17781,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12069">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
 <summary>
 Bind TCP sockets to the bitcoin port.
 </summary>
@@ -17713,7 +17792,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12089">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
 <summary>
 Bind UDP sockets to the bitcoin port.
 </summary>
@@ -17724,7 +17803,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12108">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
 <summary>
 Make a TCP connection to the bitcoin port.
 </summary>
@@ -17734,7 +17813,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12128">
+<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
 <summary>
 Send bitcoin_client packets.
 </summary>
@@ -17745,7 +17824,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12147">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
 <summary>
 Do not audit attempts to send bitcoin_client packets.
 </summary>
@@ -17756,7 +17835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12166">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
 <summary>
 Receive bitcoin_client packets.
 </summary>
@@ -17767,7 +17846,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12185">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
 <summary>
 Do not audit attempts to receive bitcoin_client packets.
 </summary>
@@ -17778,7 +17857,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12204">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
 <summary>
 Send and receive bitcoin_client packets.
 </summary>
@@ -17789,7 +17868,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12220">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
 <summary>
 Do not audit attempts to send and receive bitcoin_client packets.
 </summary>
@@ -17800,7 +17879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12235">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
 <summary>
 Relabel packets to bitcoin_client the packet type.
 </summary>
@@ -17810,7 +17889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12255">
+<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
 <summary>
 Send bitcoin_server packets.
 </summary>
@@ -17821,7 +17900,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12274">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
 <summary>
 Do not audit attempts to send bitcoin_server packets.
 </summary>
@@ -17832,7 +17911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12293">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
 <summary>
 Receive bitcoin_server packets.
 </summary>
@@ -17843,7 +17922,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12312">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
 <summary>
 Do not audit attempts to receive bitcoin_server packets.
 </summary>
@@ -17854,7 +17933,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12331">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
 <summary>
 Send and receive bitcoin_server packets.
 </summary>
@@ -17865,7 +17944,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12347">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
 <summary>
 Do not audit attempts to send and receive bitcoin_server packets.
 </summary>
@@ -17876,7 +17955,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12362">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
 <summary>
 Relabel packets to bitcoin_server the packet type.
 </summary>
@@ -17886,7 +17965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12384">
+<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
 <summary>
 Send and receive TCP traffic on the boinc port.
 </summary>
@@ -17897,7 +17976,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12399">
+<interface name="corenet_udp_send_boinc_port" lineno="12943">
 <summary>
 Send UDP traffic on the boinc port.
 </summary>
@@ -17908,7 +17987,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12414">
+<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
 <summary>
 Do not audit attempts to send UDP traffic on the boinc port.
 </summary>
@@ -17919,7 +17998,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12429">
+<interface name="corenet_udp_receive_boinc_port" lineno="12973">
 <summary>
 Receive UDP traffic on the boinc port.
 </summary>
@@ -17930,7 +18009,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12444">
+<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
 <summary>
 Do not audit attempts to receive UDP traffic on the boinc port.
 </summary>
@@ -17941,7 +18020,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="12459">
+<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
 <summary>
 Send and receive UDP traffic on the boinc port.
 </summary>
@@ -17952,7 +18031,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12475">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the boinc port.
@@ -17964,7 +18043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="12490">
+<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
 <summary>
 Bind TCP sockets to the boinc port.
 </summary>
@@ -17975,7 +18054,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="12510">
+<interface name="corenet_udp_bind_boinc_port" lineno="13054">
 <summary>
 Bind UDP sockets to the boinc port.
 </summary>
@@ -17986,7 +18065,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="12529">
+<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
 <summary>
 Make a TCP connection to the boinc port.
 </summary>
@@ -17996,7 +18075,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_packets" lineno="12549">
+<interface name="corenet_send_boinc_client_packets" lineno="13093">
 <summary>
 Send boinc_client packets.
 </summary>
@@ -18007,7 +18086,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12568">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
 <summary>
 Do not audit attempts to send boinc_client packets.
 </summary>
@@ -18018,7 +18097,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="12587">
+<interface name="corenet_receive_boinc_client_packets" lineno="13131">
 <summary>
 Receive boinc_client packets.
 </summary>
@@ -18029,7 +18108,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12606">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
 <summary>
 Do not audit attempts to receive boinc_client packets.
 </summary>
@@ -18040,7 +18119,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="12625">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
 <summary>
 Send and receive boinc_client packets.
 </summary>
@@ -18051,7 +18130,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12641">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
 <summary>
 Do not audit attempts to send and receive boinc_client packets.
 </summary>
@@ -18062,7 +18141,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="12656">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
 <summary>
 Relabel packets to boinc_client the packet type.
 </summary>
@@ -18072,7 +18151,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_server_packets" lineno="12676">
+<interface name="corenet_send_boinc_server_packets" lineno="13220">
 <summary>
 Send boinc_server packets.
 </summary>
@@ -18083,7 +18162,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12695">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
 <summary>
 Do not audit attempts to send boinc_server packets.
 </summary>
@@ -18094,7 +18173,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="12714">
+<interface name="corenet_receive_boinc_server_packets" lineno="13258">
 <summary>
 Receive boinc_server packets.
 </summary>
@@ -18105,7 +18184,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12733">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
 <summary>
 Do not audit attempts to receive boinc_server packets.
 </summary>
@@ -18116,7 +18195,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="12752">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
 <summary>
 Send and receive boinc_server packets.
 </summary>
@@ -18127,7 +18206,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12768">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
 <summary>
 Do not audit attempts to send and receive boinc_server packets.
 </summary>
@@ -18138,7 +18217,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="12783">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
 <summary>
 Relabel packets to boinc_server the packet type.
 </summary>
@@ -18148,7 +18227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="12805">
+<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
 <summary>
 Send and receive TCP traffic on the boinc_client port.
 </summary>
@@ -18159,7 +18238,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="12820">
+<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
 <summary>
 Send UDP traffic on the boinc_client port.
 </summary>
@@ -18170,7 +18249,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="12835">
+<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
 <summary>
 Do not audit attempts to send UDP traffic on the boinc_client port.
 </summary>
@@ -18181,7 +18260,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="12850">
+<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
 <summary>
 Receive UDP traffic on the boinc_client port.
 </summary>
@@ -18192,7 +18271,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="12865">
+<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
 <summary>
 Do not audit attempts to receive UDP traffic on the boinc_client port.
 </summary>
@@ -18203,7 +18282,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="12880">
+<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
 <summary>
 Send and receive UDP traffic on the boinc_client port.
 </summary>
@@ -18214,7 +18293,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="12896">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the boinc_client port.
@@ -18226,7 +18305,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="12911">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
 <summary>
 Bind TCP sockets to the boinc_client port.
 </summary>
@@ -18237,7 +18316,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="12931">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
 <summary>
 Bind UDP sockets to the boinc_client port.
 </summary>
@@ -18248,7 +18327,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="12950">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
 <summary>
 Make a TCP connection to the boinc_client port.
 </summary>
@@ -18258,7 +18337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="12970">
+<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
 <summary>
 Send boinc_client_client packets.
 </summary>
@@ -18269,7 +18348,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="12989">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
 <summary>
 Do not audit attempts to send boinc_client_client packets.
 </summary>
@@ -18280,7 +18359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13008">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
 <summary>
 Receive boinc_client_client packets.
 </summary>
@@ -18291,7 +18370,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13027">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
 <summary>
 Do not audit attempts to receive boinc_client_client packets.
 </summary>
@@ -18302,7 +18381,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13046">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
 <summary>
 Send and receive boinc_client_client packets.
 </summary>
@@ -18313,7 +18392,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13062">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
 <summary>
 Do not audit attempts to send and receive boinc_client_client packets.
 </summary>
@@ -18324,7 +18403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13077">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
 <summary>
 Relabel packets to boinc_client_client the packet type.
 </summary>
@@ -18334,7 +18413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13097">
+<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
 <summary>
 Send boinc_client_server packets.
 </summary>
@@ -18345,7 +18424,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13116">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
 <summary>
 Do not audit attempts to send boinc_client_server packets.
 </summary>
@@ -18356,7 +18435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13135">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
 <summary>
 Receive boinc_client_server packets.
 </summary>
@@ -18367,7 +18446,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13154">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
 <summary>
 Do not audit attempts to receive boinc_client_server packets.
 </summary>
@@ -18378,7 +18457,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13173">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
 <summary>
 Send and receive boinc_client_server packets.
 </summary>
@@ -18389,7 +18468,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13189">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
 <summary>
 Do not audit attempts to send and receive boinc_client_server packets.
 </summary>
@@ -18400,7 +18479,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13204">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
 <summary>
 Relabel packets to boinc_client_server the packet type.
 </summary>
@@ -18410,7 +18489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13226">
+<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
 <summary>
 Send and receive TCP traffic on the biff port.
 </summary>
@@ -18421,7 +18500,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_biff_port" lineno="13241">
+<interface name="corenet_udp_send_biff_port" lineno="13785">
 <summary>
 Send UDP traffic on the biff port.
 </summary>
@@ -18432,7 +18511,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13256">
+<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
 <summary>
 Do not audit attempts to send UDP traffic on the biff port.
 </summary>
@@ -18443,7 +18522,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13271">
+<interface name="corenet_udp_receive_biff_port" lineno="13815">
 <summary>
 Receive UDP traffic on the biff port.
 </summary>
@@ -18454,7 +18533,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13286">
+<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
 <summary>
 Do not audit attempts to receive UDP traffic on the biff port.
 </summary>
@@ -18465,7 +18544,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13301">
+<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
 <summary>
 Send and receive UDP traffic on the biff port.
 </summary>
@@ -18476,7 +18555,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13317">
+<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the biff port.
@@ -18488,7 +18567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13332">
+<interface name="corenet_tcp_bind_biff_port" lineno="13876">
 <summary>
 Bind TCP sockets to the biff port.
 </summary>
@@ -18499,7 +18578,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13352">
+<interface name="corenet_udp_bind_biff_port" lineno="13896">
 <summary>
 Bind UDP sockets to the biff port.
 </summary>
@@ -18510,7 +18589,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13371">
+<interface name="corenet_tcp_connect_biff_port" lineno="13915">
 <summary>
 Make a TCP connection to the biff port.
 </summary>
@@ -18520,7 +18599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_client_packets" lineno="13391">
+<interface name="corenet_send_biff_client_packets" lineno="13935">
 <summary>
 Send biff_client packets.
 </summary>
@@ -18531,7 +18610,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13410">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
 <summary>
 Do not audit attempts to send biff_client packets.
 </summary>
@@ -18542,7 +18621,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13429">
+<interface name="corenet_receive_biff_client_packets" lineno="13973">
 <summary>
 Receive biff_client packets.
 </summary>
@@ -18553,7 +18632,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13448">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
 <summary>
 Do not audit attempts to receive biff_client packets.
 </summary>
@@ -18564,7 +18643,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="13467">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
 <summary>
 Send and receive biff_client packets.
 </summary>
@@ -18575,7 +18654,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="13483">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
 <summary>
 Do not audit attempts to send and receive biff_client packets.
 </summary>
@@ -18586,7 +18665,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="13498">
+<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
 <summary>
 Relabel packets to biff_client the packet type.
 </summary>
@@ -18596,7 +18675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_server_packets" lineno="13518">
+<interface name="corenet_send_biff_server_packets" lineno="14062">
 <summary>
 Send biff_server packets.
 </summary>
@@ -18607,7 +18686,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="13537">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
 <summary>
 Do not audit attempts to send biff_server packets.
 </summary>
@@ -18618,7 +18697,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_server_packets" lineno="13556">
+<interface name="corenet_receive_biff_server_packets" lineno="14100">
 <summary>
 Receive biff_server packets.
 </summary>
@@ -18629,7 +18708,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="13575">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
 <summary>
 Do not audit attempts to receive biff_server packets.
 </summary>
@@ -18640,7 +18719,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="13594">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
 <summary>
 Send and receive biff_server packets.
 </summary>
@@ -18651,7 +18730,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="13610">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
 <summary>
 Do not audit attempts to send and receive biff_server packets.
 </summary>
@@ -18662,7 +18741,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="13625">
+<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
 <summary>
 Relabel packets to biff_server the packet type.
 </summary>
@@ -18672,7 +18751,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="13647">
+<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
 <summary>
 Send and receive TCP traffic on the certmaster port.
 </summary>
@@ -18683,7 +18762,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="13662">
+<interface name="corenet_udp_send_certmaster_port" lineno="14206">
 <summary>
 Send UDP traffic on the certmaster port.
 </summary>
@@ -18694,7 +18773,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="13677">
+<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
 <summary>
 Do not audit attempts to send UDP traffic on the certmaster port.
 </summary>
@@ -18705,7 +18784,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="13692">
+<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
 <summary>
 Receive UDP traffic on the certmaster port.
 </summary>
@@ -18716,7 +18795,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="13707">
+<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
 <summary>
 Do not audit attempts to receive UDP traffic on the certmaster port.
 </summary>
@@ -18727,7 +18806,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="13722">
+<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
 <summary>
 Send and receive UDP traffic on the certmaster port.
 </summary>
@@ -18738,7 +18817,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="13738">
+<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the certmaster port.
@@ -18750,7 +18829,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="13753">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
 <summary>
 Bind TCP sockets to the certmaster port.
 </summary>
@@ -18761,7 +18840,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="13773">
+<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
 <summary>
 Bind UDP sockets to the certmaster port.
 </summary>
@@ -18772,7 +18851,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="13792">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
 <summary>
 Make a TCP connection to the certmaster port.
 </summary>
@@ -18782,7 +18861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="13812">
+<interface name="corenet_send_certmaster_client_packets" lineno="14356">
 <summary>
 Send certmaster_client packets.
 </summary>
@@ -18793,7 +18872,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="13831">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
 <summary>
 Do not audit attempts to send certmaster_client packets.
 </summary>
@@ -18804,7 +18883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="13850">
+<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
 <summary>
 Receive certmaster_client packets.
 </summary>
@@ -18815,7 +18894,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="13869">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
 <summary>
 Do not audit attempts to receive certmaster_client packets.
 </summary>
@@ -18826,7 +18905,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="13888">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
 <summary>
 Send and receive certmaster_client packets.
 </summary>
@@ -18837,7 +18916,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="13904">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
 <summary>
 Do not audit attempts to send and receive certmaster_client packets.
 </summary>
@@ -18848,7 +18927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="13919">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
 <summary>
 Relabel packets to certmaster_client the packet type.
 </summary>
@@ -18858,7 +18937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="13939">
+<interface name="corenet_send_certmaster_server_packets" lineno="14483">
 <summary>
 Send certmaster_server packets.
 </summary>
@@ -18869,7 +18948,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="13958">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
 <summary>
 Do not audit attempts to send certmaster_server packets.
 </summary>
@@ -18880,7 +18959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="13977">
+<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
 <summary>
 Receive certmaster_server packets.
 </summary>
@@ -18891,7 +18970,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="13996">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
 <summary>
 Do not audit attempts to receive certmaster_server packets.
 </summary>
@@ -18902,7 +18981,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14015">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
 <summary>
 Send and receive certmaster_server packets.
 </summary>
@@ -18913,7 +18992,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14031">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
 <summary>
 Do not audit attempts to send and receive certmaster_server packets.
 </summary>
@@ -18924,7 +19003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14046">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
 <summary>
 Relabel packets to certmaster_server the packet type.
 </summary>
@@ -18934,7 +19013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14068">
+<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
 <summary>
 Send and receive TCP traffic on the chronyd port.
 </summary>
@@ -18945,7 +19024,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14083">
+<interface name="corenet_udp_send_chronyd_port" lineno="14627">
 <summary>
 Send UDP traffic on the chronyd port.
 </summary>
@@ -18956,7 +19035,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14098">
+<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
 <summary>
 Do not audit attempts to send UDP traffic on the chronyd port.
 </summary>
@@ -18967,7 +19046,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14113">
+<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
 <summary>
 Receive UDP traffic on the chronyd port.
 </summary>
@@ -18978,7 +19057,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14128">
+<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
 <summary>
 Do not audit attempts to receive UDP traffic on the chronyd port.
 </summary>
@@ -18989,7 +19068,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14143">
+<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
 <summary>
 Send and receive UDP traffic on the chronyd port.
 </summary>
@@ -19000,7 +19079,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14159">
+<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the chronyd port.
@@ -19012,7 +19091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14174">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
 <summary>
 Bind TCP sockets to the chronyd port.
 </summary>
@@ -19023,7 +19102,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14194">
+<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
 <summary>
 Bind UDP sockets to the chronyd port.
 </summary>
@@ -19034,7 +19113,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14213">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
 <summary>
 Make a TCP connection to the chronyd port.
 </summary>
@@ -19044,7 +19123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14233">
+<interface name="corenet_send_chronyd_client_packets" lineno="14777">
 <summary>
 Send chronyd_client packets.
 </summary>
@@ -19055,7 +19134,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14252">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
 <summary>
 Do not audit attempts to send chronyd_client packets.
 </summary>
@@ -19066,7 +19145,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14271">
+<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
 <summary>
 Receive chronyd_client packets.
 </summary>
@@ -19077,7 +19156,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14290">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
 <summary>
 Do not audit attempts to receive chronyd_client packets.
 </summary>
@@ -19088,7 +19167,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14309">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
 <summary>
 Send and receive chronyd_client packets.
 </summary>
@@ -19099,7 +19178,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14325">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
 <summary>
 Do not audit attempts to send and receive chronyd_client packets.
 </summary>
@@ -19110,7 +19189,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14340">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
 <summary>
 Relabel packets to chronyd_client the packet type.
 </summary>
@@ -19120,7 +19199,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14360">
+<interface name="corenet_send_chronyd_server_packets" lineno="14904">
 <summary>
 Send chronyd_server packets.
 </summary>
@@ -19131,7 +19210,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14379">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
 <summary>
 Do not audit attempts to send chronyd_server packets.
 </summary>
@@ -19142,7 +19221,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14398">
+<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
 <summary>
 Receive chronyd_server packets.
 </summary>
@@ -19153,7 +19232,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14417">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
 <summary>
 Do not audit attempts to receive chronyd_server packets.
 </summary>
@@ -19164,7 +19243,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14436">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
 <summary>
 Send and receive chronyd_server packets.
 </summary>
@@ -19175,7 +19254,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14452">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
 <summary>
 Do not audit attempts to send and receive chronyd_server packets.
 </summary>
@@ -19186,7 +19265,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="14467">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
 <summary>
 Relabel packets to chronyd_server the packet type.
 </summary>
@@ -19196,7 +19275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="14489">
+<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
 <summary>
 Send and receive TCP traffic on the clamd port.
 </summary>
@@ -19207,7 +19286,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_clamd_port" lineno="14504">
+<interface name="corenet_udp_send_clamd_port" lineno="15048">
 <summary>
 Send UDP traffic on the clamd port.
 </summary>
@@ -19218,7 +19297,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14519">
+<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
 <summary>
 Do not audit attempts to send UDP traffic on the clamd port.
 </summary>
@@ -19229,7 +19308,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="14534">
+<interface name="corenet_udp_receive_clamd_port" lineno="15078">
 <summary>
 Receive UDP traffic on the clamd port.
 </summary>
@@ -19240,7 +19319,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14549">
+<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
 <summary>
 Do not audit attempts to receive UDP traffic on the clamd port.
 </summary>
@@ -19251,7 +19330,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="14564">
+<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
 <summary>
 Send and receive UDP traffic on the clamd port.
 </summary>
@@ -19262,7 +19341,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14580">
+<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the clamd port.
@@ -19274,7 +19353,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="14595">
+<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
 <summary>
 Bind TCP sockets to the clamd port.
 </summary>
@@ -19285,7 +19364,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="14615">
+<interface name="corenet_udp_bind_clamd_port" lineno="15159">
 <summary>
 Bind UDP sockets to the clamd port.
 </summary>
@@ -19296,7 +19375,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="14634">
+<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
 <summary>
 Make a TCP connection to the clamd port.
 </summary>
@@ -19306,7 +19385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_client_packets" lineno="14654">
+<interface name="corenet_send_clamd_client_packets" lineno="15198">
 <summary>
 Send clamd_client packets.
 </summary>
@@ -19317,7 +19396,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14673">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
 <summary>
 Do not audit attempts to send clamd_client packets.
 </summary>
@@ -19328,7 +19407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="14692">
+<interface name="corenet_receive_clamd_client_packets" lineno="15236">
 <summary>
 Receive clamd_client packets.
 </summary>
@@ -19339,7 +19418,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14711">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
 <summary>
 Do not audit attempts to receive clamd_client packets.
 </summary>
@@ -19350,7 +19429,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="14730">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
 <summary>
 Send and receive clamd_client packets.
 </summary>
@@ -19361,7 +19440,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14746">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
 <summary>
 Do not audit attempts to send and receive clamd_client packets.
 </summary>
@@ -19372,7 +19451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="14761">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
 <summary>
 Relabel packets to clamd_client the packet type.
 </summary>
@@ -19382,7 +19461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_server_packets" lineno="14781">
+<interface name="corenet_send_clamd_server_packets" lineno="15325">
 <summary>
 Send clamd_server packets.
 </summary>
@@ -19393,7 +19472,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14800">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
 <summary>
 Do not audit attempts to send clamd_server packets.
 </summary>
@@ -19404,7 +19483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="14819">
+<interface name="corenet_receive_clamd_server_packets" lineno="15363">
 <summary>
 Receive clamd_server packets.
 </summary>
@@ -19415,7 +19494,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14838">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
 <summary>
 Do not audit attempts to receive clamd_server packets.
 </summary>
@@ -19426,7 +19505,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="14857">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
 <summary>
 Send and receive clamd_server packets.
 </summary>
@@ -19437,7 +19516,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14873">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
 <summary>
 Do not audit attempts to send and receive clamd_server packets.
 </summary>
@@ -19448,7 +19527,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="14888">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
 <summary>
 Relabel packets to clamd_server the packet type.
 </summary>
@@ -19458,7 +19537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14910">
+<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
 <summary>
 Send and receive TCP traffic on the clockspeed port.
 </summary>
@@ -19469,7 +19548,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="14925">
+<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
 <summary>
 Send UDP traffic on the clockspeed port.
 </summary>
@@ -19480,7 +19559,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14940">
+<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
 <summary>
 Do not audit attempts to send UDP traffic on the clockspeed port.
 </summary>
@@ -19491,7 +19570,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="14955">
+<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
 <summary>
 Receive UDP traffic on the clockspeed port.
 </summary>
@@ -19502,7 +19581,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14970">
+<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
 <summary>
 Do not audit attempts to receive UDP traffic on the clockspeed port.
 </summary>
@@ -19513,7 +19592,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14985">
+<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
 <summary>
 Send and receive UDP traffic on the clockspeed port.
 </summary>
@@ -19524,7 +19603,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15001">
+<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the clockspeed port.
@@ -19536,7 +19615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15016">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
 <summary>
 Bind TCP sockets to the clockspeed port.
 </summary>
@@ -19547,7 +19626,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15036">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
 <summary>
 Bind UDP sockets to the clockspeed port.
 </summary>
@@ -19558,7 +19637,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15055">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
 <summary>
 Make a TCP connection to the clockspeed port.
 </summary>
@@ -19568,7 +19647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15075">
+<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
 <summary>
 Send clockspeed_client packets.
 </summary>
@@ -19579,7 +19658,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15094">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
 <summary>
 Do not audit attempts to send clockspeed_client packets.
 </summary>
@@ -19590,7 +19669,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15113">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
 <summary>
 Receive clockspeed_client packets.
 </summary>
@@ -19601,7 +19680,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15132">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
 <summary>
 Do not audit attempts to receive clockspeed_client packets.
 </summary>
@@ -19612,7 +19691,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15151">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
 <summary>
 Send and receive clockspeed_client packets.
 </summary>
@@ -19623,7 +19702,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15167">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
 <summary>
 Do not audit attempts to send and receive clockspeed_client packets.
 </summary>
@@ -19634,7 +19713,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15182">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
 <summary>
 Relabel packets to clockspeed_client the packet type.
 </summary>
@@ -19644,7 +19723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15202">
+<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
 <summary>
 Send clockspeed_server packets.
 </summary>
@@ -19655,7 +19734,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15221">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
 <summary>
 Do not audit attempts to send clockspeed_server packets.
 </summary>
@@ -19666,7 +19745,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15240">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
 <summary>
 Receive clockspeed_server packets.
 </summary>
@@ -19677,7 +19756,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15259">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
 <summary>
 Do not audit attempts to receive clockspeed_server packets.
 </summary>
@@ -19688,7 +19767,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15278">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
 <summary>
 Send and receive clockspeed_server packets.
 </summary>
@@ -19699,7 +19778,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15294">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
 <summary>
 Do not audit attempts to send and receive clockspeed_server packets.
 </summary>
@@ -19710,7 +19789,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15309">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
 <summary>
 Relabel packets to clockspeed_server the packet type.
 </summary>
@@ -19720,7 +19799,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15331">
+<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
 <summary>
 Send and receive TCP traffic on the cluster port.
 </summary>
@@ -19731,7 +19810,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15346">
+<interface name="corenet_udp_send_cluster_port" lineno="15890">
 <summary>
 Send UDP traffic on the cluster port.
 </summary>
@@ -19742,7 +19821,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15361">
+<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
 <summary>
 Do not audit attempts to send UDP traffic on the cluster port.
 </summary>
@@ -19753,7 +19832,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15376">
+<interface name="corenet_udp_receive_cluster_port" lineno="15920">
 <summary>
 Receive UDP traffic on the cluster port.
 </summary>
@@ -19764,7 +19843,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15391">
+<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
 <summary>
 Do not audit attempts to receive UDP traffic on the cluster port.
 </summary>
@@ -19775,7 +19854,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15406">
+<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
 <summary>
 Send and receive UDP traffic on the cluster port.
 </summary>
@@ -19786,7 +19865,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15422">
+<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cluster port.
@@ -19798,7 +19877,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15437">
+<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
 <summary>
 Bind TCP sockets to the cluster port.
 </summary>
@@ -19809,7 +19888,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="15457">
+<interface name="corenet_udp_bind_cluster_port" lineno="16001">
 <summary>
 Bind UDP sockets to the cluster port.
 </summary>
@@ -19820,7 +19899,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="15476">
+<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
 <summary>
 Make a TCP connection to the cluster port.
 </summary>
@@ -19830,7 +19909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_client_packets" lineno="15496">
+<interface name="corenet_send_cluster_client_packets" lineno="16040">
 <summary>
 Send cluster_client packets.
 </summary>
@@ -19841,7 +19920,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15515">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
 <summary>
 Do not audit attempts to send cluster_client packets.
 </summary>
@@ -19852,7 +19931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="15534">
+<interface name="corenet_receive_cluster_client_packets" lineno="16078">
 <summary>
 Receive cluster_client packets.
 </summary>
@@ -19863,7 +19942,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15553">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
 <summary>
 Do not audit attempts to receive cluster_client packets.
 </summary>
@@ -19874,7 +19953,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="15572">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
 <summary>
 Send and receive cluster_client packets.
 </summary>
@@ -19885,7 +19964,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15588">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
 <summary>
 Do not audit attempts to send and receive cluster_client packets.
 </summary>
@@ -19896,7 +19975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="15603">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
 <summary>
 Relabel packets to cluster_client the packet type.
 </summary>
@@ -19906,7 +19985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_server_packets" lineno="15623">
+<interface name="corenet_send_cluster_server_packets" lineno="16167">
 <summary>
 Send cluster_server packets.
 </summary>
@@ -19917,7 +19996,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15642">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
 <summary>
 Do not audit attempts to send cluster_server packets.
 </summary>
@@ -19928,7 +20007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="15661">
+<interface name="corenet_receive_cluster_server_packets" lineno="16205">
 <summary>
 Receive cluster_server packets.
 </summary>
@@ -19939,7 +20018,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15680">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
 <summary>
 Do not audit attempts to receive cluster_server packets.
 </summary>
@@ -19950,7 +20029,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="15699">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
 <summary>
 Send and receive cluster_server packets.
 </summary>
@@ -19961,7 +20040,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15715">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
 <summary>
 Do not audit attempts to send and receive cluster_server packets.
 </summary>
@@ -19972,7 +20051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="15730">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
 <summary>
 Relabel packets to cluster_server the packet type.
 </summary>
@@ -19982,7 +20061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="15752">
+<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
 <summary>
 Send and receive TCP traffic on the cma port.
 </summary>
@@ -19993,7 +20072,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cma_port" lineno="15767">
+<interface name="corenet_udp_send_cma_port" lineno="16311">
 <summary>
 Send UDP traffic on the cma port.
 </summary>
@@ -20004,7 +20083,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="15782">
+<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
 <summary>
 Do not audit attempts to send UDP traffic on the cma port.
 </summary>
@@ -20015,7 +20094,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cma_port" lineno="15797">
+<interface name="corenet_udp_receive_cma_port" lineno="16341">
 <summary>
 Receive UDP traffic on the cma port.
 </summary>
@@ -20026,7 +20105,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15812">
+<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
 <summary>
 Do not audit attempts to receive UDP traffic on the cma port.
 </summary>
@@ -20037,7 +20116,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="15827">
+<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
 <summary>
 Send and receive UDP traffic on the cma port.
 </summary>
@@ -20048,7 +20127,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15843">
+<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cma port.
@@ -20060,7 +20139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="15858">
+<interface name="corenet_tcp_bind_cma_port" lineno="16402">
 <summary>
 Bind TCP sockets to the cma port.
 </summary>
@@ -20071,7 +20150,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cma_port" lineno="15878">
+<interface name="corenet_udp_bind_cma_port" lineno="16422">
 <summary>
 Bind UDP sockets to the cma port.
 </summary>
@@ -20082,7 +20161,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="15897">
+<interface name="corenet_tcp_connect_cma_port" lineno="16441">
 <summary>
 Make a TCP connection to the cma port.
 </summary>
@@ -20092,7 +20171,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_client_packets" lineno="15917">
+<interface name="corenet_send_cma_client_packets" lineno="16461">
 <summary>
 Send cma_client packets.
 </summary>
@@ -20103,7 +20182,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="15936">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
 <summary>
 Do not audit attempts to send cma_client packets.
 </summary>
@@ -20114,7 +20193,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_client_packets" lineno="15955">
+<interface name="corenet_receive_cma_client_packets" lineno="16499">
 <summary>
 Receive cma_client packets.
 </summary>
@@ -20125,7 +20204,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15974">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
 <summary>
 Do not audit attempts to receive cma_client packets.
 </summary>
@@ -20136,7 +20215,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="15993">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
 <summary>
 Send and receive cma_client packets.
 </summary>
@@ -20147,7 +20226,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16009">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
 <summary>
 Do not audit attempts to send and receive cma_client packets.
 </summary>
@@ -20158,7 +20237,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16024">
+<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
 <summary>
 Relabel packets to cma_client the packet type.
 </summary>
@@ -20168,7 +20247,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_server_packets" lineno="16044">
+<interface name="corenet_send_cma_server_packets" lineno="16588">
 <summary>
 Send cma_server packets.
 </summary>
@@ -20179,7 +20258,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16063">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
 <summary>
 Do not audit attempts to send cma_server packets.
 </summary>
@@ -20190,7 +20269,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16082">
+<interface name="corenet_receive_cma_server_packets" lineno="16626">
 <summary>
 Receive cma_server packets.
 </summary>
@@ -20201,7 +20280,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16101">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
 <summary>
 Do not audit attempts to receive cma_server packets.
 </summary>
@@ -20212,7 +20291,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16120">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
 <summary>
 Send and receive cma_server packets.
 </summary>
@@ -20223,7 +20302,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16136">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
 <summary>
 Do not audit attempts to send and receive cma_server packets.
 </summary>
@@ -20234,7 +20313,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16151">
+<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
 <summary>
 Relabel packets to cma_server the packet type.
 </summary>
@@ -20244,7 +20323,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16173">
+<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
 <summary>
 Send and receive TCP traffic on the cobbler port.
 </summary>
@@ -20255,7 +20334,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16188">
+<interface name="corenet_udp_send_cobbler_port" lineno="16732">
 <summary>
 Send UDP traffic on the cobbler port.
 </summary>
@@ -20266,7 +20345,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16203">
+<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
 <summary>
 Do not audit attempts to send UDP traffic on the cobbler port.
 </summary>
@@ -20277,7 +20356,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16218">
+<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
 <summary>
 Receive UDP traffic on the cobbler port.
 </summary>
@@ -20288,7 +20367,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16233">
+<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
 <summary>
 Do not audit attempts to receive UDP traffic on the cobbler port.
 </summary>
@@ -20299,7 +20378,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16248">
+<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
 <summary>
 Send and receive UDP traffic on the cobbler port.
 </summary>
@@ -20310,7 +20389,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16264">
+<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cobbler port.
@@ -20322,7 +20401,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16279">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
 <summary>
 Bind TCP sockets to the cobbler port.
 </summary>
@@ -20333,7 +20412,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16299">
+<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
 <summary>
 Bind UDP sockets to the cobbler port.
 </summary>
@@ -20344,7 +20423,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16318">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
 <summary>
 Make a TCP connection to the cobbler port.
 </summary>
@@ -20354,7 +20433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16338">
+<interface name="corenet_send_cobbler_client_packets" lineno="16882">
 <summary>
 Send cobbler_client packets.
 </summary>
@@ -20365,7 +20444,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16357">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
 <summary>
 Do not audit attempts to send cobbler_client packets.
 </summary>
@@ -20376,7 +20455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16376">
+<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
 <summary>
 Receive cobbler_client packets.
 </summary>
@@ -20387,7 +20466,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16395">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
 <summary>
 Do not audit attempts to receive cobbler_client packets.
 </summary>
@@ -20398,7 +20477,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16414">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
 <summary>
 Send and receive cobbler_client packets.
 </summary>
@@ -20409,7 +20488,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16430">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
 <summary>
 Do not audit attempts to send and receive cobbler_client packets.
 </summary>
@@ -20420,7 +20499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="16445">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
 <summary>
 Relabel packets to cobbler_client the packet type.
 </summary>
@@ -20430,7 +20509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="16465">
+<interface name="corenet_send_cobbler_server_packets" lineno="17009">
 <summary>
 Send cobbler_server packets.
 </summary>
@@ -20441,7 +20520,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16484">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
 <summary>
 Do not audit attempts to send cobbler_server packets.
 </summary>
@@ -20452,7 +20531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="16503">
+<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
 <summary>
 Receive cobbler_server packets.
 </summary>
@@ -20463,7 +20542,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16522">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
 <summary>
 Do not audit attempts to receive cobbler_server packets.
 </summary>
@@ -20474,7 +20553,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="16541">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
 <summary>
 Send and receive cobbler_server packets.
 </summary>
@@ -20485,7 +20564,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16557">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
 <summary>
 Do not audit attempts to send and receive cobbler_server packets.
 </summary>
@@ -20496,7 +20575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="16572">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
 <summary>
 Relabel packets to cobbler_server the packet type.
 </summary>
@@ -20506,7 +20585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="16594">
+<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
 <summary>
 Send and receive TCP traffic on the commplex_link port.
 </summary>
@@ -20517,7 +20596,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="16609">
+<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
 <summary>
 Send UDP traffic on the commplex_link port.
 </summary>
@@ -20528,7 +20607,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="16624">
+<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
 <summary>
 Do not audit attempts to send UDP traffic on the commplex_link port.
 </summary>
@@ -20539,7 +20618,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="16639">
+<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
 <summary>
 Receive UDP traffic on the commplex_link port.
 </summary>
@@ -20550,7 +20629,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="16654">
+<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
 <summary>
 Do not audit attempts to receive UDP traffic on the commplex_link port.
 </summary>
@@ -20561,7 +20640,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="16669">
+<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
 <summary>
 Send and receive UDP traffic on the commplex_link port.
 </summary>
@@ -20572,7 +20651,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="16685">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the commplex_link port.
@@ -20584,7 +20663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="16700">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
 <summary>
 Bind TCP sockets to the commplex_link port.
 </summary>
@@ -20595,7 +20674,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="16720">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
 <summary>
 Bind UDP sockets to the commplex_link port.
 </summary>
@@ -20606,7 +20685,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="16739">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
 <summary>
 Make a TCP connection to the commplex_link port.
 </summary>
@@ -20616,7 +20695,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="16759">
+<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
 <summary>
 Send commplex_link_client packets.
 </summary>
@@ -20627,7 +20706,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="16778">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
 <summary>
 Do not audit attempts to send commplex_link_client packets.
 </summary>
@@ -20638,7 +20717,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="16797">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
 <summary>
 Receive commplex_link_client packets.
 </summary>
@@ -20649,7 +20728,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="16816">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
 <summary>
 Do not audit attempts to receive commplex_link_client packets.
 </summary>
@@ -20660,7 +20739,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="16835">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
 <summary>
 Send and receive commplex_link_client packets.
 </summary>
@@ -20671,7 +20750,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="16851">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
 <summary>
 Do not audit attempts to send and receive commplex_link_client packets.
 </summary>
@@ -20682,7 +20761,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="16866">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
 <summary>
 Relabel packets to commplex_link_client the packet type.
 </summary>
@@ -20692,7 +20771,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="16886">
+<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
 <summary>
 Send commplex_link_server packets.
 </summary>
@@ -20703,7 +20782,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="16905">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
 <summary>
 Do not audit attempts to send commplex_link_server packets.
 </summary>
@@ -20714,7 +20793,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="16924">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
 <summary>
 Receive commplex_link_server packets.
 </summary>
@@ -20725,7 +20804,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="16943">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
 <summary>
 Do not audit attempts to receive commplex_link_server packets.
 </summary>
@@ -20736,7 +20815,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="16962">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
 <summary>
 Send and receive commplex_link_server packets.
 </summary>
@@ -20747,7 +20826,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="16978">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
 <summary>
 Do not audit attempts to send and receive commplex_link_server packets.
 </summary>
@@ -20758,7 +20837,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="16993">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
 <summary>
 Relabel packets to commplex_link_server the packet type.
 </summary>
@@ -20768,7 +20847,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17015">
+<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
 <summary>
 Send and receive TCP traffic on the commplex_main port.
 </summary>
@@ -20779,7 +20858,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17030">
+<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
 <summary>
 Send UDP traffic on the commplex_main port.
 </summary>
@@ -20790,7 +20869,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17045">
+<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
 <summary>
 Do not audit attempts to send UDP traffic on the commplex_main port.
 </summary>
@@ -20801,7 +20880,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17060">
+<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
 <summary>
 Receive UDP traffic on the commplex_main port.
 </summary>
@@ -20812,7 +20891,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17075">
+<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
 <summary>
 Do not audit attempts to receive UDP traffic on the commplex_main port.
 </summary>
@@ -20823,7 +20902,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17090">
+<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
 <summary>
 Send and receive UDP traffic on the commplex_main port.
 </summary>
@@ -20834,7 +20913,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17106">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the commplex_main port.
@@ -20846,7 +20925,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17121">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
 <summary>
 Bind TCP sockets to the commplex_main port.
 </summary>
@@ -20857,7 +20936,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17141">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
 <summary>
 Bind UDP sockets to the commplex_main port.
 </summary>
@@ -20868,7 +20947,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17160">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
 <summary>
 Make a TCP connection to the commplex_main port.
 </summary>
@@ -20878,7 +20957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17180">
+<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
 <summary>
 Send commplex_main_client packets.
 </summary>
@@ -20889,7 +20968,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17199">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
 <summary>
 Do not audit attempts to send commplex_main_client packets.
 </summary>
@@ -20900,7 +20979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17218">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
 <summary>
 Receive commplex_main_client packets.
 </summary>
@@ -20911,7 +20990,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17237">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
 <summary>
 Do not audit attempts to receive commplex_main_client packets.
 </summary>
@@ -20922,7 +21001,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17256">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
 <summary>
 Send and receive commplex_main_client packets.
 </summary>
@@ -20933,7 +21012,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17272">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
 <summary>
 Do not audit attempts to send and receive commplex_main_client packets.
 </summary>
@@ -20944,7 +21023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17287">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
 <summary>
 Relabel packets to commplex_main_client the packet type.
 </summary>
@@ -20954,7 +21033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17307">
+<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
 <summary>
 Send commplex_main_server packets.
 </summary>
@@ -20965,7 +21044,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17326">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
 <summary>
 Do not audit attempts to send commplex_main_server packets.
 </summary>
@@ -20976,7 +21055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17345">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
 <summary>
 Receive commplex_main_server packets.
 </summary>
@@ -20987,7 +21066,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17364">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
 <summary>
 Do not audit attempts to receive commplex_main_server packets.
 </summary>
@@ -20998,7 +21077,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17383">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
 <summary>
 Send and receive commplex_main_server packets.
 </summary>
@@ -21009,7 +21088,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17399">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
 <summary>
 Do not audit attempts to send and receive commplex_main_server packets.
 </summary>
@@ -21020,7 +21099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17414">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
 <summary>
 Relabel packets to commplex_main_server the packet type.
 </summary>
@@ -21030,7 +21109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17436">
+<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
 <summary>
 Send and receive TCP traffic on the comsat port.
 </summary>
@@ -21041,7 +21120,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_comsat_port" lineno="17451">
+<interface name="corenet_udp_send_comsat_port" lineno="17995">
 <summary>
 Send UDP traffic on the comsat port.
 </summary>
@@ -21052,7 +21131,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="17466">
+<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
 <summary>
 Do not audit attempts to send UDP traffic on the comsat port.
 </summary>
@@ -21063,7 +21142,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="17481">
+<interface name="corenet_udp_receive_comsat_port" lineno="18025">
 <summary>
 Receive UDP traffic on the comsat port.
 </summary>
@@ -21074,7 +21153,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17496">
+<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
 <summary>
 Do not audit attempts to receive UDP traffic on the comsat port.
 </summary>
@@ -21085,7 +21164,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="17511">
+<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
 <summary>
 Send and receive UDP traffic on the comsat port.
 </summary>
@@ -21096,7 +21175,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17527">
+<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the comsat port.
@@ -21108,7 +21187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="17542">
+<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
 <summary>
 Bind TCP sockets to the comsat port.
 </summary>
@@ -21119,7 +21198,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="17562">
+<interface name="corenet_udp_bind_comsat_port" lineno="18106">
 <summary>
 Bind UDP sockets to the comsat port.
 </summary>
@@ -21130,7 +21209,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="17581">
+<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
 <summary>
 Make a TCP connection to the comsat port.
 </summary>
@@ -21140,7 +21219,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_client_packets" lineno="17601">
+<interface name="corenet_send_comsat_client_packets" lineno="18145">
 <summary>
 Send comsat_client packets.
 </summary>
@@ -21151,7 +21230,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17620">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
 <summary>
 Do not audit attempts to send comsat_client packets.
 </summary>
@@ -21162,7 +21241,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="17639">
+<interface name="corenet_receive_comsat_client_packets" lineno="18183">
 <summary>
 Receive comsat_client packets.
 </summary>
@@ -21173,7 +21252,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17658">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
 <summary>
 Do not audit attempts to receive comsat_client packets.
 </summary>
@@ -21184,7 +21263,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="17677">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
 <summary>
 Send and receive comsat_client packets.
 </summary>
@@ -21195,7 +21274,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17693">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
 <summary>
 Do not audit attempts to send and receive comsat_client packets.
 </summary>
@@ -21206,7 +21285,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="17708">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
 <summary>
 Relabel packets to comsat_client the packet type.
 </summary>
@@ -21216,7 +21295,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_server_packets" lineno="17728">
+<interface name="corenet_send_comsat_server_packets" lineno="18272">
 <summary>
 Send comsat_server packets.
 </summary>
@@ -21227,7 +21306,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17747">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
 <summary>
 Do not audit attempts to send comsat_server packets.
 </summary>
@@ -21238,7 +21317,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="17766">
+<interface name="corenet_receive_comsat_server_packets" lineno="18310">
 <summary>
 Receive comsat_server packets.
 </summary>
@@ -21249,7 +21328,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17785">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
 <summary>
 Do not audit attempts to receive comsat_server packets.
 </summary>
@@ -21260,7 +21339,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="17804">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
 <summary>
 Send and receive comsat_server packets.
 </summary>
@@ -21271,7 +21350,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17820">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
 <summary>
 Do not audit attempts to send and receive comsat_server packets.
 </summary>
@@ -21282,7 +21361,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="17835">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
 <summary>
 Relabel packets to comsat_server the packet type.
 </summary>
@@ -21292,7 +21371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="17857">
+<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
 <summary>
 Send and receive TCP traffic on the condor port.
 </summary>
@@ -21303,7 +21382,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_condor_port" lineno="17872">
+<interface name="corenet_udp_send_condor_port" lineno="18416">
 <summary>
 Send UDP traffic on the condor port.
 </summary>
@@ -21314,7 +21393,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="17887">
+<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
 <summary>
 Do not audit attempts to send UDP traffic on the condor port.
 </summary>
@@ -21325,7 +21404,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_condor_port" lineno="17902">
+<interface name="corenet_udp_receive_condor_port" lineno="18446">
 <summary>
 Receive UDP traffic on the condor port.
 </summary>
@@ -21336,7 +21415,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17917">
+<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
 <summary>
 Do not audit attempts to receive UDP traffic on the condor port.
 </summary>
@@ -21347,7 +21426,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="17932">
+<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
 <summary>
 Send and receive UDP traffic on the condor port.
 </summary>
@@ -21358,7 +21437,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17948">
+<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the condor port.
@@ -21370,7 +21449,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="17963">
+<interface name="corenet_tcp_bind_condor_port" lineno="18507">
 <summary>
 Bind TCP sockets to the condor port.
 </summary>
@@ -21381,7 +21460,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_condor_port" lineno="17983">
+<interface name="corenet_udp_bind_condor_port" lineno="18527">
 <summary>
 Bind UDP sockets to the condor port.
 </summary>
@@ -21392,7 +21471,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18002">
+<interface name="corenet_tcp_connect_condor_port" lineno="18546">
 <summary>
 Make a TCP connection to the condor port.
 </summary>
@@ -21402,7 +21481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_client_packets" lineno="18022">
+<interface name="corenet_send_condor_client_packets" lineno="18566">
 <summary>
 Send condor_client packets.
 </summary>
@@ -21413,7 +21492,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18041">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
 <summary>
 Do not audit attempts to send condor_client packets.
 </summary>
@@ -21424,7 +21503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18060">
+<interface name="corenet_receive_condor_client_packets" lineno="18604">
 <summary>
 Receive condor_client packets.
 </summary>
@@ -21435,7 +21514,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18079">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
 <summary>
 Do not audit attempts to receive condor_client packets.
 </summary>
@@ -21446,7 +21525,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18098">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
 <summary>
 Send and receive condor_client packets.
 </summary>
@@ -21457,7 +21536,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18114">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
 <summary>
 Do not audit attempts to send and receive condor_client packets.
 </summary>
@@ -21468,7 +21547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18129">
+<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
 <summary>
 Relabel packets to condor_client the packet type.
 </summary>
@@ -21478,7 +21557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_server_packets" lineno="18149">
+<interface name="corenet_send_condor_server_packets" lineno="18693">
 <summary>
 Send condor_server packets.
 </summary>
@@ -21489,7 +21568,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18168">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
 <summary>
 Do not audit attempts to send condor_server packets.
 </summary>
@@ -21500,7 +21579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18187">
+<interface name="corenet_receive_condor_server_packets" lineno="18731">
 <summary>
 Receive condor_server packets.
 </summary>
@@ -21511,7 +21590,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18206">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
 <summary>
 Do not audit attempts to receive condor_server packets.
 </summary>
@@ -21522,7 +21601,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18225">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
 <summary>
 Send and receive condor_server packets.
 </summary>
@@ -21533,7 +21612,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18241">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
 <summary>
 Do not audit attempts to send and receive condor_server packets.
 </summary>
@@ -21544,7 +21623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18256">
+<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
 <summary>
 Relabel packets to condor_server the packet type.
 </summary>
@@ -21554,7 +21633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18278">
+<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
 <summary>
 Send and receive TCP traffic on the couchdb port.
 </summary>
@@ -21565,7 +21644,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18293">
+<interface name="corenet_udp_send_couchdb_port" lineno="18837">
 <summary>
 Send UDP traffic on the couchdb port.
 </summary>
@@ -21576,7 +21655,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18308">
+<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
 <summary>
 Do not audit attempts to send UDP traffic on the couchdb port.
 </summary>
@@ -21587,7 +21666,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18323">
+<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
 <summary>
 Receive UDP traffic on the couchdb port.
 </summary>
@@ -21598,7 +21677,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18338">
+<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
 <summary>
 Do not audit attempts to receive UDP traffic on the couchdb port.
 </summary>
@@ -21609,7 +21688,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18353">
+<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
 <summary>
 Send and receive UDP traffic on the couchdb port.
 </summary>
@@ -21620,7 +21699,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18369">
+<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the couchdb port.
@@ -21632,7 +21711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18384">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
 <summary>
 Bind TCP sockets to the couchdb port.
 </summary>
@@ -21643,7 +21722,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18404">
+<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
 <summary>
 Bind UDP sockets to the couchdb port.
 </summary>
@@ -21654,7 +21733,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18423">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
 <summary>
 Make a TCP connection to the couchdb port.
 </summary>
@@ -21664,7 +21743,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="18443">
+<interface name="corenet_send_couchdb_client_packets" lineno="18987">
 <summary>
 Send couchdb_client packets.
 </summary>
@@ -21675,7 +21754,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="18462">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
 <summary>
 Do not audit attempts to send couchdb_client packets.
 </summary>
@@ -21686,7 +21765,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="18481">
+<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
 <summary>
 Receive couchdb_client packets.
 </summary>
@@ -21697,7 +21776,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="18500">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
 <summary>
 Do not audit attempts to receive couchdb_client packets.
 </summary>
@@ -21708,7 +21787,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="18519">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
 <summary>
 Send and receive couchdb_client packets.
 </summary>
@@ -21719,7 +21798,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="18535">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
 <summary>
 Do not audit attempts to send and receive couchdb_client packets.
 </summary>
@@ -21730,7 +21809,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="18550">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
 <summary>
 Relabel packets to couchdb_client the packet type.
 </summary>
@@ -21740,7 +21819,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="18570">
+<interface name="corenet_send_couchdb_server_packets" lineno="19114">
 <summary>
 Send couchdb_server packets.
 </summary>
@@ -21751,7 +21830,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="18589">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
 <summary>
 Do not audit attempts to send couchdb_server packets.
 </summary>
@@ -21762,7 +21841,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="18608">
+<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
 <summary>
 Receive couchdb_server packets.
 </summary>
@@ -21773,7 +21852,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="18627">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
 <summary>
 Do not audit attempts to receive couchdb_server packets.
 </summary>
@@ -21784,7 +21863,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="18646">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
 <summary>
 Send and receive couchdb_server packets.
 </summary>
@@ -21795,7 +21874,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="18662">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
 <summary>
 Do not audit attempts to send and receive couchdb_server packets.
 </summary>
@@ -21806,7 +21885,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="18677">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
 <summary>
 Relabel packets to couchdb_server the packet type.
 </summary>
@@ -21816,7 +21895,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="18699">
+<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
 <summary>
 Send and receive TCP traffic on the cslistener port.
 </summary>
@@ -21827,7 +21906,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="18714">
+<interface name="corenet_udp_send_cslistener_port" lineno="19258">
 <summary>
 Send UDP traffic on the cslistener port.
 </summary>
@@ -21838,7 +21917,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="18729">
+<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
 <summary>
 Do not audit attempts to send UDP traffic on the cslistener port.
 </summary>
@@ -21849,7 +21928,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="18744">
+<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
 <summary>
 Receive UDP traffic on the cslistener port.
 </summary>
@@ -21860,7 +21939,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="18759">
+<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
 <summary>
 Do not audit attempts to receive UDP traffic on the cslistener port.
 </summary>
@@ -21871,7 +21950,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="18774">
+<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
 <summary>
 Send and receive UDP traffic on the cslistener port.
 </summary>
@@ -21882,7 +21961,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="18790">
+<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cslistener port.
@@ -21894,7 +21973,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="18805">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
 <summary>
 Bind TCP sockets to the cslistener port.
 </summary>
@@ -21905,7 +21984,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="18825">
+<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
 <summary>
 Bind UDP sockets to the cslistener port.
 </summary>
@@ -21916,7 +21995,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="18844">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
 <summary>
 Make a TCP connection to the cslistener port.
 </summary>
@@ -21926,7 +22005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="18864">
+<interface name="corenet_send_cslistener_client_packets" lineno="19408">
 <summary>
 Send cslistener_client packets.
 </summary>
@@ -21937,7 +22016,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="18883">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
 <summary>
 Do not audit attempts to send cslistener_client packets.
 </summary>
@@ -21948,7 +22027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="18902">
+<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
 <summary>
 Receive cslistener_client packets.
 </summary>
@@ -21959,7 +22038,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="18921">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
 <summary>
 Do not audit attempts to receive cslistener_client packets.
 </summary>
@@ -21970,7 +22049,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="18940">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
 <summary>
 Send and receive cslistener_client packets.
 </summary>
@@ -21981,7 +22060,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="18956">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
 <summary>
 Do not audit attempts to send and receive cslistener_client packets.
 </summary>
@@ -21992,7 +22071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="18971">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
 <summary>
 Relabel packets to cslistener_client the packet type.
 </summary>
@@ -22002,7 +22081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="18991">
+<interface name="corenet_send_cslistener_server_packets" lineno="19535">
 <summary>
 Send cslistener_server packets.
 </summary>
@@ -22013,7 +22092,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19010">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
 <summary>
 Do not audit attempts to send cslistener_server packets.
 </summary>
@@ -22024,7 +22103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19029">
+<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
 <summary>
 Receive cslistener_server packets.
 </summary>
@@ -22035,7 +22114,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19048">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
 <summary>
 Do not audit attempts to receive cslistener_server packets.
 </summary>
@@ -22046,7 +22125,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19067">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
 <summary>
 Send and receive cslistener_server packets.
 </summary>
@@ -22057,7 +22136,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19083">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
 <summary>
 Do not audit attempts to send and receive cslistener_server packets.
 </summary>
@@ -22068,7 +22147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19098">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
 <summary>
 Relabel packets to cslistener_server the packet type.
 </summary>
@@ -22078,7 +22157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19120">
+<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
 <summary>
 Send and receive TCP traffic on the ctdb port.
 </summary>
@@ -22089,7 +22168,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19135">
+<interface name="corenet_udp_send_ctdb_port" lineno="19679">
 <summary>
 Send UDP traffic on the ctdb port.
 </summary>
@@ -22100,7 +22179,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19150">
+<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
 <summary>
 Do not audit attempts to send UDP traffic on the ctdb port.
 </summary>
@@ -22111,7 +22190,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19165">
+<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
 <summary>
 Receive UDP traffic on the ctdb port.
 </summary>
@@ -22122,7 +22201,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19180">
+<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
 <summary>
 Do not audit attempts to receive UDP traffic on the ctdb port.
 </summary>
@@ -22133,7 +22212,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19195">
+<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
 <summary>
 Send and receive UDP traffic on the ctdb port.
 </summary>
@@ -22144,7 +22223,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19211">
+<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ctdb port.
@@ -22156,7 +22235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19226">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
 <summary>
 Bind TCP sockets to the ctdb port.
 </summary>
@@ -22167,7 +22246,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19246">
+<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
 <summary>
 Bind UDP sockets to the ctdb port.
 </summary>
@@ -22178,7 +22257,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19265">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
 <summary>
 Make a TCP connection to the ctdb port.
 </summary>
@@ -22188,7 +22267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19285">
+<interface name="corenet_send_ctdb_client_packets" lineno="19829">
 <summary>
 Send ctdb_client packets.
 </summary>
@@ -22199,7 +22278,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19304">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
 <summary>
 Do not audit attempts to send ctdb_client packets.
 </summary>
@@ -22210,7 +22289,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19323">
+<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
 <summary>
 Receive ctdb_client packets.
 </summary>
@@ -22221,7 +22300,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19342">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
 <summary>
 Do not audit attempts to receive ctdb_client packets.
 </summary>
@@ -22232,7 +22311,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19361">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
 <summary>
 Send and receive ctdb_client packets.
 </summary>
@@ -22243,7 +22322,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19377">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
 <summary>
 Do not audit attempts to send and receive ctdb_client packets.
 </summary>
@@ -22254,7 +22333,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19392">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
 <summary>
 Relabel packets to ctdb_client the packet type.
 </summary>
@@ -22264,7 +22343,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19412">
+<interface name="corenet_send_ctdb_server_packets" lineno="19956">
 <summary>
 Send ctdb_server packets.
 </summary>
@@ -22275,7 +22354,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19431">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
 <summary>
 Do not audit attempts to send ctdb_server packets.
 </summary>
@@ -22286,7 +22365,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="19450">
+<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
 <summary>
 Receive ctdb_server packets.
 </summary>
@@ -22297,7 +22376,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="19469">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
 <summary>
 Do not audit attempts to receive ctdb_server packets.
 </summary>
@@ -22308,7 +22387,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="19488">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
 <summary>
 Send and receive ctdb_server packets.
 </summary>
@@ -22319,7 +22398,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="19504">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
 <summary>
 Do not audit attempts to send and receive ctdb_server packets.
 </summary>
@@ -22330,7 +22409,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="19519">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
 <summary>
 Relabel packets to ctdb_server the packet type.
 </summary>
@@ -22340,7 +22419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="19541">
+<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
 <summary>
 Send and receive TCP traffic on the cvs port.
 </summary>
@@ -22351,7 +22430,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cvs_port" lineno="19556">
+<interface name="corenet_udp_send_cvs_port" lineno="20100">
 <summary>
 Send UDP traffic on the cvs port.
 </summary>
@@ -22362,7 +22441,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="19571">
+<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
 <summary>
 Do not audit attempts to send UDP traffic on the cvs port.
 </summary>
@@ -22373,7 +22452,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="19586">
+<interface name="corenet_udp_receive_cvs_port" lineno="20130">
 <summary>
 Receive UDP traffic on the cvs port.
 </summary>
@@ -22384,7 +22463,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="19601">
+<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
 <summary>
 Do not audit attempts to receive UDP traffic on the cvs port.
 </summary>
@@ -22395,7 +22474,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="19616">
+<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
 <summary>
 Send and receive UDP traffic on the cvs port.
 </summary>
@@ -22406,7 +22485,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="19632">
+<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cvs port.
@@ -22418,7 +22497,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="19647">
+<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
 <summary>
 Bind TCP sockets to the cvs port.
 </summary>
@@ -22429,7 +22508,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="19667">
+<interface name="corenet_udp_bind_cvs_port" lineno="20211">
 <summary>
 Bind UDP sockets to the cvs port.
 </summary>
@@ -22440,7 +22519,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="19686">
+<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
 <summary>
 Make a TCP connection to the cvs port.
 </summary>
@@ -22450,7 +22529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_client_packets" lineno="19706">
+<interface name="corenet_send_cvs_client_packets" lineno="20250">
 <summary>
 Send cvs_client packets.
 </summary>
@@ -22461,7 +22540,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="19725">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
 <summary>
 Do not audit attempts to send cvs_client packets.
 </summary>
@@ -22472,7 +22551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="19744">
+<interface name="corenet_receive_cvs_client_packets" lineno="20288">
 <summary>
 Receive cvs_client packets.
 </summary>
@@ -22483,7 +22562,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="19763">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
 <summary>
 Do not audit attempts to receive cvs_client packets.
 </summary>
@@ -22494,7 +22573,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="19782">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
 <summary>
 Send and receive cvs_client packets.
 </summary>
@@ -22505,7 +22584,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="19798">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
 <summary>
 Do not audit attempts to send and receive cvs_client packets.
 </summary>
@@ -22516,7 +22595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="19813">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
 <summary>
 Relabel packets to cvs_client the packet type.
 </summary>
@@ -22526,7 +22605,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_server_packets" lineno="19833">
+<interface name="corenet_send_cvs_server_packets" lineno="20377">
 <summary>
 Send cvs_server packets.
 </summary>
@@ -22537,7 +22616,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19852">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
 <summary>
 Do not audit attempts to send cvs_server packets.
 </summary>
@@ -22548,7 +22627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="19871">
+<interface name="corenet_receive_cvs_server_packets" lineno="20415">
 <summary>
 Receive cvs_server packets.
 </summary>
@@ -22559,7 +22638,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19890">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
 <summary>
 Do not audit attempts to receive cvs_server packets.
 </summary>
@@ -22570,7 +22649,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="19909">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
 <summary>
 Send and receive cvs_server packets.
 </summary>
@@ -22581,7 +22660,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19925">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
 <summary>
 Do not audit attempts to send and receive cvs_server packets.
 </summary>
@@ -22592,7 +22671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="19940">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
 <summary>
 Relabel packets to cvs_server the packet type.
 </summary>
@@ -22602,7 +22681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19962">
+<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
 <summary>
 Send and receive TCP traffic on the cyphesis port.
 </summary>
@@ -22613,7 +22692,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="19977">
+<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
 <summary>
 Send UDP traffic on the cyphesis port.
 </summary>
@@ -22624,7 +22703,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19992">
+<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
 <summary>
 Do not audit attempts to send UDP traffic on the cyphesis port.
 </summary>
@@ -22635,7 +22714,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20007">
+<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
 <summary>
 Receive UDP traffic on the cyphesis port.
 </summary>
@@ -22646,7 +22725,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20022">
+<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
 <summary>
 Do not audit attempts to receive UDP traffic on the cyphesis port.
 </summary>
@@ -22657,7 +22736,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20037">
+<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
 <summary>
 Send and receive UDP traffic on the cyphesis port.
 </summary>
@@ -22668,7 +22747,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20053">
+<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cyphesis port.
@@ -22680,7 +22759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20068">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
 <summary>
 Bind TCP sockets to the cyphesis port.
 </summary>
@@ -22691,7 +22770,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20088">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
 <summary>
 Bind UDP sockets to the cyphesis port.
 </summary>
@@ -22702,7 +22781,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20107">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
 <summary>
 Make a TCP connection to the cyphesis port.
 </summary>
@@ -22712,7 +22791,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20127">
+<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
 <summary>
 Send cyphesis_client packets.
 </summary>
@@ -22723,7 +22802,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20146">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
 <summary>
 Do not audit attempts to send cyphesis_client packets.
 </summary>
@@ -22734,7 +22813,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20165">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
 <summary>
 Receive cyphesis_client packets.
 </summary>
@@ -22745,7 +22824,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20184">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
 <summary>
 Do not audit attempts to receive cyphesis_client packets.
 </summary>
@@ -22756,7 +22835,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20203">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
 <summary>
 Send and receive cyphesis_client packets.
 </summary>
@@ -22767,7 +22846,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20219">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
 <summary>
 Do not audit attempts to send and receive cyphesis_client packets.
 </summary>
@@ -22778,7 +22857,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20234">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
 <summary>
 Relabel packets to cyphesis_client the packet type.
 </summary>
@@ -22788,7 +22867,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20254">
+<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
 <summary>
 Send cyphesis_server packets.
 </summary>
@@ -22799,7 +22878,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20273">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
 <summary>
 Do not audit attempts to send cyphesis_server packets.
 </summary>
@@ -22810,7 +22889,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20292">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
 <summary>
 Receive cyphesis_server packets.
 </summary>
@@ -22821,7 +22900,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20311">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
 <summary>
 Do not audit attempts to receive cyphesis_server packets.
 </summary>
@@ -22832,7 +22911,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20330">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
 <summary>
 Send and receive cyphesis_server packets.
 </summary>
@@ -22843,7 +22922,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20346">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
 <summary>
 Do not audit attempts to send and receive cyphesis_server packets.
 </summary>
@@ -22854,7 +22933,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20361">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
 <summary>
 Relabel packets to cyphesis_server the packet type.
 </summary>
@@ -22864,7 +22943,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20383">
+<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
 <summary>
 Send and receive TCP traffic on the daap port.
 </summary>
@@ -22875,7 +22954,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_daap_port" lineno="20398">
+<interface name="corenet_udp_send_daap_port" lineno="20942">
 <summary>
 Send UDP traffic on the daap port.
 </summary>
@@ -22886,7 +22965,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20413">
+<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
 <summary>
 Do not audit attempts to send UDP traffic on the daap port.
 </summary>
@@ -22897,7 +22976,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20428">
+<interface name="corenet_udp_receive_daap_port" lineno="20972">
 <summary>
 Receive UDP traffic on the daap port.
 </summary>
@@ -22908,7 +22987,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20443">
+<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
 <summary>
 Do not audit attempts to receive UDP traffic on the daap port.
 </summary>
@@ -22919,7 +22998,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="20458">
+<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
 <summary>
 Send and receive UDP traffic on the daap port.
 </summary>
@@ -22930,7 +23009,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="20474">
+<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the daap port.
@@ -22942,7 +23021,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="20489">
+<interface name="corenet_tcp_bind_daap_port" lineno="21033">
 <summary>
 Bind TCP sockets to the daap port.
 </summary>
@@ -22953,7 +23032,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_daap_port" lineno="20509">
+<interface name="corenet_udp_bind_daap_port" lineno="21053">
 <summary>
 Bind UDP sockets to the daap port.
 </summary>
@@ -22964,7 +23043,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="20528">
+<interface name="corenet_tcp_connect_daap_port" lineno="21072">
 <summary>
 Make a TCP connection to the daap port.
 </summary>
@@ -22974,7 +23053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_client_packets" lineno="20548">
+<interface name="corenet_send_daap_client_packets" lineno="21092">
 <summary>
 Send daap_client packets.
 </summary>
@@ -22985,7 +23064,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="20567">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
 <summary>
 Do not audit attempts to send daap_client packets.
 </summary>
@@ -22996,7 +23075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_client_packets" lineno="20586">
+<interface name="corenet_receive_daap_client_packets" lineno="21130">
 <summary>
 Receive daap_client packets.
 </summary>
@@ -23007,7 +23086,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="20605">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
 <summary>
 Do not audit attempts to receive daap_client packets.
 </summary>
@@ -23018,7 +23097,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="20624">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
 <summary>
 Send and receive daap_client packets.
 </summary>
@@ -23029,7 +23108,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="20640">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
 <summary>
 Do not audit attempts to send and receive daap_client packets.
 </summary>
@@ -23040,7 +23119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="20655">
+<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
 <summary>
 Relabel packets to daap_client the packet type.
 </summary>
@@ -23050,7 +23129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_server_packets" lineno="20675">
+<interface name="corenet_send_daap_server_packets" lineno="21219">
 <summary>
 Send daap_server packets.
 </summary>
@@ -23061,7 +23140,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="20694">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
 <summary>
 Do not audit attempts to send daap_server packets.
 </summary>
@@ -23072,7 +23151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_server_packets" lineno="20713">
+<interface name="corenet_receive_daap_server_packets" lineno="21257">
 <summary>
 Receive daap_server packets.
 </summary>
@@ -23083,7 +23162,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="20732">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
 <summary>
 Do not audit attempts to receive daap_server packets.
 </summary>
@@ -23094,7 +23173,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="20751">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
 <summary>
 Send and receive daap_server packets.
 </summary>
@@ -23105,7 +23184,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="20767">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
 <summary>
 Do not audit attempts to send and receive daap_server packets.
 </summary>
@@ -23116,7 +23195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="20782">
+<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
 <summary>
 Relabel packets to daap_server the packet type.
 </summary>
@@ -23126,7 +23205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20804">
+<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
 <summary>
 Send and receive TCP traffic on the dbskkd port.
 </summary>
@@ -23137,7 +23216,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="20819">
+<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
 <summary>
 Send UDP traffic on the dbskkd port.
 </summary>
@@ -23148,7 +23227,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20834">
+<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
 <summary>
 Do not audit attempts to send UDP traffic on the dbskkd port.
 </summary>
@@ -23159,7 +23238,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="20849">
+<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
 <summary>
 Receive UDP traffic on the dbskkd port.
 </summary>
@@ -23170,7 +23249,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20864">
+<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
 <summary>
 Do not audit attempts to receive UDP traffic on the dbskkd port.
 </summary>
@@ -23181,7 +23260,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20879">
+<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
 <summary>
 Send and receive UDP traffic on the dbskkd port.
 </summary>
@@ -23192,7 +23271,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20895">
+<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dbskkd port.
@@ -23204,7 +23283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="20910">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
 <summary>
 Bind TCP sockets to the dbskkd port.
 </summary>
@@ -23215,7 +23294,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="20930">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
 <summary>
 Bind UDP sockets to the dbskkd port.
 </summary>
@@ -23226,7 +23305,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="20949">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
 <summary>
 Make a TCP connection to the dbskkd port.
 </summary>
@@ -23236,7 +23315,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="20969">
+<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
 <summary>
 Send dbskkd_client packets.
 </summary>
@@ -23247,7 +23326,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20988">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
 <summary>
 Do not audit attempts to send dbskkd_client packets.
 </summary>
@@ -23258,7 +23337,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21007">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
 <summary>
 Receive dbskkd_client packets.
 </summary>
@@ -23269,7 +23348,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21026">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
 <summary>
 Do not audit attempts to receive dbskkd_client packets.
 </summary>
@@ -23280,7 +23359,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21045">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
 <summary>
 Send and receive dbskkd_client packets.
 </summary>
@@ -23291,7 +23370,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21061">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
 <summary>
 Do not audit attempts to send and receive dbskkd_client packets.
 </summary>
@@ -23302,7 +23381,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21076">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
 <summary>
 Relabel packets to dbskkd_client the packet type.
 </summary>
@@ -23312,7 +23391,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21096">
+<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
 <summary>
 Send dbskkd_server packets.
 </summary>
@@ -23323,7 +23402,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21115">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
 <summary>
 Do not audit attempts to send dbskkd_server packets.
 </summary>
@@ -23334,7 +23413,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21134">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
 <summary>
 Receive dbskkd_server packets.
 </summary>
@@ -23345,7 +23424,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21153">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
 <summary>
 Do not audit attempts to receive dbskkd_server packets.
 </summary>
@@ -23356,7 +23435,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21172">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
 <summary>
 Send and receive dbskkd_server packets.
 </summary>
@@ -23367,7 +23446,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21188">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
 <summary>
 Do not audit attempts to send and receive dbskkd_server packets.
 </summary>
@@ -23378,7 +23457,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21203">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
 <summary>
 Relabel packets to dbskkd_server the packet type.
 </summary>
@@ -23388,7 +23467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21225">
+<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
 <summary>
 Send and receive TCP traffic on the dcc port.
 </summary>
@@ -23399,7 +23478,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21240">
+<interface name="corenet_udp_send_dcc_port" lineno="21784">
 <summary>
 Send UDP traffic on the dcc port.
 </summary>
@@ -23410,7 +23489,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21255">
+<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
 <summary>
 Do not audit attempts to send UDP traffic on the dcc port.
 </summary>
@@ -23421,7 +23500,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21270">
+<interface name="corenet_udp_receive_dcc_port" lineno="21814">
 <summary>
 Receive UDP traffic on the dcc port.
 </summary>
@@ -23432,7 +23511,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21285">
+<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
 <summary>
 Do not audit attempts to receive UDP traffic on the dcc port.
 </summary>
@@ -23443,7 +23522,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21300">
+<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
 <summary>
 Send and receive UDP traffic on the dcc port.
 </summary>
@@ -23454,7 +23533,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21316">
+<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dcc port.
@@ -23466,7 +23545,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21331">
+<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
 <summary>
 Bind TCP sockets to the dcc port.
 </summary>
@@ -23477,7 +23556,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21351">
+<interface name="corenet_udp_bind_dcc_port" lineno="21895">
 <summary>
 Bind UDP sockets to the dcc port.
 </summary>
@@ -23488,7 +23567,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21370">
+<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
 <summary>
 Make a TCP connection to the dcc port.
 </summary>
@@ -23498,7 +23577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21390">
+<interface name="corenet_send_dcc_client_packets" lineno="21934">
 <summary>
 Send dcc_client packets.
 </summary>
@@ -23509,7 +23588,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21409">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
 <summary>
 Do not audit attempts to send dcc_client packets.
 </summary>
@@ -23520,7 +23599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21428">
+<interface name="corenet_receive_dcc_client_packets" lineno="21972">
 <summary>
 Receive dcc_client packets.
 </summary>
@@ -23531,7 +23610,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21447">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
 <summary>
 Do not audit attempts to receive dcc_client packets.
 </summary>
@@ -23542,7 +23621,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="21466">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
 <summary>
 Send and receive dcc_client packets.
 </summary>
@@ -23553,7 +23632,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21482">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
 <summary>
 Do not audit attempts to send and receive dcc_client packets.
 </summary>
@@ -23564,7 +23643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="21497">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
 <summary>
 Relabel packets to dcc_client the packet type.
 </summary>
@@ -23574,7 +23653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_server_packets" lineno="21517">
+<interface name="corenet_send_dcc_server_packets" lineno="22061">
 <summary>
 Send dcc_server packets.
 </summary>
@@ -23585,7 +23664,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21536">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
 <summary>
 Do not audit attempts to send dcc_server packets.
 </summary>
@@ -23596,7 +23675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="21555">
+<interface name="corenet_receive_dcc_server_packets" lineno="22099">
 <summary>
 Receive dcc_server packets.
 </summary>
@@ -23607,7 +23686,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21574">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
 <summary>
 Do not audit attempts to receive dcc_server packets.
 </summary>
@@ -23618,7 +23697,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="21593">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
 <summary>
 Send and receive dcc_server packets.
 </summary>
@@ -23629,7 +23708,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21609">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
 <summary>
 Do not audit attempts to send and receive dcc_server packets.
 </summary>
@@ -23640,7 +23719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="21624">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
 <summary>
 Relabel packets to dcc_server the packet type.
 </summary>
@@ -23650,7 +23729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="21646">
+<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
 <summary>
 Send and receive TCP traffic on the dccm port.
 </summary>
@@ -23661,7 +23740,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dccm_port" lineno="21661">
+<interface name="corenet_udp_send_dccm_port" lineno="22205">
 <summary>
 Send UDP traffic on the dccm port.
 </summary>
@@ -23672,7 +23751,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21676">
+<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
 <summary>
 Do not audit attempts to send UDP traffic on the dccm port.
 </summary>
@@ -23683,7 +23762,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="21691">
+<interface name="corenet_udp_receive_dccm_port" lineno="22235">
 <summary>
 Receive UDP traffic on the dccm port.
 </summary>
@@ -23694,7 +23773,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21706">
+<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
 <summary>
 Do not audit attempts to receive UDP traffic on the dccm port.
 </summary>
@@ -23705,7 +23784,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="21721">
+<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
 <summary>
 Send and receive UDP traffic on the dccm port.
 </summary>
@@ -23716,7 +23795,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21737">
+<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dccm port.
@@ -23728,7 +23807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="21752">
+<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
 <summary>
 Bind TCP sockets to the dccm port.
 </summary>
@@ -23739,7 +23818,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="21772">
+<interface name="corenet_udp_bind_dccm_port" lineno="22316">
 <summary>
 Bind UDP sockets to the dccm port.
 </summary>
@@ -23750,7 +23829,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="21791">
+<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
 <summary>
 Make a TCP connection to the dccm port.
 </summary>
@@ -23760,7 +23839,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_client_packets" lineno="21811">
+<interface name="corenet_send_dccm_client_packets" lineno="22355">
 <summary>
 Send dccm_client packets.
 </summary>
@@ -23771,7 +23850,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21830">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
 <summary>
 Do not audit attempts to send dccm_client packets.
 </summary>
@@ -23782,7 +23861,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="21849">
+<interface name="corenet_receive_dccm_client_packets" lineno="22393">
 <summary>
 Receive dccm_client packets.
 </summary>
@@ -23793,7 +23872,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21868">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
 <summary>
 Do not audit attempts to receive dccm_client packets.
 </summary>
@@ -23804,7 +23883,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="21887">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
 <summary>
 Send and receive dccm_client packets.
 </summary>
@@ -23815,7 +23894,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21903">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
 <summary>
 Do not audit attempts to send and receive dccm_client packets.
 </summary>
@@ -23826,7 +23905,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="21918">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
 <summary>
 Relabel packets to dccm_client the packet type.
 </summary>
@@ -23836,7 +23915,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_server_packets" lineno="21938">
+<interface name="corenet_send_dccm_server_packets" lineno="22482">
 <summary>
 Send dccm_server packets.
 </summary>
@@ -23847,7 +23926,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21957">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
 <summary>
 Do not audit attempts to send dccm_server packets.
 </summary>
@@ -23858,7 +23937,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="21976">
+<interface name="corenet_receive_dccm_server_packets" lineno="22520">
 <summary>
 Receive dccm_server packets.
 </summary>
@@ -23869,7 +23948,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21995">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
 <summary>
 Do not audit attempts to receive dccm_server packets.
 </summary>
@@ -23880,7 +23959,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22014">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
 <summary>
 Send and receive dccm_server packets.
 </summary>
@@ -23891,7 +23970,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22030">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
 <summary>
 Do not audit attempts to send and receive dccm_server packets.
 </summary>
@@ -23902,7 +23981,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22045">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
 <summary>
 Relabel packets to dccm_server the packet type.
 </summary>
@@ -23912,7 +23991,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22067">
+<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
 <summary>
 Send and receive TCP traffic on the dhcpc port.
 </summary>
@@ -23923,7 +24002,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22082">
+<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
 <summary>
 Send UDP traffic on the dhcpc port.
 </summary>
@@ -23934,7 +24013,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22097">
+<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
 <summary>
 Do not audit attempts to send UDP traffic on the dhcpc port.
 </summary>
@@ -23945,7 +24024,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22112">
+<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
 <summary>
 Receive UDP traffic on the dhcpc port.
 </summary>
@@ -23956,7 +24035,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22127">
+<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
 <summary>
 Do not audit attempts to receive UDP traffic on the dhcpc port.
 </summary>
@@ -23967,7 +24046,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22142">
+<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
 <summary>
 Send and receive UDP traffic on the dhcpc port.
 </summary>
@@ -23978,7 +24057,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22158">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dhcpc port.
@@ -23990,7 +24069,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22173">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
 <summary>
 Bind TCP sockets to the dhcpc port.
 </summary>
@@ -24001,7 +24080,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22193">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
 <summary>
 Bind UDP sockets to the dhcpc port.
 </summary>
@@ -24012,7 +24091,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22212">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
 <summary>
 Make a TCP connection to the dhcpc port.
 </summary>
@@ -24022,7 +24101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22232">
+<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
 <summary>
 Send dhcpc_client packets.
 </summary>
@@ -24033,7 +24112,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22251">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
 <summary>
 Do not audit attempts to send dhcpc_client packets.
 </summary>
@@ -24044,7 +24123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22270">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
 <summary>
 Receive dhcpc_client packets.
 </summary>
@@ -24055,7 +24134,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22289">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
 <summary>
 Do not audit attempts to receive dhcpc_client packets.
 </summary>
@@ -24066,7 +24145,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22308">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
 <summary>
 Send and receive dhcpc_client packets.
 </summary>
@@ -24077,7 +24156,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22324">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
 <summary>
 Do not audit attempts to send and receive dhcpc_client packets.
 </summary>
@@ -24088,7 +24167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22339">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
 <summary>
 Relabel packets to dhcpc_client the packet type.
 </summary>
@@ -24098,7 +24177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22359">
+<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
 <summary>
 Send dhcpc_server packets.
 </summary>
@@ -24109,7 +24188,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22378">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
 <summary>
 Do not audit attempts to send dhcpc_server packets.
 </summary>
@@ -24120,7 +24199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22397">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
 <summary>
 Receive dhcpc_server packets.
 </summary>
@@ -24131,7 +24210,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22416">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
 <summary>
 Do not audit attempts to receive dhcpc_server packets.
 </summary>
@@ -24142,7 +24221,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22435">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
 <summary>
 Send and receive dhcpc_server packets.
 </summary>
@@ -24153,7 +24232,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22451">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
 <summary>
 Do not audit attempts to send and receive dhcpc_server packets.
 </summary>
@@ -24164,7 +24243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="22466">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
 <summary>
 Relabel packets to dhcpc_server the packet type.
 </summary>
@@ -24174,7 +24253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22488">
+<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
 <summary>
 Send and receive TCP traffic on the dhcpd port.
 </summary>
@@ -24185,7 +24264,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="22503">
+<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
 <summary>
 Send UDP traffic on the dhcpd port.
 </summary>
@@ -24196,7 +24275,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22518">
+<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
 <summary>
 Do not audit attempts to send UDP traffic on the dhcpd port.
 </summary>
@@ -24207,7 +24286,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="22533">
+<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
 <summary>
 Receive UDP traffic on the dhcpd port.
 </summary>
@@ -24218,7 +24297,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22548">
+<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
 <summary>
 Do not audit attempts to receive UDP traffic on the dhcpd port.
 </summary>
@@ -24229,7 +24308,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22563">
+<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
 <summary>
 Send and receive UDP traffic on the dhcpd port.
 </summary>
@@ -24240,7 +24319,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22579">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dhcpd port.
@@ -24252,7 +24331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="22594">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
 <summary>
 Bind TCP sockets to the dhcpd port.
 </summary>
@@ -24263,7 +24342,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="22614">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
 <summary>
 Bind UDP sockets to the dhcpd port.
 </summary>
@@ -24274,7 +24353,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="22633">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
 <summary>
 Make a TCP connection to the dhcpd port.
 </summary>
@@ -24284,7 +24363,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="22653">
+<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
 <summary>
 Send dhcpd_client packets.
 </summary>
@@ -24295,7 +24374,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22672">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
 <summary>
 Do not audit attempts to send dhcpd_client packets.
 </summary>
@@ -24306,7 +24385,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="22691">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
 <summary>
 Receive dhcpd_client packets.
 </summary>
@@ -24317,7 +24396,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22710">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
 <summary>
 Do not audit attempts to receive dhcpd_client packets.
 </summary>
@@ -24328,7 +24407,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22729">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
 <summary>
 Send and receive dhcpd_client packets.
 </summary>
@@ -24339,7 +24418,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22745">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
 <summary>
 Do not audit attempts to send and receive dhcpd_client packets.
 </summary>
@@ -24350,7 +24429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="22760">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
 <summary>
 Relabel packets to dhcpd_client the packet type.
 </summary>
@@ -24360,7 +24439,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="22780">
+<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
 <summary>
 Send dhcpd_server packets.
 </summary>
@@ -24371,7 +24450,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22799">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
 <summary>
 Do not audit attempts to send dhcpd_server packets.
 </summary>
@@ -24382,7 +24461,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="22818">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
 <summary>
 Receive dhcpd_server packets.
 </summary>
@@ -24393,7 +24472,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22837">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
 <summary>
 Do not audit attempts to receive dhcpd_server packets.
 </summary>
@@ -24404,7 +24483,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22856">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
 <summary>
 Send and receive dhcpd_server packets.
 </summary>
@@ -24415,7 +24494,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22872">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
 <summary>
 Do not audit attempts to send and receive dhcpd_server packets.
 </summary>
@@ -24426,7 +24505,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="22887">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
 <summary>
 Relabel packets to dhcpd_server the packet type.
 </summary>
@@ -24436,7 +24515,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="22909">
+<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
 <summary>
 Send and receive TCP traffic on the dict port.
 </summary>
@@ -24447,7 +24526,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dict_port" lineno="22924">
+<interface name="corenet_udp_send_dict_port" lineno="23468">
 <summary>
 Send UDP traffic on the dict port.
 </summary>
@@ -24458,7 +24537,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="22939">
+<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
 <summary>
 Do not audit attempts to send UDP traffic on the dict port.
 </summary>
@@ -24469,7 +24548,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dict_port" lineno="22954">
+<interface name="corenet_udp_receive_dict_port" lineno="23498">
 <summary>
 Receive UDP traffic on the dict port.
 </summary>
@@ -24480,7 +24559,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="22969">
+<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
 <summary>
 Do not audit attempts to receive UDP traffic on the dict port.
 </summary>
@@ -24491,7 +24570,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="22984">
+<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
 <summary>
 Send and receive UDP traffic on the dict port.
 </summary>
@@ -24502,7 +24581,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23000">
+<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dict port.
@@ -24514,7 +24593,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23015">
+<interface name="corenet_tcp_bind_dict_port" lineno="23559">
 <summary>
 Bind TCP sockets to the dict port.
 </summary>
@@ -24525,7 +24604,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23035">
+<interface name="corenet_udp_bind_dict_port" lineno="23579">
 <summary>
 Bind UDP sockets to the dict port.
 </summary>
@@ -24536,7 +24615,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23054">
+<interface name="corenet_tcp_connect_dict_port" lineno="23598">
 <summary>
 Make a TCP connection to the dict port.
 </summary>
@@ -24546,7 +24625,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_client_packets" lineno="23074">
+<interface name="corenet_send_dict_client_packets" lineno="23618">
 <summary>
 Send dict_client packets.
 </summary>
@@ -24557,7 +24636,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23093">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
 <summary>
 Do not audit attempts to send dict_client packets.
 </summary>
@@ -24568,7 +24647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23112">
+<interface name="corenet_receive_dict_client_packets" lineno="23656">
 <summary>
 Receive dict_client packets.
 </summary>
@@ -24579,7 +24658,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23131">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
 <summary>
 Do not audit attempts to receive dict_client packets.
 </summary>
@@ -24590,7 +24669,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23150">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
 <summary>
 Send and receive dict_client packets.
 </summary>
@@ -24601,7 +24680,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23166">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
 <summary>
 Do not audit attempts to send and receive dict_client packets.
 </summary>
@@ -24612,7 +24691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23181">
+<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
 <summary>
 Relabel packets to dict_client the packet type.
 </summary>
@@ -24622,7 +24701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_server_packets" lineno="23201">
+<interface name="corenet_send_dict_server_packets" lineno="23745">
 <summary>
 Send dict_server packets.
 </summary>
@@ -24633,7 +24712,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23220">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
 <summary>
 Do not audit attempts to send dict_server packets.
 </summary>
@@ -24644,7 +24723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23239">
+<interface name="corenet_receive_dict_server_packets" lineno="23783">
 <summary>
 Receive dict_server packets.
 </summary>
@@ -24655,7 +24734,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23258">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
 <summary>
 Do not audit attempts to receive dict_server packets.
 </summary>
@@ -24666,7 +24745,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23277">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
 <summary>
 Send and receive dict_server packets.
 </summary>
@@ -24677,7 +24756,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23293">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
 <summary>
 Do not audit attempts to send and receive dict_server packets.
 </summary>
@@ -24688,7 +24767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23308">
+<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
 <summary>
 Relabel packets to dict_server the packet type.
 </summary>
@@ -24698,7 +24777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23330">
+<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
 <summary>
 Send and receive TCP traffic on the distccd port.
 </summary>
@@ -24709,7 +24788,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23345">
+<interface name="corenet_udp_send_distccd_port" lineno="23889">
 <summary>
 Send UDP traffic on the distccd port.
 </summary>
@@ -24720,7 +24799,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23360">
+<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
 <summary>
 Do not audit attempts to send UDP traffic on the distccd port.
 </summary>
@@ -24731,7 +24810,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23375">
+<interface name="corenet_udp_receive_distccd_port" lineno="23919">
 <summary>
 Receive UDP traffic on the distccd port.
 </summary>
@@ -24742,7 +24821,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23390">
+<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
 <summary>
 Do not audit attempts to receive UDP traffic on the distccd port.
 </summary>
@@ -24753,7 +24832,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23405">
+<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
 <summary>
 Send and receive UDP traffic on the distccd port.
 </summary>
@@ -24764,7 +24843,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23421">
+<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the distccd port.
@@ -24776,7 +24855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23436">
+<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
 <summary>
 Bind TCP sockets to the distccd port.
 </summary>
@@ -24787,7 +24866,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="23456">
+<interface name="corenet_udp_bind_distccd_port" lineno="24000">
 <summary>
 Bind UDP sockets to the distccd port.
 </summary>
@@ -24798,7 +24877,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="23475">
+<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
 <summary>
 Make a TCP connection to the distccd port.
 </summary>
@@ -24808,7 +24887,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_client_packets" lineno="23495">
+<interface name="corenet_send_distccd_client_packets" lineno="24039">
 <summary>
 Send distccd_client packets.
 </summary>
@@ -24819,7 +24898,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23514">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
 <summary>
 Do not audit attempts to send distccd_client packets.
 </summary>
@@ -24830,7 +24909,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="23533">
+<interface name="corenet_receive_distccd_client_packets" lineno="24077">
 <summary>
 Receive distccd_client packets.
 </summary>
@@ -24841,7 +24920,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23552">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
 <summary>
 Do not audit attempts to receive distccd_client packets.
 </summary>
@@ -24852,7 +24931,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="23571">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
 <summary>
 Send and receive distccd_client packets.
 </summary>
@@ -24863,7 +24942,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23587">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
 <summary>
 Do not audit attempts to send and receive distccd_client packets.
 </summary>
@@ -24874,7 +24953,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="23602">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
 <summary>
 Relabel packets to distccd_client the packet type.
 </summary>
@@ -24884,7 +24963,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_server_packets" lineno="23622">
+<interface name="corenet_send_distccd_server_packets" lineno="24166">
 <summary>
 Send distccd_server packets.
 </summary>
@@ -24895,7 +24974,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23641">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
 <summary>
 Do not audit attempts to send distccd_server packets.
 </summary>
@@ -24906,7 +24985,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="23660">
+<interface name="corenet_receive_distccd_server_packets" lineno="24204">
 <summary>
 Receive distccd_server packets.
 </summary>
@@ -24917,7 +24996,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23679">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
 <summary>
 Do not audit attempts to receive distccd_server packets.
 </summary>
@@ -24928,7 +25007,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="23698">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
 <summary>
 Send and receive distccd_server packets.
 </summary>
@@ -24939,7 +25018,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23714">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
 <summary>
 Do not audit attempts to send and receive distccd_server packets.
 </summary>
@@ -24950,7 +25029,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="23729">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
 <summary>
 Relabel packets to distccd_server the packet type.
 </summary>
@@ -24960,7 +25039,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="23751">
+<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
 <summary>
 Send and receive TCP traffic on the dns port.
 </summary>
@@ -24971,7 +25050,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dns_port" lineno="23766">
+<interface name="corenet_udp_send_dns_port" lineno="24310">
 <summary>
 Send UDP traffic on the dns port.
 </summary>
@@ -24982,7 +25061,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="23781">
+<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
 <summary>
 Do not audit attempts to send UDP traffic on the dns port.
 </summary>
@@ -24993,7 +25072,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dns_port" lineno="23796">
+<interface name="corenet_udp_receive_dns_port" lineno="24340">
 <summary>
 Receive UDP traffic on the dns port.
 </summary>
@@ -25004,7 +25083,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="23811">
+<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
 <summary>
 Do not audit attempts to receive UDP traffic on the dns port.
 </summary>
@@ -25015,7 +25094,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="23826">
+<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
 <summary>
 Send and receive UDP traffic on the dns port.
 </summary>
@@ -25026,7 +25105,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="23842">
+<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dns port.
@@ -25038,7 +25117,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="23857">
+<interface name="corenet_tcp_bind_dns_port" lineno="24401">
 <summary>
 Bind TCP sockets to the dns port.
 </summary>
@@ -25049,7 +25128,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dns_port" lineno="23877">
+<interface name="corenet_udp_bind_dns_port" lineno="24421">
 <summary>
 Bind UDP sockets to the dns port.
 </summary>
@@ -25060,7 +25139,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="23896">
+<interface name="corenet_tcp_connect_dns_port" lineno="24440">
 <summary>
 Make a TCP connection to the dns port.
 </summary>
@@ -25070,7 +25149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_client_packets" lineno="23916">
+<interface name="corenet_send_dns_client_packets" lineno="24460">
 <summary>
 Send dns_client packets.
 </summary>
@@ -25081,7 +25160,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="23935">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
 <summary>
 Do not audit attempts to send dns_client packets.
 </summary>
@@ -25092,7 +25171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_client_packets" lineno="23954">
+<interface name="corenet_receive_dns_client_packets" lineno="24498">
 <summary>
 Receive dns_client packets.
 </summary>
@@ -25103,7 +25182,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="23973">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
 <summary>
 Do not audit attempts to receive dns_client packets.
 </summary>
@@ -25114,7 +25193,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="23992">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
 <summary>
 Send and receive dns_client packets.
 </summary>
@@ -25125,7 +25204,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24008">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
 <summary>
 Do not audit attempts to send and receive dns_client packets.
 </summary>
@@ -25136,7 +25215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24023">
+<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
 <summary>
 Relabel packets to dns_client the packet type.
 </summary>
@@ -25146,7 +25225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_server_packets" lineno="24043">
+<interface name="corenet_send_dns_server_packets" lineno="24587">
 <summary>
 Send dns_server packets.
 </summary>
@@ -25157,7 +25236,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24062">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
 <summary>
 Do not audit attempts to send dns_server packets.
 </summary>
@@ -25168,7 +25247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24081">
+<interface name="corenet_receive_dns_server_packets" lineno="24625">
 <summary>
 Receive dns_server packets.
 </summary>
@@ -25179,7 +25258,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24100">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
 <summary>
 Do not audit attempts to receive dns_server packets.
 </summary>
@@ -25190,7 +25269,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24119">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
 <summary>
 Send and receive dns_server packets.
 </summary>
@@ -25201,7 +25280,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24135">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
 <summary>
 Do not audit attempts to send and receive dns_server packets.
 </summary>
@@ -25212,7 +25291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24150">
+<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
 <summary>
 Relabel packets to dns_server the packet type.
 </summary>
@@ -25222,7 +25301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24172">
+<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
 <summary>
 Send and receive TCP traffic on the dropbox port.
 </summary>
@@ -25233,7 +25312,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24187">
+<interface name="corenet_udp_send_dropbox_port" lineno="24731">
 <summary>
 Send UDP traffic on the dropbox port.
 </summary>
@@ -25244,7 +25323,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24202">
+<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
 <summary>
 Do not audit attempts to send UDP traffic on the dropbox port.
 </summary>
@@ -25255,7 +25334,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24217">
+<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
 <summary>
 Receive UDP traffic on the dropbox port.
 </summary>
@@ -25266,7 +25345,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24232">
+<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
 <summary>
 Do not audit attempts to receive UDP traffic on the dropbox port.
 </summary>
@@ -25277,7 +25356,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24247">
+<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
 <summary>
 Send and receive UDP traffic on the dropbox port.
 </summary>
@@ -25288,7 +25367,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24263">
+<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dropbox port.
@@ -25300,7 +25379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24278">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
 <summary>
 Bind TCP sockets to the dropbox port.
 </summary>
@@ -25311,7 +25390,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24298">
+<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
 <summary>
 Bind UDP sockets to the dropbox port.
 </summary>
@@ -25322,7 +25401,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24317">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
 <summary>
 Make a TCP connection to the dropbox port.
 </summary>
@@ -25332,7 +25411,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24337">
+<interface name="corenet_send_dropbox_client_packets" lineno="24881">
 <summary>
 Send dropbox_client packets.
 </summary>
@@ -25343,7 +25422,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24356">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
 <summary>
 Do not audit attempts to send dropbox_client packets.
 </summary>
@@ -25354,7 +25433,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24375">
+<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
 <summary>
 Receive dropbox_client packets.
 </summary>
@@ -25365,7 +25444,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24394">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
 <summary>
 Do not audit attempts to receive dropbox_client packets.
 </summary>
@@ -25376,7 +25455,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24413">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
 <summary>
 Send and receive dropbox_client packets.
 </summary>
@@ -25387,7 +25466,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24429">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
 <summary>
 Do not audit attempts to send and receive dropbox_client packets.
 </summary>
@@ -25398,7 +25477,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="24444">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
 <summary>
 Relabel packets to dropbox_client the packet type.
 </summary>
@@ -25408,7 +25487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="24464">
+<interface name="corenet_send_dropbox_server_packets" lineno="25008">
 <summary>
 Send dropbox_server packets.
 </summary>
@@ -25419,7 +25498,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="24483">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
 <summary>
 Do not audit attempts to send dropbox_server packets.
 </summary>
@@ -25430,7 +25509,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="24502">
+<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
 <summary>
 Receive dropbox_server packets.
 </summary>
@@ -25441,7 +25520,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="24521">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
 <summary>
 Do not audit attempts to receive dropbox_server packets.
 </summary>
@@ -25452,7 +25531,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="24540">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
 <summary>
 Send and receive dropbox_server packets.
 </summary>
@@ -25463,7 +25542,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="24556">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
 <summary>
 Do not audit attempts to send and receive dropbox_server packets.
 </summary>
@@ -25474,7 +25553,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="24571">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
 <summary>
 Relabel packets to dropbox_server the packet type.
 </summary>
@@ -25484,7 +25563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="24593">
+<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
 <summary>
 Send and receive TCP traffic on the efs port.
 </summary>
@@ -25495,7 +25574,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_efs_port" lineno="24608">
+<interface name="corenet_udp_send_efs_port" lineno="25152">
 <summary>
 Send UDP traffic on the efs port.
 </summary>
@@ -25506,7 +25585,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="24623">
+<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
 <summary>
 Do not audit attempts to send UDP traffic on the efs port.
 </summary>
@@ -25517,7 +25596,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_efs_port" lineno="24638">
+<interface name="corenet_udp_receive_efs_port" lineno="25182">
 <summary>
 Receive UDP traffic on the efs port.
 </summary>
@@ -25528,7 +25607,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="24653">
+<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
 <summary>
 Do not audit attempts to receive UDP traffic on the efs port.
 </summary>
@@ -25539,7 +25618,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="24668">
+<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
 <summary>
 Send and receive UDP traffic on the efs port.
 </summary>
@@ -25550,7 +25629,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="24684">
+<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the efs port.
@@ -25562,7 +25641,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="24699">
+<interface name="corenet_tcp_bind_efs_port" lineno="25243">
 <summary>
 Bind TCP sockets to the efs port.
 </summary>
@@ -25573,7 +25652,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_efs_port" lineno="24719">
+<interface name="corenet_udp_bind_efs_port" lineno="25263">
 <summary>
 Bind UDP sockets to the efs port.
 </summary>
@@ -25584,7 +25663,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="24738">
+<interface name="corenet_tcp_connect_efs_port" lineno="25282">
 <summary>
 Make a TCP connection to the efs port.
 </summary>
@@ -25594,7 +25673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_client_packets" lineno="24758">
+<interface name="corenet_send_efs_client_packets" lineno="25302">
 <summary>
 Send efs_client packets.
 </summary>
@@ -25605,7 +25684,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="24777">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
 <summary>
 Do not audit attempts to send efs_client packets.
 </summary>
@@ -25616,7 +25695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_client_packets" lineno="24796">
+<interface name="corenet_receive_efs_client_packets" lineno="25340">
 <summary>
 Receive efs_client packets.
 </summary>
@@ -25627,7 +25706,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="24815">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
 <summary>
 Do not audit attempts to receive efs_client packets.
 </summary>
@@ -25638,7 +25717,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="24834">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
 <summary>
 Send and receive efs_client packets.
 </summary>
@@ -25649,7 +25728,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="24850">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
 <summary>
 Do not audit attempts to send and receive efs_client packets.
 </summary>
@@ -25660,7 +25739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="24865">
+<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
 <summary>
 Relabel packets to efs_client the packet type.
 </summary>
@@ -25670,7 +25749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_server_packets" lineno="24885">
+<interface name="corenet_send_efs_server_packets" lineno="25429">
 <summary>
 Send efs_server packets.
 </summary>
@@ -25681,7 +25760,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="24904">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
 <summary>
 Do not audit attempts to send efs_server packets.
 </summary>
@@ -25692,7 +25771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_server_packets" lineno="24923">
+<interface name="corenet_receive_efs_server_packets" lineno="25467">
 <summary>
 Receive efs_server packets.
 </summary>
@@ -25703,7 +25782,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="24942">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
 <summary>
 Do not audit attempts to receive efs_server packets.
 </summary>
@@ -25714,7 +25793,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="24961">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
 <summary>
 Send and receive efs_server packets.
 </summary>
@@ -25725,7 +25804,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="24977">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
 <summary>
 Do not audit attempts to send and receive efs_server packets.
 </summary>
@@ -25736,7 +25815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="24992">
+<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
 <summary>
 Relabel packets to efs_server the packet type.
 </summary>
@@ -25746,7 +25825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25014">
+<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
 <summary>
 Send and receive TCP traffic on the embrace_dp_c port.
 </summary>
@@ -25757,7 +25836,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25029">
+<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
 <summary>
 Send UDP traffic on the embrace_dp_c port.
 </summary>
@@ -25768,7 +25847,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25044">
+<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
 <summary>
 Do not audit attempts to send UDP traffic on the embrace_dp_c port.
 </summary>
@@ -25779,7 +25858,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25059">
+<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
 <summary>
 Receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -25790,7 +25869,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25074">
+<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
 <summary>
 Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -25801,7 +25880,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25089">
+<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
 <summary>
 Send and receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -25812,7 +25891,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25105">
+<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the embrace_dp_c port.
@@ -25824,7 +25903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25120">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
 <summary>
 Bind TCP sockets to the embrace_dp_c port.
 </summary>
@@ -25835,7 +25914,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25140">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
 <summary>
 Bind UDP sockets to the embrace_dp_c port.
 </summary>
@@ -25846,7 +25925,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25159">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
 <summary>
 Make a TCP connection to the embrace_dp_c port.
 </summary>
@@ -25856,7 +25935,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25179">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
 <summary>
 Send embrace_dp_c_client packets.
 </summary>
@@ -25867,7 +25946,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25198">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
 <summary>
 Do not audit attempts to send embrace_dp_c_client packets.
 </summary>
@@ -25878,7 +25957,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25217">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
 <summary>
 Receive embrace_dp_c_client packets.
 </summary>
@@ -25889,7 +25968,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25236">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
 <summary>
 Do not audit attempts to receive embrace_dp_c_client packets.
 </summary>
@@ -25900,7 +25979,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25255">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
 <summary>
 Send and receive embrace_dp_c_client packets.
 </summary>
@@ -25911,7 +25990,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25271">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_client packets.
 </summary>
@@ -25922,7 +26001,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25286">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
 <summary>
 Relabel packets to embrace_dp_c_client the packet type.
 </summary>
@@ -25932,7 +26011,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25306">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
 <summary>
 Send embrace_dp_c_server packets.
 </summary>
@@ -25943,7 +26022,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25325">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
 <summary>
 Do not audit attempts to send embrace_dp_c_server packets.
 </summary>
@@ -25954,7 +26033,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25344">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
 <summary>
 Receive embrace_dp_c_server packets.
 </summary>
@@ -25965,7 +26044,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25363">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
 <summary>
 Do not audit attempts to receive embrace_dp_c_server packets.
 </summary>
@@ -25976,7 +26055,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25382">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
 <summary>
 Send and receive embrace_dp_c_server packets.
 </summary>
@@ -25987,7 +26066,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25398">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_server packets.
 </summary>
@@ -25998,7 +26077,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25413">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
 <summary>
 Relabel packets to embrace_dp_c_server the packet type.
 </summary>
@@ -26008,7 +26087,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25435">
+<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
 <summary>
 Send and receive TCP traffic on the epmap port.
 </summary>
@@ -26019,7 +26098,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_epmap_port" lineno="25450">
+<interface name="corenet_udp_send_epmap_port" lineno="25994">
 <summary>
 Send UDP traffic on the epmap port.
 </summary>
@@ -26030,7 +26109,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25465">
+<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
 <summary>
 Do not audit attempts to send UDP traffic on the epmap port.
 </summary>
@@ -26041,7 +26120,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="25480">
+<interface name="corenet_udp_receive_epmap_port" lineno="26024">
 <summary>
 Receive UDP traffic on the epmap port.
 </summary>
@@ -26052,7 +26131,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25495">
+<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
 <summary>
 Do not audit attempts to receive UDP traffic on the epmap port.
 </summary>
@@ -26063,7 +26142,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="25510">
+<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
 <summary>
 Send and receive UDP traffic on the epmap port.
 </summary>
@@ -26074,7 +26153,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25526">
+<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the epmap port.
@@ -26086,7 +26165,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="25541">
+<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
 <summary>
 Bind TCP sockets to the epmap port.
 </summary>
@@ -26097,7 +26176,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="25561">
+<interface name="corenet_udp_bind_epmap_port" lineno="26105">
 <summary>
 Bind UDP sockets to the epmap port.
 </summary>
@@ -26108,7 +26187,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="25580">
+<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
 <summary>
 Make a TCP connection to the epmap port.
 </summary>
@@ -26118,7 +26197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_client_packets" lineno="25600">
+<interface name="corenet_send_epmap_client_packets" lineno="26144">
 <summary>
 Send epmap_client packets.
 </summary>
@@ -26129,7 +26208,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25619">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
 <summary>
 Do not audit attempts to send epmap_client packets.
 </summary>
@@ -26140,7 +26219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="25638">
+<interface name="corenet_receive_epmap_client_packets" lineno="26182">
 <summary>
 Receive epmap_client packets.
 </summary>
@@ -26151,7 +26230,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25657">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
 <summary>
 Do not audit attempts to receive epmap_client packets.
 </summary>
@@ -26162,7 +26241,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="25676">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
 <summary>
 Send and receive epmap_client packets.
 </summary>
@@ -26173,7 +26252,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25692">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
 <summary>
 Do not audit attempts to send and receive epmap_client packets.
 </summary>
@@ -26184,7 +26263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="25707">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
 <summary>
 Relabel packets to epmap_client the packet type.
 </summary>
@@ -26194,7 +26273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_server_packets" lineno="25727">
+<interface name="corenet_send_epmap_server_packets" lineno="26271">
 <summary>
 Send epmap_server packets.
 </summary>
@@ -26205,7 +26284,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25746">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
 <summary>
 Do not audit attempts to send epmap_server packets.
 </summary>
@@ -26216,7 +26295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="25765">
+<interface name="corenet_receive_epmap_server_packets" lineno="26309">
 <summary>
 Receive epmap_server packets.
 </summary>
@@ -26227,7 +26306,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25784">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
 <summary>
 Do not audit attempts to receive epmap_server packets.
 </summary>
@@ -26238,7 +26317,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="25803">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
 <summary>
 Send and receive epmap_server packets.
 </summary>
@@ -26249,7 +26328,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25819">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
 <summary>
 Do not audit attempts to send and receive epmap_server packets.
 </summary>
@@ -26260,7 +26339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="25834">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
 <summary>
 Relabel packets to epmap_server the packet type.
 </summary>
@@ -26270,7 +26349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="25856">
+<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
 <summary>
 Send and receive TCP traffic on the epmd port.
 </summary>
@@ -26281,7 +26360,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_epmd_port" lineno="25871">
+<interface name="corenet_udp_send_epmd_port" lineno="26415">
 <summary>
 Send UDP traffic on the epmd port.
 </summary>
@@ -26292,7 +26371,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="25886">
+<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
 <summary>
 Do not audit attempts to send UDP traffic on the epmd port.
 </summary>
@@ -26303,7 +26382,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="25901">
+<interface name="corenet_udp_receive_epmd_port" lineno="26445">
 <summary>
 Receive UDP traffic on the epmd port.
 </summary>
@@ -26314,7 +26393,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="25916">
+<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
 <summary>
 Do not audit attempts to receive UDP traffic on the epmd port.
 </summary>
@@ -26325,7 +26404,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="25931">
+<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
 <summary>
 Send and receive UDP traffic on the epmd port.
 </summary>
@@ -26336,7 +26415,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="25947">
+<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the epmd port.
@@ -26348,7 +26427,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="25962">
+<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
 <summary>
 Bind TCP sockets to the epmd port.
 </summary>
@@ -26359,7 +26438,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="25982">
+<interface name="corenet_udp_bind_epmd_port" lineno="26526">
 <summary>
 Bind UDP sockets to the epmd port.
 </summary>
@@ -26370,7 +26449,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26001">
+<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
 <summary>
 Make a TCP connection to the epmd port.
 </summary>
@@ -26380,7 +26459,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26021">
+<interface name="corenet_send_epmd_client_packets" lineno="26565">
 <summary>
 Send epmd_client packets.
 </summary>
@@ -26391,7 +26470,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26040">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
 <summary>
 Do not audit attempts to send epmd_client packets.
 </summary>
@@ -26402,7 +26481,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26059">
+<interface name="corenet_receive_epmd_client_packets" lineno="26603">
 <summary>
 Receive epmd_client packets.
 </summary>
@@ -26413,7 +26492,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26078">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
 <summary>
 Do not audit attempts to receive epmd_client packets.
 </summary>
@@ -26424,7 +26503,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26097">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
 <summary>
 Send and receive epmd_client packets.
 </summary>
@@ -26435,7 +26514,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26113">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
 <summary>
 Do not audit attempts to send and receive epmd_client packets.
 </summary>
@@ -26446,7 +26525,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26128">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
 <summary>
 Relabel packets to epmd_client the packet type.
 </summary>
@@ -26456,7 +26535,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26148">
+<interface name="corenet_send_epmd_server_packets" lineno="26692">
 <summary>
 Send epmd_server packets.
 </summary>
@@ -26467,7 +26546,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26167">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
 <summary>
 Do not audit attempts to send epmd_server packets.
 </summary>
@@ -26478,7 +26557,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26186">
+<interface name="corenet_receive_epmd_server_packets" lineno="26730">
 <summary>
 Receive epmd_server packets.
 </summary>
@@ -26489,7 +26568,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26205">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
 <summary>
 Do not audit attempts to receive epmd_server packets.
 </summary>
@@ -26500,7 +26579,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26224">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
 <summary>
 Send and receive epmd_server packets.
 </summary>
@@ -26511,7 +26590,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26240">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
 <summary>
 Do not audit attempts to send and receive epmd_server packets.
 </summary>
@@ -26522,7 +26601,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26255">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
 <summary>
 Relabel packets to epmd_server the packet type.
 </summary>
@@ -26532,7 +26611,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26277">
+<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
 <summary>
 Send and receive TCP traffic on the fingerd port.
 </summary>
@@ -26543,7 +26622,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26292">
+<interface name="corenet_udp_send_fingerd_port" lineno="26836">
 <summary>
 Send UDP traffic on the fingerd port.
 </summary>
@@ -26554,7 +26633,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26307">
+<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
 <summary>
 Do not audit attempts to send UDP traffic on the fingerd port.
 </summary>
@@ -26565,7 +26644,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26322">
+<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
 <summary>
 Receive UDP traffic on the fingerd port.
 </summary>
@@ -26576,7 +26655,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26337">
+<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
 <summary>
 Do not audit attempts to receive UDP traffic on the fingerd port.
 </summary>
@@ -26587,7 +26666,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26352">
+<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
 <summary>
 Send and receive UDP traffic on the fingerd port.
 </summary>
@@ -26598,7 +26677,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26368">
+<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the fingerd port.
@@ -26610,7 +26689,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26383">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
 <summary>
 Bind TCP sockets to the fingerd port.
 </summary>
@@ -26621,7 +26700,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26403">
+<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
 <summary>
 Bind UDP sockets to the fingerd port.
 </summary>
@@ -26632,7 +26711,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26422">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
 <summary>
 Make a TCP connection to the fingerd port.
 </summary>
@@ -26642,7 +26721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="26442">
+<interface name="corenet_send_fingerd_client_packets" lineno="26986">
 <summary>
 Send fingerd_client packets.
 </summary>
@@ -26653,7 +26732,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26461">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
 <summary>
 Do not audit attempts to send fingerd_client packets.
 </summary>
@@ -26664,7 +26743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="26480">
+<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
 <summary>
 Receive fingerd_client packets.
 </summary>
@@ -26675,7 +26754,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26499">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
 <summary>
 Do not audit attempts to receive fingerd_client packets.
 </summary>
@@ -26686,7 +26765,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="26518">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
 <summary>
 Send and receive fingerd_client packets.
 </summary>
@@ -26697,7 +26776,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26534">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
 <summary>
 Do not audit attempts to send and receive fingerd_client packets.
 </summary>
@@ -26708,7 +26787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="26549">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
 <summary>
 Relabel packets to fingerd_client the packet type.
 </summary>
@@ -26718,7 +26797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="26569">
+<interface name="corenet_send_fingerd_server_packets" lineno="27113">
 <summary>
 Send fingerd_server packets.
 </summary>
@@ -26729,7 +26808,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26588">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
 <summary>
 Do not audit attempts to send fingerd_server packets.
 </summary>
@@ -26740,7 +26819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="26607">
+<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
 <summary>
 Receive fingerd_server packets.
 </summary>
@@ -26751,7 +26830,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26626">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
 <summary>
 Do not audit attempts to receive fingerd_server packets.
 </summary>
@@ -26762,7 +26841,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="26645">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
 <summary>
 Send and receive fingerd_server packets.
 </summary>
@@ -26773,7 +26852,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26661">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
 <summary>
 Do not audit attempts to send and receive fingerd_server packets.
 </summary>
@@ -26784,7 +26863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="26676">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
 <summary>
 Relabel packets to fingerd_server the packet type.
 </summary>
@@ -26794,7 +26873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="26698">
+<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
 <summary>
 Send and receive TCP traffic on the ftp port.
 </summary>
@@ -26805,7 +26884,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ftp_port" lineno="26713">
+<interface name="corenet_udp_send_ftp_port" lineno="27257">
 <summary>
 Send UDP traffic on the ftp port.
 </summary>
@@ -26816,7 +26895,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="26728">
+<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
 <summary>
 Do not audit attempts to send UDP traffic on the ftp port.
 </summary>
@@ -26827,7 +26906,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="26743">
+<interface name="corenet_udp_receive_ftp_port" lineno="27287">
 <summary>
 Receive UDP traffic on the ftp port.
 </summary>
@@ -26838,7 +26917,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="26758">
+<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
 <summary>
 Do not audit attempts to receive UDP traffic on the ftp port.
 </summary>
@@ -26849,7 +26928,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="26773">
+<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
 <summary>
 Send and receive UDP traffic on the ftp port.
 </summary>
@@ -26860,7 +26939,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="26789">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ftp port.
@@ -26872,7 +26951,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="26804">
+<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
 <summary>
 Bind TCP sockets to the ftp port.
 </summary>
@@ -26883,7 +26962,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="26824">
+<interface name="corenet_udp_bind_ftp_port" lineno="27368">
 <summary>
 Bind UDP sockets to the ftp port.
 </summary>
@@ -26894,7 +26973,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="26843">
+<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
 <summary>
 Make a TCP connection to the ftp port.
 </summary>
@@ -26904,7 +26983,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_client_packets" lineno="26863">
+<interface name="corenet_send_ftp_client_packets" lineno="27407">
 <summary>
 Send ftp_client packets.
 </summary>
@@ -26915,7 +26994,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="26882">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
 <summary>
 Do not audit attempts to send ftp_client packets.
 </summary>
@@ -26926,7 +27005,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="26901">
+<interface name="corenet_receive_ftp_client_packets" lineno="27445">
 <summary>
 Receive ftp_client packets.
 </summary>
@@ -26937,7 +27016,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="26920">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
 <summary>
 Do not audit attempts to receive ftp_client packets.
 </summary>
@@ -26948,7 +27027,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="26939">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
 <summary>
 Send and receive ftp_client packets.
 </summary>
@@ -26959,7 +27038,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="26955">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
 <summary>
 Do not audit attempts to send and receive ftp_client packets.
 </summary>
@@ -26970,7 +27049,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="26970">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
 <summary>
 Relabel packets to ftp_client the packet type.
 </summary>
@@ -26980,7 +27059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_server_packets" lineno="26990">
+<interface name="corenet_send_ftp_server_packets" lineno="27534">
 <summary>
 Send ftp_server packets.
 </summary>
@@ -26991,7 +27070,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27009">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
 <summary>
 Do not audit attempts to send ftp_server packets.
 </summary>
@@ -27002,7 +27081,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27028">
+<interface name="corenet_receive_ftp_server_packets" lineno="27572">
 <summary>
 Receive ftp_server packets.
 </summary>
@@ -27013,7 +27092,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27047">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
 <summary>
 Do not audit attempts to receive ftp_server packets.
 </summary>
@@ -27024,7 +27103,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27066">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
 <summary>
 Send and receive ftp_server packets.
 </summary>
@@ -27035,7 +27114,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27082">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
 <summary>
 Do not audit attempts to send and receive ftp_server packets.
 </summary>
@@ -27046,7 +27125,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27097">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
 <summary>
 Relabel packets to ftp_server the packet type.
 </summary>
@@ -27056,7 +27135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27119">
+<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
 <summary>
 Send and receive TCP traffic on the ftp_data port.
 </summary>
@@ -27067,7 +27146,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27134">
+<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
 <summary>
 Send UDP traffic on the ftp_data port.
 </summary>
@@ -27078,7 +27157,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27149">
+<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
 <summary>
 Do not audit attempts to send UDP traffic on the ftp_data port.
 </summary>
@@ -27089,7 +27168,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27164">
+<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
 <summary>
 Receive UDP traffic on the ftp_data port.
 </summary>
@@ -27100,7 +27179,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27179">
+<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
 <summary>
 Do not audit attempts to receive UDP traffic on the ftp_data port.
 </summary>
@@ -27111,7 +27190,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27194">
+<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
 <summary>
 Send and receive UDP traffic on the ftp_data port.
 </summary>
@@ -27122,7 +27201,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27210">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ftp_data port.
@@ -27134,7 +27213,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27225">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
 <summary>
 Bind TCP sockets to the ftp_data port.
 </summary>
@@ -27145,7 +27224,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27245">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
 <summary>
 Bind UDP sockets to the ftp_data port.
 </summary>
@@ -27156,7 +27235,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27264">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
 <summary>
 Make a TCP connection to the ftp_data port.
 </summary>
@@ -27166,7 +27245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27284">
+<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
 <summary>
 Send ftp_data_client packets.
 </summary>
@@ -27177,7 +27256,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27303">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
 <summary>
 Do not audit attempts to send ftp_data_client packets.
 </summary>
@@ -27188,7 +27267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27322">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
 <summary>
 Receive ftp_data_client packets.
 </summary>
@@ -27199,7 +27278,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27341">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
 <summary>
 Do not audit attempts to receive ftp_data_client packets.
 </summary>
@@ -27210,7 +27289,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27360">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
 <summary>
 Send and receive ftp_data_client packets.
 </summary>
@@ -27221,7 +27300,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27376">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
 <summary>
 Do not audit attempts to send and receive ftp_data_client packets.
 </summary>
@@ -27232,7 +27311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27391">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
 <summary>
 Relabel packets to ftp_data_client the packet type.
 </summary>
@@ -27242,7 +27321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27411">
+<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
 <summary>
 Send ftp_data_server packets.
 </summary>
@@ -27253,7 +27332,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27430">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
 <summary>
 Do not audit attempts to send ftp_data_server packets.
 </summary>
@@ -27264,7 +27343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="27449">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
 <summary>
 Receive ftp_data_server packets.
 </summary>
@@ -27275,7 +27354,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="27468">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
 <summary>
 Do not audit attempts to receive ftp_data_server packets.
 </summary>
@@ -27286,7 +27365,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="27487">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
 <summary>
 Send and receive ftp_data_server packets.
 </summary>
@@ -27297,7 +27376,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="27503">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
 <summary>
 Do not audit attempts to send and receive ftp_data_server packets.
 </summary>
@@ -27308,7 +27387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="27518">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
 <summary>
 Relabel packets to ftp_data_server the packet type.
 </summary>
@@ -27318,7 +27397,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="27540">
+<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
 <summary>
 Send and receive TCP traffic on the gatekeeper port.
 </summary>
@@ -27329,7 +27408,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="27555">
+<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
 <summary>
 Send UDP traffic on the gatekeeper port.
 </summary>
@@ -27340,7 +27419,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="27570">
+<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
 <summary>
 Do not audit attempts to send UDP traffic on the gatekeeper port.
 </summary>
@@ -27351,7 +27430,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="27585">
+<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
 <summary>
 Receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27362,7 +27441,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="27600">
+<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
 <summary>
 Do not audit attempts to receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27373,7 +27452,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="27615">
+<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
 <summary>
 Send and receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27384,7 +27463,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="27631">
+<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gatekeeper port.
@@ -27396,7 +27475,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="27646">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
 <summary>
 Bind TCP sockets to the gatekeeper port.
 </summary>
@@ -27407,7 +27486,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="27666">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
 <summary>
 Bind UDP sockets to the gatekeeper port.
 </summary>
@@ -27418,7 +27497,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="27685">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
 <summary>
 Make a TCP connection to the gatekeeper port.
 </summary>
@@ -27428,7 +27507,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="27705">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
 <summary>
 Send gatekeeper_client packets.
 </summary>
@@ -27439,7 +27518,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="27724">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
 <summary>
 Do not audit attempts to send gatekeeper_client packets.
 </summary>
@@ -27450,7 +27529,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="27743">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
 <summary>
 Receive gatekeeper_client packets.
 </summary>
@@ -27461,7 +27540,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="27762">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
 <summary>
 Do not audit attempts to receive gatekeeper_client packets.
 </summary>
@@ -27472,7 +27551,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="27781">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
 <summary>
 Send and receive gatekeeper_client packets.
 </summary>
@@ -27483,7 +27562,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="27797">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
 <summary>
 Do not audit attempts to send and receive gatekeeper_client packets.
 </summary>
@@ -27494,7 +27573,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="27812">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
 <summary>
 Relabel packets to gatekeeper_client the packet type.
 </summary>
@@ -27504,7 +27583,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="27832">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
 <summary>
 Send gatekeeper_server packets.
 </summary>
@@ -27515,7 +27594,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="27851">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
 <summary>
 Do not audit attempts to send gatekeeper_server packets.
 </summary>
@@ -27526,7 +27605,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="27870">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
 <summary>
 Receive gatekeeper_server packets.
 </summary>
@@ -27537,7 +27616,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="27889">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
 <summary>
 Do not audit attempts to receive gatekeeper_server packets.
 </summary>
@@ -27548,7 +27627,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="27908">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
 <summary>
 Send and receive gatekeeper_server packets.
 </summary>
@@ -27559,7 +27638,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="27924">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
 <summary>
 Do not audit attempts to send and receive gatekeeper_server packets.
 </summary>
@@ -27570,7 +27649,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="27939">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
 <summary>
 Relabel packets to gatekeeper_server the packet type.
 </summary>
@@ -27580,7 +27659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="27961">
+<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
 <summary>
 Send and receive TCP traffic on the gdomap port.
 </summary>
@@ -27591,7 +27670,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="27976">
+<interface name="corenet_udp_send_gdomap_port" lineno="28520">
 <summary>
 Send UDP traffic on the gdomap port.
 </summary>
@@ -27602,7 +27681,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="27991">
+<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
 <summary>
 Do not audit attempts to send UDP traffic on the gdomap port.
 </summary>
@@ -27613,7 +27692,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28006">
+<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
 <summary>
 Receive UDP traffic on the gdomap port.
 </summary>
@@ -27624,7 +27703,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28021">
+<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
 <summary>
 Do not audit attempts to receive UDP traffic on the gdomap port.
 </summary>
@@ -27635,7 +27714,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28036">
+<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
 <summary>
 Send and receive UDP traffic on the gdomap port.
 </summary>
@@ -27646,7 +27725,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28052">
+<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gdomap port.
@@ -27658,7 +27737,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28067">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
 <summary>
 Bind TCP sockets to the gdomap port.
 </summary>
@@ -27669,7 +27748,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28087">
+<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
 <summary>
 Bind UDP sockets to the gdomap port.
 </summary>
@@ -27680,7 +27759,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28106">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
 <summary>
 Make a TCP connection to the gdomap port.
 </summary>
@@ -27690,7 +27769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28126">
+<interface name="corenet_send_gdomap_client_packets" lineno="28670">
 <summary>
 Send gdomap_client packets.
 </summary>
@@ -27701,7 +27780,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28145">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
 <summary>
 Do not audit attempts to send gdomap_client packets.
 </summary>
@@ -27712,7 +27791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28164">
+<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
 <summary>
 Receive gdomap_client packets.
 </summary>
@@ -27723,7 +27802,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28183">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
 <summary>
 Do not audit attempts to receive gdomap_client packets.
 </summary>
@@ -27734,7 +27813,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28202">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
 <summary>
 Send and receive gdomap_client packets.
 </summary>
@@ -27745,7 +27824,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28218">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
 <summary>
 Do not audit attempts to send and receive gdomap_client packets.
 </summary>
@@ -27756,7 +27835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28233">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
 <summary>
 Relabel packets to gdomap_client the packet type.
 </summary>
@@ -27766,7 +27845,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28253">
+<interface name="corenet_send_gdomap_server_packets" lineno="28797">
 <summary>
 Send gdomap_server packets.
 </summary>
@@ -27777,7 +27856,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28272">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
 <summary>
 Do not audit attempts to send gdomap_server packets.
 </summary>
@@ -27788,7 +27867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28291">
+<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
 <summary>
 Receive gdomap_server packets.
 </summary>
@@ -27799,7 +27878,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28310">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
 <summary>
 Do not audit attempts to receive gdomap_server packets.
 </summary>
@@ -27810,7 +27889,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28329">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
 <summary>
 Send and receive gdomap_server packets.
 </summary>
@@ -27821,7 +27900,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28345">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
 <summary>
 Do not audit attempts to send and receive gdomap_server packets.
 </summary>
@@ -27832,7 +27911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28360">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
 <summary>
 Relabel packets to gdomap_server the packet type.
 </summary>
@@ -27842,7 +27921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28382">
+<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
 <summary>
 Send and receive TCP traffic on the gds_db port.
 </summary>
@@ -27853,7 +27932,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28397">
+<interface name="corenet_udp_send_gds_db_port" lineno="28941">
 <summary>
 Send UDP traffic on the gds_db port.
 </summary>
@@ -27864,7 +27943,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28412">
+<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
 <summary>
 Do not audit attempts to send UDP traffic on the gds_db port.
 </summary>
@@ -27875,7 +27954,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28427">
+<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
 <summary>
 Receive UDP traffic on the gds_db port.
 </summary>
@@ -27886,7 +27965,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28442">
+<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
 <summary>
 Do not audit attempts to receive UDP traffic on the gds_db port.
 </summary>
@@ -27897,7 +27976,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="28457">
+<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
 <summary>
 Send and receive UDP traffic on the gds_db port.
 </summary>
@@ -27908,7 +27987,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="28473">
+<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gds_db port.
@@ -27920,7 +27999,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="28488">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
 <summary>
 Bind TCP sockets to the gds_db port.
 </summary>
@@ -27931,7 +28010,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="28508">
+<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
 <summary>
 Bind UDP sockets to the gds_db port.
 </summary>
@@ -27942,7 +28021,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="28527">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
 <summary>
 Make a TCP connection to the gds_db port.
 </summary>
@@ -27952,7 +28031,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="28547">
+<interface name="corenet_send_gds_db_client_packets" lineno="29091">
 <summary>
 Send gds_db_client packets.
 </summary>
@@ -27963,7 +28042,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="28566">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
 <summary>
 Do not audit attempts to send gds_db_client packets.
 </summary>
@@ -27974,7 +28053,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="28585">
+<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
 <summary>
 Receive gds_db_client packets.
 </summary>
@@ -27985,7 +28064,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="28604">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
 <summary>
 Do not audit attempts to receive gds_db_client packets.
 </summary>
@@ -27996,7 +28075,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="28623">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
 <summary>
 Send and receive gds_db_client packets.
 </summary>
@@ -28007,7 +28086,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="28639">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
 <summary>
 Do not audit attempts to send and receive gds_db_client packets.
 </summary>
@@ -28018,7 +28097,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="28654">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
 <summary>
 Relabel packets to gds_db_client the packet type.
 </summary>
@@ -28028,7 +28107,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="28674">
+<interface name="corenet_send_gds_db_server_packets" lineno="29218">
 <summary>
 Send gds_db_server packets.
 </summary>
@@ -28039,7 +28118,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="28693">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
 <summary>
 Do not audit attempts to send gds_db_server packets.
 </summary>
@@ -28050,7 +28129,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="28712">
+<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
 <summary>
 Receive gds_db_server packets.
 </summary>
@@ -28061,7 +28140,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="28731">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
 <summary>
 Do not audit attempts to receive gds_db_server packets.
 </summary>
@@ -28072,7 +28151,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="28750">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
 <summary>
 Send and receive gds_db_server packets.
 </summary>
@@ -28083,7 +28162,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="28766">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
 <summary>
 Do not audit attempts to send and receive gds_db_server packets.
 </summary>
@@ -28094,7 +28173,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="28781">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
 <summary>
 Relabel packets to gds_db_server the packet type.
 </summary>
@@ -28104,269 +28183,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_giftd_port" lineno="28803">
-<summary>
-Send and receive TCP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_giftd_port" lineno="28818">
-<summary>
-Send UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="28833">
-<summary>
-Do not audit attempts to send UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_giftd_port" lineno="28848">
-<summary>
-Receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="28863">
-<summary>
-Do not audit attempts to receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_giftd_port" lineno="28878">
-<summary>
-Send and receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="28894">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_giftd_port" lineno="28909">
-<summary>
-Bind TCP sockets to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_bind_giftd_port" lineno="28929">
-<summary>
-Bind UDP sockets to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_connect_giftd_port" lineno="28948">
-<summary>
-Make a TCP connection to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_send_giftd_client_packets" lineno="28968">
-<summary>
-Send giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="28987">
-<summary>
-Do not audit attempts to send giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_receive_giftd_client_packets" lineno="29006">
-<summary>
-Receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29025">
-<summary>
-Do not audit attempts to receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_sendrecv_giftd_client_packets" lineno="29044">
-<summary>
-Send and receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29060">
-<summary>
-Do not audit attempts to send and receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_relabelto_giftd_client_packets" lineno="29075">
-<summary>
-Relabel packets to giftd_client the packet type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_send_giftd_server_packets" lineno="29095">
-<summary>
-Send giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29114">
-<summary>
-Do not audit attempts to send giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_receive_giftd_server_packets" lineno="29133">
-<summary>
-Receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29152">
-<summary>
-Do not audit attempts to receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_sendrecv_giftd_server_packets" lineno="29171">
-<summary>
-Send and receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29187">
-<summary>
-Do not audit attempts to send and receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_relabelto_giftd_server_packets" lineno="29202">
-<summary>
-Relabel packets to giftd_server the packet type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29224">
+<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
 <summary>
 Send and receive TCP traffic on the git port.
 </summary>
@@ -28377,7 +28194,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_git_port" lineno="29239">
+<interface name="corenet_udp_send_git_port" lineno="29362">
 <summary>
 Send UDP traffic on the git port.
 </summary>
@@ -28388,7 +28205,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29254">
+<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
 <summary>
 Do not audit attempts to send UDP traffic on the git port.
 </summary>
@@ -28399,7 +28216,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_git_port" lineno="29269">
+<interface name="corenet_udp_receive_git_port" lineno="29392">
 <summary>
 Receive UDP traffic on the git port.
 </summary>
@@ -28410,7 +28227,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29284">
+<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
 <summary>
 Do not audit attempts to receive UDP traffic on the git port.
 </summary>
@@ -28421,7 +28238,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29299">
+<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
 <summary>
 Send and receive UDP traffic on the git port.
 </summary>
@@ -28432,7 +28249,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29315">
+<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the git port.
@@ -28444,7 +28261,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29330">
+<interface name="corenet_tcp_bind_git_port" lineno="29453">
 <summary>
 Bind TCP sockets to the git port.
 </summary>
@@ -28455,7 +28272,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_git_port" lineno="29350">
+<interface name="corenet_udp_bind_git_port" lineno="29473">
 <summary>
 Bind UDP sockets to the git port.
 </summary>
@@ -28466,7 +28283,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29369">
+<interface name="corenet_tcp_connect_git_port" lineno="29492">
 <summary>
 Make a TCP connection to the git port.
 </summary>
@@ -28476,7 +28293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_client_packets" lineno="29389">
+<interface name="corenet_send_git_client_packets" lineno="29512">
 <summary>
 Send git_client packets.
 </summary>
@@ -28487,7 +28304,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29408">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
 <summary>
 Do not audit attempts to send git_client packets.
 </summary>
@@ -28498,7 +28315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_client_packets" lineno="29427">
+<interface name="corenet_receive_git_client_packets" lineno="29550">
 <summary>
 Receive git_client packets.
 </summary>
@@ -28509,7 +28326,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29446">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
 <summary>
 Do not audit attempts to receive git_client packets.
 </summary>
@@ -28520,7 +28337,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29465">
+<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
 <summary>
 Send and receive git_client packets.
 </summary>
@@ -28531,7 +28348,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29481">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
 <summary>
 Do not audit attempts to send and receive git_client packets.
 </summary>
@@ -28542,7 +28359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29496">
+<interface name="corenet_relabelto_git_client_packets" lineno="29619">
 <summary>
 Relabel packets to git_client the packet type.
 </summary>
@@ -28552,7 +28369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_server_packets" lineno="29516">
+<interface name="corenet_send_git_server_packets" lineno="29639">
 <summary>
 Send git_server packets.
 </summary>
@@ -28563,7 +28380,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29535">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
 <summary>
 Do not audit attempts to send git_server packets.
 </summary>
@@ -28574,7 +28391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_server_packets" lineno="29554">
+<interface name="corenet_receive_git_server_packets" lineno="29677">
 <summary>
 Receive git_server packets.
 </summary>
@@ -28585,7 +28402,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29573">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
 <summary>
 Do not audit attempts to receive git_server packets.
 </summary>
@@ -28596,7 +28413,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29592">
+<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
 <summary>
 Send and receive git_server packets.
 </summary>
@@ -28607,7 +28424,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29608">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
 <summary>
 Do not audit attempts to send and receive git_server packets.
 </summary>
@@ -28618,7 +28435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29623">
+<interface name="corenet_relabelto_git_server_packets" lineno="29746">
 <summary>
 Relabel packets to git_server the packet type.
 </summary>
@@ -28628,7 +28445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29645">
+<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
 <summary>
 Send and receive TCP traffic on the glance_registry port.
 </summary>
@@ -28639,7 +28456,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29660">
+<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
 <summary>
 Send UDP traffic on the glance_registry port.
 </summary>
@@ -28650,7 +28467,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29675">
+<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
 <summary>
 Do not audit attempts to send UDP traffic on the glance_registry port.
 </summary>
@@ -28661,7 +28478,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29690">
+<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
 <summary>
 Receive UDP traffic on the glance_registry port.
 </summary>
@@ -28672,7 +28489,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29705">
+<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
 <summary>
 Do not audit attempts to receive UDP traffic on the glance_registry port.
 </summary>
@@ -28683,7 +28500,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29720">
+<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
 <summary>
 Send and receive UDP traffic on the glance_registry port.
 </summary>
@@ -28694,7 +28511,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29736">
+<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the glance_registry port.
@@ -28706,7 +28523,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29751">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
 <summary>
 Bind TCP sockets to the glance_registry port.
 </summary>
@@ -28717,7 +28534,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29771">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
 <summary>
 Bind UDP sockets to the glance_registry port.
 </summary>
@@ -28728,7 +28545,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29790">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
 <summary>
 Make a TCP connection to the glance_registry port.
 </summary>
@@ -28738,7 +28555,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29810">
+<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
 <summary>
 Send glance_registry_client packets.
 </summary>
@@ -28749,7 +28566,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29829">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
 <summary>
 Do not audit attempts to send glance_registry_client packets.
 </summary>
@@ -28760,7 +28577,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29848">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
 <summary>
 Receive glance_registry_client packets.
 </summary>
@@ -28771,7 +28588,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29867">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
 <summary>
 Do not audit attempts to receive glance_registry_client packets.
 </summary>
@@ -28782,7 +28599,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="29886">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
 <summary>
 Send and receive glance_registry_client packets.
 </summary>
@@ -28793,7 +28610,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="29902">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
 <summary>
 Do not audit attempts to send and receive glance_registry_client packets.
 </summary>
@@ -28804,7 +28621,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="29917">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
 <summary>
 Relabel packets to glance_registry_client the packet type.
 </summary>
@@ -28814,7 +28631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="29937">
+<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
 <summary>
 Send glance_registry_server packets.
 </summary>
@@ -28825,7 +28642,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="29956">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
 <summary>
 Do not audit attempts to send glance_registry_server packets.
 </summary>
@@ -28836,7 +28653,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="29975">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
 <summary>
 Receive glance_registry_server packets.
 </summary>
@@ -28847,7 +28664,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="29994">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
 <summary>
 Do not audit attempts to receive glance_registry_server packets.
 </summary>
@@ -28858,7 +28675,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30013">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
 <summary>
 Send and receive glance_registry_server packets.
 </summary>
@@ -28869,7 +28686,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30029">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
 <summary>
 Do not audit attempts to send and receive glance_registry_server packets.
 </summary>
@@ -28880,7 +28697,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30044">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
 <summary>
 Relabel packets to glance_registry_server the packet type.
 </summary>
@@ -28890,7 +28707,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30066">
+<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
 <summary>
 Send and receive TCP traffic on the gopher port.
 </summary>
@@ -28901,7 +28718,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30081">
+<interface name="corenet_udp_send_gopher_port" lineno="30204">
 <summary>
 Send UDP traffic on the gopher port.
 </summary>
@@ -28912,7 +28729,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30096">
+<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
 <summary>
 Do not audit attempts to send UDP traffic on the gopher port.
 </summary>
@@ -28923,7 +28740,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30111">
+<interface name="corenet_udp_receive_gopher_port" lineno="30234">
 <summary>
 Receive UDP traffic on the gopher port.
 </summary>
@@ -28934,7 +28751,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30126">
+<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
 <summary>
 Do not audit attempts to receive UDP traffic on the gopher port.
 </summary>
@@ -28945,7 +28762,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30141">
+<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
 <summary>
 Send and receive UDP traffic on the gopher port.
 </summary>
@@ -28956,7 +28773,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30157">
+<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gopher port.
@@ -28968,7 +28785,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30172">
+<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
 <summary>
 Bind TCP sockets to the gopher port.
 </summary>
@@ -28979,7 +28796,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30192">
+<interface name="corenet_udp_bind_gopher_port" lineno="30315">
 <summary>
 Bind UDP sockets to the gopher port.
 </summary>
@@ -28990,7 +28807,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30211">
+<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
 <summary>
 Make a TCP connection to the gopher port.
 </summary>
@@ -29000,7 +28817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30231">
+<interface name="corenet_send_gopher_client_packets" lineno="30354">
 <summary>
 Send gopher_client packets.
 </summary>
@@ -29011,7 +28828,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30250">
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
 <summary>
 Do not audit attempts to send gopher_client packets.
 </summary>
@@ -29022,7 +28839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30269">
+<interface name="corenet_receive_gopher_client_packets" lineno="30392">
 <summary>
 Receive gopher_client packets.
 </summary>
@@ -29033,7 +28850,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30288">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
 <summary>
 Do not audit attempts to receive gopher_client packets.
 </summary>
@@ -29044,7 +28861,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30307">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
 <summary>
 Send and receive gopher_client packets.
 </summary>
@@ -29055,7 +28872,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30323">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
 <summary>
 Do not audit attempts to send and receive gopher_client packets.
 </summary>
@@ -29066,7 +28883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30338">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
 <summary>
 Relabel packets to gopher_client the packet type.
 </summary>
@@ -29076,7 +28893,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30358">
+<interface name="corenet_send_gopher_server_packets" lineno="30481">
 <summary>
 Send gopher_server packets.
 </summary>
@@ -29087,7 +28904,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30377">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
 <summary>
 Do not audit attempts to send gopher_server packets.
 </summary>
@@ -29098,7 +28915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30396">
+<interface name="corenet_receive_gopher_server_packets" lineno="30519">
 <summary>
 Receive gopher_server packets.
 </summary>
@@ -29109,7 +28926,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30415">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
 <summary>
 Do not audit attempts to receive gopher_server packets.
 </summary>
@@ -29120,7 +28937,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30434">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
 <summary>
 Send and receive gopher_server packets.
 </summary>
@@ -29131,7 +28948,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30450">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
 <summary>
 Do not audit attempts to send and receive gopher_server packets.
 </summary>
@@ -29142,7 +28959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30465">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
 <summary>
 Relabel packets to gopher_server the packet type.
 </summary>
@@ -29152,7 +28969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30487">
+<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
 <summary>
 Send and receive TCP traffic on the gpsd port.
 </summary>
@@ -29163,7 +28980,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30502">
+<interface name="corenet_udp_send_gpsd_port" lineno="30625">
 <summary>
 Send UDP traffic on the gpsd port.
 </summary>
@@ -29174,7 +28991,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30517">
+<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
 <summary>
 Do not audit attempts to send UDP traffic on the gpsd port.
 </summary>
@@ -29185,7 +29002,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30532">
+<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
 <summary>
 Receive UDP traffic on the gpsd port.
 </summary>
@@ -29196,7 +29013,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30547">
+<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
 <summary>
 Do not audit attempts to receive UDP traffic on the gpsd port.
 </summary>
@@ -29207,7 +29024,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30562">
+<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
 <summary>
 Send and receive UDP traffic on the gpsd port.
 </summary>
@@ -29218,7 +29035,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30578">
+<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gpsd port.
@@ -29230,7 +29047,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30593">
+<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
 <summary>
 Bind TCP sockets to the gpsd port.
 </summary>
@@ -29241,7 +29058,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30613">
+<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
 <summary>
 Bind UDP sockets to the gpsd port.
 </summary>
@@ -29252,7 +29069,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30632">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
 <summary>
 Make a TCP connection to the gpsd port.
 </summary>
@@ -29262,7 +29079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30652">
+<interface name="corenet_send_gpsd_client_packets" lineno="30775">
 <summary>
 Send gpsd_client packets.
 </summary>
@@ -29273,7 +29090,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30671">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
 <summary>
 Do not audit attempts to send gpsd_client packets.
 </summary>
@@ -29284,7 +29101,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30690">
+<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
 <summary>
 Receive gpsd_client packets.
 </summary>
@@ -29295,7 +29112,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30709">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
 <summary>
 Do not audit attempts to receive gpsd_client packets.
 </summary>
@@ -29306,7 +29123,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30728">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
 <summary>
 Send and receive gpsd_client packets.
 </summary>
@@ -29317,7 +29134,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30744">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
 <summary>
 Do not audit attempts to send and receive gpsd_client packets.
 </summary>
@@ -29328,7 +29145,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30759">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
 <summary>
 Relabel packets to gpsd_client the packet type.
 </summary>
@@ -29338,7 +29155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30779">
+<interface name="corenet_send_gpsd_server_packets" lineno="30902">
 <summary>
 Send gpsd_server packets.
 </summary>
@@ -29349,7 +29166,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30798">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
 <summary>
 Do not audit attempts to send gpsd_server packets.
 </summary>
@@ -29360,7 +29177,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30817">
+<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
 <summary>
 Receive gpsd_server packets.
 </summary>
@@ -29371,7 +29188,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30836">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
 <summary>
 Do not audit attempts to receive gpsd_server packets.
 </summary>
@@ -29382,7 +29199,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30855">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
 <summary>
 Send and receive gpsd_server packets.
 </summary>
@@ -29393,7 +29210,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30871">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
 <summary>
 Do not audit attempts to send and receive gpsd_server packets.
 </summary>
@@ -29404,7 +29221,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="30886">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
 <summary>
 Relabel packets to gpsd_server the packet type.
 </summary>
@@ -29414,7 +29231,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="30908">
+<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
 <summary>
 Send and receive TCP traffic on the hadoop_datanode port.
 </summary>
@@ -29425,7 +29242,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="30923">
+<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
 <summary>
 Send UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29436,7 +29253,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="30938">
+<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
 <summary>
 Do not audit attempts to send UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29447,7 +29264,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="30953">
+<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
 <summary>
 Receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29458,7 +29275,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="30968">
+<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
 <summary>
 Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29469,7 +29286,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="30983">
+<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
 <summary>
 Send and receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29480,7 +29297,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="30999">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hadoop_datanode port.
@@ -29492,7 +29309,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31014">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
 <summary>
 Bind TCP sockets to the hadoop_datanode port.
 </summary>
@@ -29503,7 +29320,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31034">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
 <summary>
 Bind UDP sockets to the hadoop_datanode port.
 </summary>
@@ -29514,7 +29331,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31053">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
 <summary>
 Make a TCP connection to the hadoop_datanode port.
 </summary>
@@ -29524,7 +29341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31073">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
 <summary>
 Send hadoop_datanode_client packets.
 </summary>
@@ -29535,7 +29352,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31092">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
 <summary>
 Do not audit attempts to send hadoop_datanode_client packets.
 </summary>
@@ -29546,7 +29363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31111">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
 <summary>
 Receive hadoop_datanode_client packets.
 </summary>
@@ -29557,7 +29374,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31130">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
 <summary>
 Do not audit attempts to receive hadoop_datanode_client packets.
 </summary>
@@ -29568,7 +29385,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31149">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
 <summary>
 Send and receive hadoop_datanode_client packets.
 </summary>
@@ -29579,7 +29396,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31165">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_client packets.
 </summary>
@@ -29590,7 +29407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31180">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
 <summary>
 Relabel packets to hadoop_datanode_client the packet type.
 </summary>
@@ -29600,7 +29417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31200">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
 <summary>
 Send hadoop_datanode_server packets.
 </summary>
@@ -29611,7 +29428,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31219">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
 <summary>
 Do not audit attempts to send hadoop_datanode_server packets.
 </summary>
@@ -29622,7 +29439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31238">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
 <summary>
 Receive hadoop_datanode_server packets.
 </summary>
@@ -29633,7 +29450,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31257">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
 <summary>
 Do not audit attempts to receive hadoop_datanode_server packets.
 </summary>
@@ -29644,7 +29461,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31276">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
 <summary>
 Send and receive hadoop_datanode_server packets.
 </summary>
@@ -29655,7 +29472,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31292">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_server packets.
 </summary>
@@ -29666,7 +29483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31307">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
 <summary>
 Relabel packets to hadoop_datanode_server the packet type.
 </summary>
@@ -29676,7 +29493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31329">
+<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
 <summary>
 Send and receive TCP traffic on the hadoop_namenode port.
 </summary>
@@ -29687,7 +29504,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31344">
+<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
 <summary>
 Send UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29698,7 +29515,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31359">
+<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
 <summary>
 Do not audit attempts to send UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29709,7 +29526,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31374">
+<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
 <summary>
 Receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29720,7 +29537,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31389">
+<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
 <summary>
 Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29731,7 +29548,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31404">
+<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
 <summary>
 Send and receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29742,7 +29559,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31420">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hadoop_namenode port.
@@ -29754,7 +29571,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31435">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
 <summary>
 Bind TCP sockets to the hadoop_namenode port.
 </summary>
@@ -29765,7 +29582,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31455">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
 <summary>
 Bind UDP sockets to the hadoop_namenode port.
 </summary>
@@ -29776,7 +29593,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31474">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
 <summary>
 Make a TCP connection to the hadoop_namenode port.
 </summary>
@@ -29786,7 +29603,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31494">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
 <summary>
 Send hadoop_namenode_client packets.
 </summary>
@@ -29797,7 +29614,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31513">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
 <summary>
 Do not audit attempts to send hadoop_namenode_client packets.
 </summary>
@@ -29808,7 +29625,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31532">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
 <summary>
 Receive hadoop_namenode_client packets.
 </summary>
@@ -29819,7 +29636,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31551">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
 <summary>
 Do not audit attempts to receive hadoop_namenode_client packets.
 </summary>
@@ -29830,7 +29647,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31570">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
 <summary>
 Send and receive hadoop_namenode_client packets.
 </summary>
@@ -29841,7 +29658,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31586">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_client packets.
 </summary>
@@ -29852,7 +29669,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31601">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
 <summary>
 Relabel packets to hadoop_namenode_client the packet type.
 </summary>
@@ -29862,7 +29679,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31621">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
 <summary>
 Send hadoop_namenode_server packets.
 </summary>
@@ -29873,7 +29690,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31640">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
 <summary>
 Do not audit attempts to send hadoop_namenode_server packets.
 </summary>
@@ -29884,7 +29701,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31659">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
 <summary>
 Receive hadoop_namenode_server packets.
 </summary>
@@ -29895,7 +29712,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31678">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
 <summary>
 Do not audit attempts to receive hadoop_namenode_server packets.
 </summary>
@@ -29906,7 +29723,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31697">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
 <summary>
 Send and receive hadoop_namenode_server packets.
 </summary>
@@ -29917,7 +29734,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31713">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_server packets.
 </summary>
@@ -29928,7 +29745,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31728">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
 <summary>
 Relabel packets to hadoop_namenode_server the packet type.
 </summary>
@@ -29938,7 +29755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31750">
+<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
 <summary>
 Send and receive TCP traffic on the hddtemp port.
 </summary>
@@ -29949,7 +29766,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31765">
+<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
 <summary>
 Send UDP traffic on the hddtemp port.
 </summary>
@@ -29960,7 +29777,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31780">
+<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
 <summary>
 Do not audit attempts to send UDP traffic on the hddtemp port.
 </summary>
@@ -29971,7 +29788,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31795">
+<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
 <summary>
 Receive UDP traffic on the hddtemp port.
 </summary>
@@ -29982,7 +29799,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31810">
+<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
 <summary>
 Do not audit attempts to receive UDP traffic on the hddtemp port.
 </summary>
@@ -29993,7 +29810,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31825">
+<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
 <summary>
 Send and receive UDP traffic on the hddtemp port.
 </summary>
@@ -30004,7 +29821,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31841">
+<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hddtemp port.
@@ -30016,7 +29833,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31856">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
 <summary>
 Bind TCP sockets to the hddtemp port.
 </summary>
@@ -30027,7 +29844,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="31876">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
 <summary>
 Bind UDP sockets to the hddtemp port.
 </summary>
@@ -30038,7 +29855,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="31895">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
 <summary>
 Make a TCP connection to the hddtemp port.
 </summary>
@@ -30048,7 +29865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="31915">
+<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
 <summary>
 Send hddtemp_client packets.
 </summary>
@@ -30059,7 +29876,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="31934">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
 <summary>
 Do not audit attempts to send hddtemp_client packets.
 </summary>
@@ -30070,7 +29887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="31953">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
 <summary>
 Receive hddtemp_client packets.
 </summary>
@@ -30081,7 +29898,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="31972">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
 <summary>
 Do not audit attempts to receive hddtemp_client packets.
 </summary>
@@ -30092,7 +29909,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="31991">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
 <summary>
 Send and receive hddtemp_client packets.
 </summary>
@@ -30103,7 +29920,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32007">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
 <summary>
 Do not audit attempts to send and receive hddtemp_client packets.
 </summary>
@@ -30114,7 +29931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32022">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
 <summary>
 Relabel packets to hddtemp_client the packet type.
 </summary>
@@ -30124,7 +29941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32042">
+<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
 <summary>
 Send hddtemp_server packets.
 </summary>
@@ -30135,7 +29952,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32061">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
 <summary>
 Do not audit attempts to send hddtemp_server packets.
 </summary>
@@ -30146,7 +29963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32080">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
 <summary>
 Receive hddtemp_server packets.
 </summary>
@@ -30157,7 +29974,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32099">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
 <summary>
 Do not audit attempts to receive hddtemp_server packets.
 </summary>
@@ -30168,7 +29985,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32118">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
 <summary>
 Send and receive hddtemp_server packets.
 </summary>
@@ -30179,7 +29996,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32134">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
 <summary>
 Do not audit attempts to send and receive hddtemp_server packets.
 </summary>
@@ -30190,7 +30007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32149">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
 <summary>
 Relabel packets to hddtemp_server the packet type.
 </summary>
@@ -30200,7 +30017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32171">
+<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
 <summary>
 Send and receive TCP traffic on the howl port.
 </summary>
@@ -30211,7 +30028,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_howl_port" lineno="32186">
+<interface name="corenet_udp_send_howl_port" lineno="32309">
 <summary>
 Send UDP traffic on the howl port.
 </summary>
@@ -30222,7 +30039,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32201">
+<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
 <summary>
 Do not audit attempts to send UDP traffic on the howl port.
 </summary>
@@ -30233,7 +30050,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32216">
+<interface name="corenet_udp_receive_howl_port" lineno="32339">
 <summary>
 Receive UDP traffic on the howl port.
 </summary>
@@ -30244,7 +30061,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32231">
+<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
 <summary>
 Do not audit attempts to receive UDP traffic on the howl port.
 </summary>
@@ -30255,7 +30072,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32246">
+<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
 <summary>
 Send and receive UDP traffic on the howl port.
 </summary>
@@ -30266,7 +30083,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32262">
+<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the howl port.
@@ -30278,7 +30095,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32277">
+<interface name="corenet_tcp_bind_howl_port" lineno="32400">
 <summary>
 Bind TCP sockets to the howl port.
 </summary>
@@ -30289,7 +30106,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32297">
+<interface name="corenet_udp_bind_howl_port" lineno="32420">
 <summary>
 Bind UDP sockets to the howl port.
 </summary>
@@ -30300,7 +30117,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32316">
+<interface name="corenet_tcp_connect_howl_port" lineno="32439">
 <summary>
 Make a TCP connection to the howl port.
 </summary>
@@ -30310,7 +30127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_client_packets" lineno="32336">
+<interface name="corenet_send_howl_client_packets" lineno="32459">
 <summary>
 Send howl_client packets.
 </summary>
@@ -30321,7 +30138,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32355">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
 <summary>
 Do not audit attempts to send howl_client packets.
 </summary>
@@ -30332,7 +30149,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32374">
+<interface name="corenet_receive_howl_client_packets" lineno="32497">
 <summary>
 Receive howl_client packets.
 </summary>
@@ -30343,7 +30160,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32393">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
 <summary>
 Do not audit attempts to receive howl_client packets.
 </summary>
@@ -30354,7 +30171,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32412">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
 <summary>
 Send and receive howl_client packets.
 </summary>
@@ -30365,7 +30182,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32428">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
 <summary>
 Do not audit attempts to send and receive howl_client packets.
 </summary>
@@ -30376,7 +30193,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32443">
+<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
 <summary>
 Relabel packets to howl_client the packet type.
 </summary>
@@ -30386,7 +30203,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_server_packets" lineno="32463">
+<interface name="corenet_send_howl_server_packets" lineno="32586">
 <summary>
 Send howl_server packets.
 </summary>
@@ -30397,7 +30214,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32482">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
 <summary>
 Do not audit attempts to send howl_server packets.
 </summary>
@@ -30408,7 +30225,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32501">
+<interface name="corenet_receive_howl_server_packets" lineno="32624">
 <summary>
 Receive howl_server packets.
 </summary>
@@ -30419,7 +30236,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32520">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
 <summary>
 Do not audit attempts to receive howl_server packets.
 </summary>
@@ -30430,7 +30247,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32539">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
 <summary>
 Send and receive howl_server packets.
 </summary>
@@ -30441,7 +30258,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32555">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
 <summary>
 Do not audit attempts to send and receive howl_server packets.
 </summary>
@@ -30452,7 +30269,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32570">
+<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
 <summary>
 Relabel packets to howl_server the packet type.
 </summary>
@@ -30462,7 +30279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32592">
+<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
 <summary>
 Send and receive TCP traffic on the hplip port.
 </summary>
@@ -30473,7 +30290,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32607">
+<interface name="corenet_udp_send_hplip_port" lineno="32730">
 <summary>
 Send UDP traffic on the hplip port.
 </summary>
@@ -30484,7 +30301,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32622">
+<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
 <summary>
 Do not audit attempts to send UDP traffic on the hplip port.
 </summary>
@@ -30495,7 +30312,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32637">
+<interface name="corenet_udp_receive_hplip_port" lineno="32760">
 <summary>
 Receive UDP traffic on the hplip port.
 </summary>
@@ -30506,7 +30323,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32652">
+<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
 <summary>
 Do not audit attempts to receive UDP traffic on the hplip port.
 </summary>
@@ -30517,7 +30334,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32667">
+<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
 <summary>
 Send and receive UDP traffic on the hplip port.
 </summary>
@@ -30528,7 +30345,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32683">
+<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hplip port.
@@ -30540,7 +30357,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32698">
+<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
 <summary>
 Bind TCP sockets to the hplip port.
 </summary>
@@ -30551,7 +30368,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32718">
+<interface name="corenet_udp_bind_hplip_port" lineno="32841">
 <summary>
 Bind UDP sockets to the hplip port.
 </summary>
@@ -30562,7 +30379,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32737">
+<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
 <summary>
 Make a TCP connection to the hplip port.
 </summary>
@@ -30572,7 +30389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32757">
+<interface name="corenet_send_hplip_client_packets" lineno="32880">
 <summary>
 Send hplip_client packets.
 </summary>
@@ -30583,7 +30400,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32776">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
 <summary>
 Do not audit attempts to send hplip_client packets.
 </summary>
@@ -30594,7 +30411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32795">
+<interface name="corenet_receive_hplip_client_packets" lineno="32918">
 <summary>
 Receive hplip_client packets.
 </summary>
@@ -30605,7 +30422,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32814">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
 <summary>
 Do not audit attempts to receive hplip_client packets.
 </summary>
@@ -30616,7 +30433,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32833">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
 <summary>
 Send and receive hplip_client packets.
 </summary>
@@ -30627,7 +30444,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32849">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
 <summary>
 Do not audit attempts to send and receive hplip_client packets.
 </summary>
@@ -30638,7 +30455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="32864">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
 <summary>
 Relabel packets to hplip_client the packet type.
 </summary>
@@ -30648,7 +30465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_server_packets" lineno="32884">
+<interface name="corenet_send_hplip_server_packets" lineno="33007">
 <summary>
 Send hplip_server packets.
 </summary>
@@ -30659,7 +30476,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="32903">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
 <summary>
 Do not audit attempts to send hplip_server packets.
 </summary>
@@ -30670,7 +30487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="32922">
+<interface name="corenet_receive_hplip_server_packets" lineno="33045">
 <summary>
 Receive hplip_server packets.
 </summary>
@@ -30681,7 +30498,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="32941">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
 <summary>
 Do not audit attempts to receive hplip_server packets.
 </summary>
@@ -30692,7 +30509,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="32960">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
 <summary>
 Send and receive hplip_server packets.
 </summary>
@@ -30703,7 +30520,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="32976">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
 <summary>
 Do not audit attempts to send and receive hplip_server packets.
 </summary>
@@ -30714,7 +30531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="32991">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
 <summary>
 Relabel packets to hplip_server the packet type.
 </summary>
@@ -30724,7 +30541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33013">
+<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
 <summary>
 Send and receive TCP traffic on the http port.
 </summary>
@@ -30735,7 +30552,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_http_port" lineno="33028">
+<interface name="corenet_udp_send_http_port" lineno="33151">
 <summary>
 Send UDP traffic on the http port.
 </summary>
@@ -30746,7 +30563,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33043">
+<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
 <summary>
 Do not audit attempts to send UDP traffic on the http port.
 </summary>
@@ -30757,7 +30574,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_http_port" lineno="33058">
+<interface name="corenet_udp_receive_http_port" lineno="33181">
 <summary>
 Receive UDP traffic on the http port.
 </summary>
@@ -30768,7 +30585,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33073">
+<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
 <summary>
 Do not audit attempts to receive UDP traffic on the http port.
 </summary>
@@ -30779,7 +30596,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33088">
+<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
 <summary>
 Send and receive UDP traffic on the http port.
 </summary>
@@ -30790,7 +30607,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33104">
+<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the http port.
@@ -30802,7 +30619,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33119">
+<interface name="corenet_tcp_bind_http_port" lineno="33242">
 <summary>
 Bind TCP sockets to the http port.
 </summary>
@@ -30813,7 +30630,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_port" lineno="33139">
+<interface name="corenet_udp_bind_http_port" lineno="33262">
 <summary>
 Bind UDP sockets to the http port.
 </summary>
@@ -30824,7 +30641,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33158">
+<interface name="corenet_tcp_connect_http_port" lineno="33281">
 <summary>
 Make a TCP connection to the http port.
 </summary>
@@ -30834,7 +30651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_client_packets" lineno="33178">
+<interface name="corenet_send_http_client_packets" lineno="33301">
 <summary>
 Send http_client packets.
 </summary>
@@ -30845,7 +30662,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33197">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
 <summary>
 Do not audit attempts to send http_client packets.
 </summary>
@@ -30856,7 +30673,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_client_packets" lineno="33216">
+<interface name="corenet_receive_http_client_packets" lineno="33339">
 <summary>
 Receive http_client packets.
 </summary>
@@ -30867,7 +30684,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33235">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
 <summary>
 Do not audit attempts to receive http_client packets.
 </summary>
@@ -30878,7 +30695,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33254">
+<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
 <summary>
 Send and receive http_client packets.
 </summary>
@@ -30889,7 +30706,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33270">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
 <summary>
 Do not audit attempts to send and receive http_client packets.
 </summary>
@@ -30900,7 +30717,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33285">
+<interface name="corenet_relabelto_http_client_packets" lineno="33408">
 <summary>
 Relabel packets to http_client the packet type.
 </summary>
@@ -30910,7 +30727,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_server_packets" lineno="33305">
+<interface name="corenet_send_http_server_packets" lineno="33428">
 <summary>
 Send http_server packets.
 </summary>
@@ -30921,7 +30738,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33324">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
 <summary>
 Do not audit attempts to send http_server packets.
 </summary>
@@ -30932,7 +30749,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_server_packets" lineno="33343">
+<interface name="corenet_receive_http_server_packets" lineno="33466">
 <summary>
 Receive http_server packets.
 </summary>
@@ -30943,7 +30760,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33362">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
 <summary>
 Do not audit attempts to receive http_server packets.
 </summary>
@@ -30954,7 +30771,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33381">
+<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
 <summary>
 Send and receive http_server packets.
 </summary>
@@ -30965,7 +30782,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33397">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
 <summary>
 Do not audit attempts to send and receive http_server packets.
 </summary>
@@ -30976,7 +30793,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33412">
+<interface name="corenet_relabelto_http_server_packets" lineno="33535">
 <summary>
 Relabel packets to http_server the packet type.
 </summary>
@@ -30986,7 +30803,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33434">
+<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
 <summary>
 Send and receive TCP traffic on the http_cache port.
 </summary>
@@ -30997,7 +30814,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33449">
+<interface name="corenet_udp_send_http_cache_port" lineno="33572">
 <summary>
 Send UDP traffic on the http_cache port.
 </summary>
@@ -31008,7 +30825,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33464">
+<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
 <summary>
 Do not audit attempts to send UDP traffic on the http_cache port.
 </summary>
@@ -31019,7 +30836,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33479">
+<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
 <summary>
 Receive UDP traffic on the http_cache port.
 </summary>
@@ -31030,7 +30847,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33494">
+<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
 <summary>
 Do not audit attempts to receive UDP traffic on the http_cache port.
 </summary>
@@ -31041,7 +30858,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33509">
+<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
 <summary>
 Send and receive UDP traffic on the http_cache port.
 </summary>
@@ -31052,7 +30869,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33525">
+<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the http_cache port.
@@ -31064,7 +30881,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33540">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
 <summary>
 Bind TCP sockets to the http_cache port.
 </summary>
@@ -31075,7 +30892,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33560">
+<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
 <summary>
 Bind UDP sockets to the http_cache port.
 </summary>
@@ -31086,7 +30903,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33579">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
 <summary>
 Make a TCP connection to the http_cache port.
 </summary>
@@ -31096,7 +30913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33599">
+<interface name="corenet_send_http_cache_client_packets" lineno="33722">
 <summary>
 Send http_cache_client packets.
 </summary>
@@ -31107,7 +30924,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33618">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
 <summary>
 Do not audit attempts to send http_cache_client packets.
 </summary>
@@ -31118,7 +30935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33637">
+<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
 <summary>
 Receive http_cache_client packets.
 </summary>
@@ -31129,7 +30946,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33656">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
 <summary>
 Do not audit attempts to receive http_cache_client packets.
 </summary>
@@ -31140,7 +30957,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33675">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
 <summary>
 Send and receive http_cache_client packets.
 </summary>
@@ -31151,7 +30968,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33691">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
 <summary>
 Do not audit attempts to send and receive http_cache_client packets.
 </summary>
@@ -31162,7 +30979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33706">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
 <summary>
 Relabel packets to http_cache_client the packet type.
 </summary>
@@ -31172,7 +30989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33726">
+<interface name="corenet_send_http_cache_server_packets" lineno="33849">
 <summary>
 Send http_cache_server packets.
 </summary>
@@ -31183,7 +31000,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33745">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
 <summary>
 Do not audit attempts to send http_cache_server packets.
 </summary>
@@ -31194,7 +31011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33764">
+<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
 <summary>
 Receive http_cache_server packets.
 </summary>
@@ -31205,7 +31022,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33783">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
 <summary>
 Do not audit attempts to receive http_cache_server packets.
 </summary>
@@ -31216,7 +31033,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33802">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
 <summary>
 Send and receive http_cache_server packets.
 </summary>
@@ -31227,7 +31044,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33818">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
 <summary>
 Do not audit attempts to send and receive http_cache_server packets.
 </summary>
@@ -31238,7 +31055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33833">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
 <summary>
 Relabel packets to http_cache_server the packet type.
 </summary>
@@ -31248,7 +31065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33855">
+<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
 <summary>
 Send and receive TCP traffic on the i18n_input port.
 </summary>
@@ -31259,7 +31076,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="33870">
+<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
 <summary>
 Send UDP traffic on the i18n_input port.
 </summary>
@@ -31270,7 +31087,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="33885">
+<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
 <summary>
 Do not audit attempts to send UDP traffic on the i18n_input port.
 </summary>
@@ -31281,7 +31098,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="33900">
+<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
 <summary>
 Receive UDP traffic on the i18n_input port.
 </summary>
@@ -31292,7 +31109,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="33915">
+<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
 <summary>
 Do not audit attempts to receive UDP traffic on the i18n_input port.
 </summary>
@@ -31303,7 +31120,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="33930">
+<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
 <summary>
 Send and receive UDP traffic on the i18n_input port.
 </summary>
@@ -31314,7 +31131,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="33946">
+<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the i18n_input port.
@@ -31326,7 +31143,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="33961">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
 <summary>
 Bind TCP sockets to the i18n_input port.
 </summary>
@@ -31337,7 +31154,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="33981">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
 <summary>
 Bind UDP sockets to the i18n_input port.
 </summary>
@@ -31348,7 +31165,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34000">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
 <summary>
 Make a TCP connection to the i18n_input port.
 </summary>
@@ -31358,7 +31175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34020">
+<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
 <summary>
 Send i18n_input_client packets.
 </summary>
@@ -31369,7 +31186,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34039">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
 <summary>
 Do not audit attempts to send i18n_input_client packets.
 </summary>
@@ -31380,7 +31197,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34058">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
 <summary>
 Receive i18n_input_client packets.
 </summary>
@@ -31391,7 +31208,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34077">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
 <summary>
 Do not audit attempts to receive i18n_input_client packets.
 </summary>
@@ -31402,7 +31219,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34096">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
 <summary>
 Send and receive i18n_input_client packets.
 </summary>
@@ -31413,7 +31230,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34112">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
 <summary>
 Do not audit attempts to send and receive i18n_input_client packets.
 </summary>
@@ -31424,7 +31241,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34127">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
 <summary>
 Relabel packets to i18n_input_client the packet type.
 </summary>
@@ -31434,7 +31251,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34147">
+<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
 <summary>
 Send i18n_input_server packets.
 </summary>
@@ -31445,7 +31262,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34166">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
 <summary>
 Do not audit attempts to send i18n_input_server packets.
 </summary>
@@ -31456,7 +31273,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34185">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
 <summary>
 Receive i18n_input_server packets.
 </summary>
@@ -31467,7 +31284,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34204">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
 <summary>
 Do not audit attempts to receive i18n_input_server packets.
 </summary>
@@ -31478,7 +31295,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34223">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
 <summary>
 Send and receive i18n_input_server packets.
 </summary>
@@ -31489,7 +31306,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34239">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
 <summary>
 Do not audit attempts to send and receive i18n_input_server packets.
 </summary>
@@ -31500,7 +31317,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34254">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
 <summary>
 Relabel packets to i18n_input_server the packet type.
 </summary>
@@ -31510,7 +31327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34276">
+<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
 <summary>
 Send and receive TCP traffic on the imaze port.
 </summary>
@@ -31521,7 +31338,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34291">
+<interface name="corenet_udp_send_imaze_port" lineno="34414">
 <summary>
 Send UDP traffic on the imaze port.
 </summary>
@@ -31532,7 +31349,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34306">
+<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
 <summary>
 Do not audit attempts to send UDP traffic on the imaze port.
 </summary>
@@ -31543,7 +31360,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34321">
+<interface name="corenet_udp_receive_imaze_port" lineno="34444">
 <summary>
 Receive UDP traffic on the imaze port.
 </summary>
@@ -31554,7 +31371,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34336">
+<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
 <summary>
 Do not audit attempts to receive UDP traffic on the imaze port.
 </summary>
@@ -31565,7 +31382,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34351">
+<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
 <summary>
 Send and receive UDP traffic on the imaze port.
 </summary>
@@ -31576,7 +31393,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34367">
+<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the imaze port.
@@ -31588,7 +31405,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34382">
+<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
 <summary>
 Bind TCP sockets to the imaze port.
 </summary>
@@ -31599,7 +31416,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34402">
+<interface name="corenet_udp_bind_imaze_port" lineno="34525">
 <summary>
 Bind UDP sockets to the imaze port.
 </summary>
@@ -31610,7 +31427,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34421">
+<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
 <summary>
 Make a TCP connection to the imaze port.
 </summary>
@@ -31620,7 +31437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34441">
+<interface name="corenet_send_imaze_client_packets" lineno="34564">
 <summary>
 Send imaze_client packets.
 </summary>
@@ -31631,7 +31448,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34460">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
 <summary>
 Do not audit attempts to send imaze_client packets.
 </summary>
@@ -31642,7 +31459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34479">
+<interface name="corenet_receive_imaze_client_packets" lineno="34602">
 <summary>
 Receive imaze_client packets.
 </summary>
@@ -31653,7 +31470,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34498">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
 <summary>
 Do not audit attempts to receive imaze_client packets.
 </summary>
@@ -31664,7 +31481,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34517">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
 <summary>
 Send and receive imaze_client packets.
 </summary>
@@ -31675,7 +31492,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34533">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
 <summary>
 Do not audit attempts to send and receive imaze_client packets.
 </summary>
@@ -31686,7 +31503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34548">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
 <summary>
 Relabel packets to imaze_client the packet type.
 </summary>
@@ -31696,7 +31513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34568">
+<interface name="corenet_send_imaze_server_packets" lineno="34691">
 <summary>
 Send imaze_server packets.
 </summary>
@@ -31707,7 +31524,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34587">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
 <summary>
 Do not audit attempts to send imaze_server packets.
 </summary>
@@ -31718,7 +31535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34606">
+<interface name="corenet_receive_imaze_server_packets" lineno="34729">
 <summary>
 Receive imaze_server packets.
 </summary>
@@ -31729,7 +31546,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34625">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
 <summary>
 Do not audit attempts to receive imaze_server packets.
 </summary>
@@ -31740,7 +31557,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34644">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
 <summary>
 Send and receive imaze_server packets.
 </summary>
@@ -31751,7 +31568,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34660">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
 <summary>
 Do not audit attempts to send and receive imaze_server packets.
 </summary>
@@ -31762,7 +31579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34675">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
 <summary>
 Relabel packets to imaze_server the packet type.
 </summary>
@@ -31772,7 +31589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34697">
+<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
 <summary>
 Send and receive TCP traffic on the inetd_child port.
 </summary>
@@ -31783,7 +31600,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34712">
+<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
 <summary>
 Send UDP traffic on the inetd_child port.
 </summary>
@@ -31794,7 +31611,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34727">
+<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
 <summary>
 Do not audit attempts to send UDP traffic on the inetd_child port.
 </summary>
@@ -31805,7 +31622,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34742">
+<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
 <summary>
 Receive UDP traffic on the inetd_child port.
 </summary>
@@ -31816,7 +31633,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34757">
+<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
 <summary>
 Do not audit attempts to receive UDP traffic on the inetd_child port.
 </summary>
@@ -31827,7 +31644,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34772">
+<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
 <summary>
 Send and receive UDP traffic on the inetd_child port.
 </summary>
@@ -31838,7 +31655,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34788">
+<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the inetd_child port.
@@ -31850,7 +31667,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34803">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
 <summary>
 Bind TCP sockets to the inetd_child port.
 </summary>
@@ -31861,7 +31678,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34823">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
 <summary>
 Bind UDP sockets to the inetd_child port.
 </summary>
@@ -31872,7 +31689,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34842">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
 <summary>
 Make a TCP connection to the inetd_child port.
 </summary>
@@ -31882,7 +31699,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="34862">
+<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
 <summary>
 Send inetd_child_client packets.
 </summary>
@@ -31893,7 +31710,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="34881">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
 <summary>
 Do not audit attempts to send inetd_child_client packets.
 </summary>
@@ -31904,7 +31721,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="34900">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
 <summary>
 Receive inetd_child_client packets.
 </summary>
@@ -31915,7 +31732,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="34919">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
 <summary>
 Do not audit attempts to receive inetd_child_client packets.
 </summary>
@@ -31926,7 +31743,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="34938">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
 <summary>
 Send and receive inetd_child_client packets.
 </summary>
@@ -31937,7 +31754,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="34954">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
 <summary>
 Do not audit attempts to send and receive inetd_child_client packets.
 </summary>
@@ -31948,7 +31765,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="34969">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
 <summary>
 Relabel packets to inetd_child_client the packet type.
 </summary>
@@ -31958,7 +31775,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="34989">
+<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
 <summary>
 Send inetd_child_server packets.
 </summary>
@@ -31969,7 +31786,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35008">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
 <summary>
 Do not audit attempts to send inetd_child_server packets.
 </summary>
@@ -31980,7 +31797,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35027">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
 <summary>
 Receive inetd_child_server packets.
 </summary>
@@ -31991,7 +31808,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35046">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
 <summary>
 Do not audit attempts to receive inetd_child_server packets.
 </summary>
@@ -32002,7 +31819,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35065">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
 <summary>
 Send and receive inetd_child_server packets.
 </summary>
@@ -32013,7 +31830,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35081">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
 <summary>
 Do not audit attempts to send and receive inetd_child_server packets.
 </summary>
@@ -32024,7 +31841,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35096">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
 <summary>
 Relabel packets to inetd_child_server the packet type.
 </summary>
@@ -32034,7 +31851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35118">
+<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
 <summary>
 Send and receive TCP traffic on the innd port.
 </summary>
@@ -32045,7 +31862,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_innd_port" lineno="35133">
+<interface name="corenet_udp_send_innd_port" lineno="35256">
 <summary>
 Send UDP traffic on the innd port.
 </summary>
@@ -32056,7 +31873,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35148">
+<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
 <summary>
 Do not audit attempts to send UDP traffic on the innd port.
 </summary>
@@ -32067,7 +31884,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35163">
+<interface name="corenet_udp_receive_innd_port" lineno="35286">
 <summary>
 Receive UDP traffic on the innd port.
 </summary>
@@ -32078,7 +31895,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35178">
+<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
 <summary>
 Do not audit attempts to receive UDP traffic on the innd port.
 </summary>
@@ -32089,7 +31906,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35193">
+<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
 <summary>
 Send and receive UDP traffic on the innd port.
 </summary>
@@ -32100,7 +31917,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35209">
+<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the innd port.
@@ -32112,7 +31929,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35224">
+<interface name="corenet_tcp_bind_innd_port" lineno="35347">
 <summary>
 Bind TCP sockets to the innd port.
 </summary>
@@ -32123,7 +31940,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35244">
+<interface name="corenet_udp_bind_innd_port" lineno="35367">
 <summary>
 Bind UDP sockets to the innd port.
 </summary>
@@ -32134,7 +31951,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35263">
+<interface name="corenet_tcp_connect_innd_port" lineno="35386">
 <summary>
 Make a TCP connection to the innd port.
 </summary>
@@ -32144,7 +31961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_client_packets" lineno="35283">
+<interface name="corenet_send_innd_client_packets" lineno="35406">
 <summary>
 Send innd_client packets.
 </summary>
@@ -32155,7 +31972,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35302">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
 <summary>
 Do not audit attempts to send innd_client packets.
 </summary>
@@ -32166,7 +31983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35321">
+<interface name="corenet_receive_innd_client_packets" lineno="35444">
 <summary>
 Receive innd_client packets.
 </summary>
@@ -32177,7 +31994,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35340">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
 <summary>
 Do not audit attempts to receive innd_client packets.
 </summary>
@@ -32188,7 +32005,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35359">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
 <summary>
 Send and receive innd_client packets.
 </summary>
@@ -32199,7 +32016,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35375">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
 <summary>
 Do not audit attempts to send and receive innd_client packets.
 </summary>
@@ -32210,7 +32027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35390">
+<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
 <summary>
 Relabel packets to innd_client the packet type.
 </summary>
@@ -32220,7 +32037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_server_packets" lineno="35410">
+<interface name="corenet_send_innd_server_packets" lineno="35533">
 <summary>
 Send innd_server packets.
 </summary>
@@ -32231,7 +32048,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35429">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
 <summary>
 Do not audit attempts to send innd_server packets.
 </summary>
@@ -32242,7 +32059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35448">
+<interface name="corenet_receive_innd_server_packets" lineno="35571">
 <summary>
 Receive innd_server packets.
 </summary>
@@ -32253,7 +32070,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35467">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
 <summary>
 Do not audit attempts to receive innd_server packets.
 </summary>
@@ -32264,7 +32081,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35486">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
 <summary>
 Send and receive innd_server packets.
 </summary>
@@ -32275,7 +32092,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35502">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
 <summary>
 Do not audit attempts to send and receive innd_server packets.
 </summary>
@@ -32286,7 +32103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35517">
+<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
 <summary>
 Relabel packets to innd_server the packet type.
 </summary>
@@ -32296,7 +32113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35539">
+<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
 <summary>
 Send and receive TCP traffic on the interwise port.
 </summary>
@@ -32307,7 +32124,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35554">
+<interface name="corenet_udp_send_interwise_port" lineno="35677">
 <summary>
 Send UDP traffic on the interwise port.
 </summary>
@@ -32318,7 +32135,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35569">
+<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
 <summary>
 Do not audit attempts to send UDP traffic on the interwise port.
 </summary>
@@ -32329,7 +32146,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35584">
+<interface name="corenet_udp_receive_interwise_port" lineno="35707">
 <summary>
 Receive UDP traffic on the interwise port.
 </summary>
@@ -32340,7 +32157,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35599">
+<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
 <summary>
 Do not audit attempts to receive UDP traffic on the interwise port.
 </summary>
@@ -32351,7 +32168,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35614">
+<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
 <summary>
 Send and receive UDP traffic on the interwise port.
 </summary>
@@ -32362,7 +32179,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35630">
+<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the interwise port.
@@ -32374,7 +32191,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35645">
+<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
 <summary>
 Bind TCP sockets to the interwise port.
 </summary>
@@ -32385,7 +32202,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35665">
+<interface name="corenet_udp_bind_interwise_port" lineno="35788">
 <summary>
 Bind UDP sockets to the interwise port.
 </summary>
@@ -32396,7 +32213,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35684">
+<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
 <summary>
 Make a TCP connection to the interwise port.
 </summary>
@@ -32406,7 +32223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35704">
+<interface name="corenet_send_interwise_client_packets" lineno="35827">
 <summary>
 Send interwise_client packets.
 </summary>
@@ -32417,7 +32234,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35723">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
 <summary>
 Do not audit attempts to send interwise_client packets.
 </summary>
@@ -32428,7 +32245,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35742">
+<interface name="corenet_receive_interwise_client_packets" lineno="35865">
 <summary>
 Receive interwise_client packets.
 </summary>
@@ -32439,7 +32256,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35761">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
 <summary>
 Do not audit attempts to receive interwise_client packets.
 </summary>
@@ -32450,7 +32267,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35780">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
 <summary>
 Send and receive interwise_client packets.
 </summary>
@@ -32461,7 +32278,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35796">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
 <summary>
 Do not audit attempts to send and receive interwise_client packets.
 </summary>
@@ -32472,7 +32289,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35811">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
 <summary>
 Relabel packets to interwise_client the packet type.
 </summary>
@@ -32482,7 +32299,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35831">
+<interface name="corenet_send_interwise_server_packets" lineno="35954">
 <summary>
 Send interwise_server packets.
 </summary>
@@ -32493,7 +32310,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35850">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
 <summary>
 Do not audit attempts to send interwise_server packets.
 </summary>
@@ -32504,7 +32321,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="35869">
+<interface name="corenet_receive_interwise_server_packets" lineno="35992">
 <summary>
 Receive interwise_server packets.
 </summary>
@@ -32515,7 +32332,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="35888">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
 <summary>
 Do not audit attempts to receive interwise_server packets.
 </summary>
@@ -32526,7 +32343,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="35907">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
 <summary>
 Send and receive interwise_server packets.
 </summary>
@@ -32537,7 +32354,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="35923">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
 <summary>
 Do not audit attempts to send and receive interwise_server packets.
 </summary>
@@ -32548,7 +32365,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="35938">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
 <summary>
 Relabel packets to interwise_server the packet type.
 </summary>
@@ -32558,7 +32375,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35960">
+<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
 <summary>
 Send and receive TCP traffic on the ionixnetmon port.
 </summary>
@@ -32569,7 +32386,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="35975">
+<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
 <summary>
 Send UDP traffic on the ionixnetmon port.
 </summary>
@@ -32580,7 +32397,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="35990">
+<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
 <summary>
 Do not audit attempts to send UDP traffic on the ionixnetmon port.
 </summary>
@@ -32591,7 +32408,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36005">
+<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
 <summary>
 Receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32602,7 +32419,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36020">
+<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
 <summary>
 Do not audit attempts to receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32613,7 +32430,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36035">
+<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
 <summary>
 Send and receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32624,7 +32441,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36051">
+<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ionixnetmon port.
@@ -32636,7 +32453,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36066">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
 <summary>
 Bind TCP sockets to the ionixnetmon port.
 </summary>
@@ -32647,7 +32464,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36086">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
 <summary>
 Bind UDP sockets to the ionixnetmon port.
 </summary>
@@ -32658,7 +32475,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36105">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
 <summary>
 Make a TCP connection to the ionixnetmon port.
 </summary>
@@ -32668,7 +32485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36125">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
 <summary>
 Send ionixnetmon_client packets.
 </summary>
@@ -32679,7 +32496,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36144">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
 <summary>
 Do not audit attempts to send ionixnetmon_client packets.
 </summary>
@@ -32690,7 +32507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36163">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
 <summary>
 Receive ionixnetmon_client packets.
 </summary>
@@ -32701,7 +32518,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36182">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
 <summary>
 Do not audit attempts to receive ionixnetmon_client packets.
 </summary>
@@ -32712,7 +32529,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36201">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
 <summary>
 Send and receive ionixnetmon_client packets.
 </summary>
@@ -32723,7 +32540,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36217">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_client packets.
 </summary>
@@ -32734,7 +32551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36232">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
 <summary>
 Relabel packets to ionixnetmon_client the packet type.
 </summary>
@@ -32744,7 +32561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36252">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
 <summary>
 Send ionixnetmon_server packets.
 </summary>
@@ -32755,7 +32572,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36271">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
 <summary>
 Do not audit attempts to send ionixnetmon_server packets.
 </summary>
@@ -32766,7 +32583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36290">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
 <summary>
 Receive ionixnetmon_server packets.
 </summary>
@@ -32777,7 +32594,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36309">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
 <summary>
 Do not audit attempts to receive ionixnetmon_server packets.
 </summary>
@@ -32788,7 +32605,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36328">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
 <summary>
 Send and receive ionixnetmon_server packets.
 </summary>
@@ -32799,7 +32616,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36344">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_server packets.
 </summary>
@@ -32810,7 +32627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36359">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
 <summary>
 Relabel packets to ionixnetmon_server the packet type.
 </summary>
@@ -32820,7 +32637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36381">
+<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
 <summary>
 Send and receive TCP traffic on the ipmi port.
 </summary>
@@ -32831,7 +32648,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36396">
+<interface name="corenet_udp_send_ipmi_port" lineno="36519">
 <summary>
 Send UDP traffic on the ipmi port.
 </summary>
@@ -32842,7 +32659,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36411">
+<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
 <summary>
 Do not audit attempts to send UDP traffic on the ipmi port.
 </summary>
@@ -32853,7 +32670,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36426">
+<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
 <summary>
 Receive UDP traffic on the ipmi port.
 </summary>
@@ -32864,7 +32681,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36441">
+<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipmi port.
 </summary>
@@ -32875,7 +32692,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36456">
+<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
 <summary>
 Send and receive UDP traffic on the ipmi port.
 </summary>
@@ -32886,7 +32703,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36472">
+<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipmi port.
@@ -32898,7 +32715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36487">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
 <summary>
 Bind TCP sockets to the ipmi port.
 </summary>
@@ -32909,7 +32726,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36507">
+<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
 <summary>
 Bind UDP sockets to the ipmi port.
 </summary>
@@ -32920,7 +32737,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36526">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
 <summary>
 Make a TCP connection to the ipmi port.
 </summary>
@@ -32930,7 +32747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36546">
+<interface name="corenet_send_ipmi_client_packets" lineno="36669">
 <summary>
 Send ipmi_client packets.
 </summary>
@@ -32941,7 +32758,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36565">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
 <summary>
 Do not audit attempts to send ipmi_client packets.
 </summary>
@@ -32952,7 +32769,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36584">
+<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
 <summary>
 Receive ipmi_client packets.
 </summary>
@@ -32963,7 +32780,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36603">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
 <summary>
 Do not audit attempts to receive ipmi_client packets.
 </summary>
@@ -32974,7 +32791,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36622">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
 <summary>
 Send and receive ipmi_client packets.
 </summary>
@@ -32985,7 +32802,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36638">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
 <summary>
 Do not audit attempts to send and receive ipmi_client packets.
 </summary>
@@ -32996,7 +32813,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36653">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
 <summary>
 Relabel packets to ipmi_client the packet type.
 </summary>
@@ -33006,7 +32823,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36673">
+<interface name="corenet_send_ipmi_server_packets" lineno="36796">
 <summary>
 Send ipmi_server packets.
 </summary>
@@ -33017,7 +32834,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36692">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
 <summary>
 Do not audit attempts to send ipmi_server packets.
 </summary>
@@ -33028,7 +32845,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36711">
+<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
 <summary>
 Receive ipmi_server packets.
 </summary>
@@ -33039,7 +32856,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36730">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
 <summary>
 Do not audit attempts to receive ipmi_server packets.
 </summary>
@@ -33050,7 +32867,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36749">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
 <summary>
 Send and receive ipmi_server packets.
 </summary>
@@ -33061,7 +32878,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36765">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
 <summary>
 Do not audit attempts to send and receive ipmi_server packets.
 </summary>
@@ -33072,7 +32889,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36780">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
 <summary>
 Relabel packets to ipmi_server the packet type.
 </summary>
@@ -33082,7 +32899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36802">
+<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
 <summary>
 Send and receive TCP traffic on the ipp port.
 </summary>
@@ -33093,7 +32910,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36817">
+<interface name="corenet_udp_send_ipp_port" lineno="36940">
 <summary>
 Send UDP traffic on the ipp port.
 </summary>
@@ -33104,7 +32921,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36832">
+<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
 <summary>
 Do not audit attempts to send UDP traffic on the ipp port.
 </summary>
@@ -33115,7 +32932,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36847">
+<interface name="corenet_udp_receive_ipp_port" lineno="36970">
 <summary>
 Receive UDP traffic on the ipp port.
 </summary>
@@ -33126,7 +32943,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36862">
+<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipp port.
 </summary>
@@ -33137,7 +32954,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="36877">
+<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
 <summary>
 Send and receive UDP traffic on the ipp port.
 </summary>
@@ -33148,7 +32965,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36893">
+<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipp port.
@@ -33160,7 +32977,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="36908">
+<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
 <summary>
 Bind TCP sockets to the ipp port.
 </summary>
@@ -33171,7 +32988,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="36928">
+<interface name="corenet_udp_bind_ipp_port" lineno="37051">
 <summary>
 Bind UDP sockets to the ipp port.
 </summary>
@@ -33182,7 +32999,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="36947">
+<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
 <summary>
 Make a TCP connection to the ipp port.
 </summary>
@@ -33192,7 +33009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_client_packets" lineno="36967">
+<interface name="corenet_send_ipp_client_packets" lineno="37090">
 <summary>
 Send ipp_client packets.
 </summary>
@@ -33203,7 +33020,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="36986">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
 <summary>
 Do not audit attempts to send ipp_client packets.
 </summary>
@@ -33214,7 +33031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37005">
+<interface name="corenet_receive_ipp_client_packets" lineno="37128">
 <summary>
 Receive ipp_client packets.
 </summary>
@@ -33225,7 +33042,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37024">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
 <summary>
 Do not audit attempts to receive ipp_client packets.
 </summary>
@@ -33236,7 +33053,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37043">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
 <summary>
 Send and receive ipp_client packets.
 </summary>
@@ -33247,7 +33064,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37059">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
 <summary>
 Do not audit attempts to send and receive ipp_client packets.
 </summary>
@@ -33258,7 +33075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37074">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
 <summary>
 Relabel packets to ipp_client the packet type.
 </summary>
@@ -33268,7 +33085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37094">
+<interface name="corenet_send_ipp_server_packets" lineno="37217">
 <summary>
 Send ipp_server packets.
 </summary>
@@ -33279,7 +33096,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37113">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
 <summary>
 Do not audit attempts to send ipp_server packets.
 </summary>
@@ -33290,7 +33107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37132">
+<interface name="corenet_receive_ipp_server_packets" lineno="37255">
 <summary>
 Receive ipp_server packets.
 </summary>
@@ -33301,7 +33118,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37151">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
 <summary>
 Do not audit attempts to receive ipp_server packets.
 </summary>
@@ -33312,7 +33129,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37170">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
 <summary>
 Send and receive ipp_server packets.
 </summary>
@@ -33323,7 +33140,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37186">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
 <summary>
 Do not audit attempts to send and receive ipp_server packets.
 </summary>
@@ -33334,7 +33151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37201">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
 <summary>
 Relabel packets to ipp_server the packet type.
 </summary>
@@ -33344,7 +33161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37223">
+<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
 <summary>
 Send and receive TCP traffic on the ipsecnat port.
 </summary>
@@ -33355,7 +33172,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37238">
+<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
 <summary>
 Send UDP traffic on the ipsecnat port.
 </summary>
@@ -33366,7 +33183,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37253">
+<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
 <summary>
 Do not audit attempts to send UDP traffic on the ipsecnat port.
 </summary>
@@ -33377,7 +33194,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37268">
+<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
 <summary>
 Receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33388,7 +33205,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37283">
+<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33399,7 +33216,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37298">
+<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
 <summary>
 Send and receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33410,7 +33227,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37314">
+<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipsecnat port.
@@ -33422,7 +33239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37329">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
 <summary>
 Bind TCP sockets to the ipsecnat port.
 </summary>
@@ -33433,7 +33250,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37349">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
 <summary>
 Bind UDP sockets to the ipsecnat port.
 </summary>
@@ -33444,7 +33261,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37368">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
 <summary>
 Make a TCP connection to the ipsecnat port.
 </summary>
@@ -33454,7 +33271,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37388">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
 <summary>
 Send ipsecnat_client packets.
 </summary>
@@ -33465,7 +33282,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37407">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
 <summary>
 Do not audit attempts to send ipsecnat_client packets.
 </summary>
@@ -33476,7 +33293,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37426">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
 <summary>
 Receive ipsecnat_client packets.
 </summary>
@@ -33487,7 +33304,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37445">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
 <summary>
 Do not audit attempts to receive ipsecnat_client packets.
 </summary>
@@ -33498,7 +33315,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37464">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
 <summary>
 Send and receive ipsecnat_client packets.
 </summary>
@@ -33509,7 +33326,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37480">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
 <summary>
 Do not audit attempts to send and receive ipsecnat_client packets.
 </summary>
@@ -33520,7 +33337,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37495">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
 <summary>
 Relabel packets to ipsecnat_client the packet type.
 </summary>
@@ -33530,7 +33347,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37515">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
 <summary>
 Send ipsecnat_server packets.
 </summary>
@@ -33541,7 +33358,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37534">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
 <summary>
 Do not audit attempts to send ipsecnat_server packets.
 </summary>
@@ -33552,7 +33369,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37553">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
 <summary>
 Receive ipsecnat_server packets.
 </summary>
@@ -33563,7 +33380,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37572">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
 <summary>
 Do not audit attempts to receive ipsecnat_server packets.
 </summary>
@@ -33574,7 +33391,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37591">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
 <summary>
 Send and receive ipsecnat_server packets.
 </summary>
@@ -33585,7 +33402,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37607">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
 <summary>
 Do not audit attempts to send and receive ipsecnat_server packets.
 </summary>
@@ -33596,7 +33413,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37622">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
 <summary>
 Relabel packets to ipsecnat_server the packet type.
 </summary>
@@ -33606,7 +33423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37644">
+<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
 <summary>
 Send and receive TCP traffic on the ircd port.
 </summary>
@@ -33617,7 +33434,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37659">
+<interface name="corenet_udp_send_ircd_port" lineno="37782">
 <summary>
 Send UDP traffic on the ircd port.
 </summary>
@@ -33628,7 +33445,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37674">
+<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
 <summary>
 Do not audit attempts to send UDP traffic on the ircd port.
 </summary>
@@ -33639,7 +33456,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37689">
+<interface name="corenet_udp_receive_ircd_port" lineno="37812">
 <summary>
 Receive UDP traffic on the ircd port.
 </summary>
@@ -33650,7 +33467,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37704">
+<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
 <summary>
 Do not audit attempts to receive UDP traffic on the ircd port.
 </summary>
@@ -33661,7 +33478,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37719">
+<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
 <summary>
 Send and receive UDP traffic on the ircd port.
 </summary>
@@ -33672,7 +33489,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37735">
+<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ircd port.
@@ -33684,7 +33501,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37750">
+<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
 <summary>
 Bind TCP sockets to the ircd port.
 </summary>
@@ -33695,7 +33512,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37770">
+<interface name="corenet_udp_bind_ircd_port" lineno="37893">
 <summary>
 Bind UDP sockets to the ircd port.
 </summary>
@@ -33706,7 +33523,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37789">
+<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
 <summary>
 Make a TCP connection to the ircd port.
 </summary>
@@ -33716,7 +33533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37809">
+<interface name="corenet_send_ircd_client_packets" lineno="37932">
 <summary>
 Send ircd_client packets.
 </summary>
@@ -33727,7 +33544,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37828">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
 <summary>
 Do not audit attempts to send ircd_client packets.
 </summary>
@@ -33738,7 +33555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37847">
+<interface name="corenet_receive_ircd_client_packets" lineno="37970">
 <summary>
 Receive ircd_client packets.
 </summary>
@@ -33749,7 +33566,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37866">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
 <summary>
 Do not audit attempts to receive ircd_client packets.
 </summary>
@@ -33760,7 +33577,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="37885">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
 <summary>
 Send and receive ircd_client packets.
 </summary>
@@ -33771,7 +33588,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="37901">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
 <summary>
 Do not audit attempts to send and receive ircd_client packets.
 </summary>
@@ -33782,7 +33599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="37916">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
 <summary>
 Relabel packets to ircd_client the packet type.
 </summary>
@@ -33792,7 +33609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_server_packets" lineno="37936">
+<interface name="corenet_send_ircd_server_packets" lineno="38059">
 <summary>
 Send ircd_server packets.
 </summary>
@@ -33803,7 +33620,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="37955">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
 <summary>
 Do not audit attempts to send ircd_server packets.
 </summary>
@@ -33814,7 +33631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="37974">
+<interface name="corenet_receive_ircd_server_packets" lineno="38097">
 <summary>
 Receive ircd_server packets.
 </summary>
@@ -33825,7 +33642,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="37993">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
 <summary>
 Do not audit attempts to receive ircd_server packets.
 </summary>
@@ -33836,7 +33653,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38012">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
 <summary>
 Send and receive ircd_server packets.
 </summary>
@@ -33847,7 +33664,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38028">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
 <summary>
 Do not audit attempts to send and receive ircd_server packets.
 </summary>
@@ -33858,7 +33675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38043">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
 <summary>
 Relabel packets to ircd_server the packet type.
 </summary>
@@ -33868,7 +33685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38065">
+<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
 <summary>
 Send and receive TCP traffic on the isakmp port.
 </summary>
@@ -33879,7 +33696,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38080">
+<interface name="corenet_udp_send_isakmp_port" lineno="38203">
 <summary>
 Send UDP traffic on the isakmp port.
 </summary>
@@ -33890,7 +33707,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38095">
+<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
 <summary>
 Do not audit attempts to send UDP traffic on the isakmp port.
 </summary>
@@ -33901,7 +33718,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38110">
+<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
 <summary>
 Receive UDP traffic on the isakmp port.
 </summary>
@@ -33912,7 +33729,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38125">
+<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
 <summary>
 Do not audit attempts to receive UDP traffic on the isakmp port.
 </summary>
@@ -33923,7 +33740,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38140">
+<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
 <summary>
 Send and receive UDP traffic on the isakmp port.
 </summary>
@@ -33934,7 +33751,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38156">
+<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the isakmp port.
@@ -33946,7 +33763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38171">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
 <summary>
 Bind TCP sockets to the isakmp port.
 </summary>
@@ -33957,7 +33774,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38191">
+<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
 <summary>
 Bind UDP sockets to the isakmp port.
 </summary>
@@ -33968,7 +33785,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38210">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
 <summary>
 Make a TCP connection to the isakmp port.
 </summary>
@@ -33978,7 +33795,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38230">
+<interface name="corenet_send_isakmp_client_packets" lineno="38353">
 <summary>
 Send isakmp_client packets.
 </summary>
@@ -33989,7 +33806,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38249">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
 <summary>
 Do not audit attempts to send isakmp_client packets.
 </summary>
@@ -34000,7 +33817,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38268">
+<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
 <summary>
 Receive isakmp_client packets.
 </summary>
@@ -34011,7 +33828,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38287">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
 <summary>
 Do not audit attempts to receive isakmp_client packets.
 </summary>
@@ -34022,7 +33839,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38306">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
 <summary>
 Send and receive isakmp_client packets.
 </summary>
@@ -34033,7 +33850,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38322">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
 <summary>
 Do not audit attempts to send and receive isakmp_client packets.
 </summary>
@@ -34044,7 +33861,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38337">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
 <summary>
 Relabel packets to isakmp_client the packet type.
 </summary>
@@ -34054,7 +33871,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38357">
+<interface name="corenet_send_isakmp_server_packets" lineno="38480">
 <summary>
 Send isakmp_server packets.
 </summary>
@@ -34065,7 +33882,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38376">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
 <summary>
 Do not audit attempts to send isakmp_server packets.
 </summary>
@@ -34076,7 +33893,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38395">
+<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
 <summary>
 Receive isakmp_server packets.
 </summary>
@@ -34087,7 +33904,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38414">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
 <summary>
 Do not audit attempts to receive isakmp_server packets.
 </summary>
@@ -34098,7 +33915,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38433">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
 <summary>
 Send and receive isakmp_server packets.
 </summary>
@@ -34109,7 +33926,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38449">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
 <summary>
 Do not audit attempts to send and receive isakmp_server packets.
 </summary>
@@ -34120,7 +33937,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38464">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
 <summary>
 Relabel packets to isakmp_server the packet type.
 </summary>
@@ -34130,7 +33947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38486">
+<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
 <summary>
 Send and receive TCP traffic on the iscsi port.
 </summary>
@@ -34141,7 +33958,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38501">
+<interface name="corenet_udp_send_iscsi_port" lineno="38624">
 <summary>
 Send UDP traffic on the iscsi port.
 </summary>
@@ -34152,7 +33969,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38516">
+<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
 <summary>
 Do not audit attempts to send UDP traffic on the iscsi port.
 </summary>
@@ -34163,7 +33980,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38531">
+<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
 <summary>
 Receive UDP traffic on the iscsi port.
 </summary>
@@ -34174,7 +33991,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38546">
+<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
 <summary>
 Do not audit attempts to receive UDP traffic on the iscsi port.
 </summary>
@@ -34185,7 +34002,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38561">
+<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
 <summary>
 Send and receive UDP traffic on the iscsi port.
 </summary>
@@ -34196,7 +34013,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38577">
+<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the iscsi port.
@@ -34208,7 +34025,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38592">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
 <summary>
 Bind TCP sockets to the iscsi port.
 </summary>
@@ -34219,7 +34036,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38612">
+<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
 <summary>
 Bind UDP sockets to the iscsi port.
 </summary>
@@ -34230,7 +34047,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38631">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
 <summary>
 Make a TCP connection to the iscsi port.
 </summary>
@@ -34240,7 +34057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38651">
+<interface name="corenet_send_iscsi_client_packets" lineno="38774">
 <summary>
 Send iscsi_client packets.
 </summary>
@@ -34251,7 +34068,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38670">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
 <summary>
 Do not audit attempts to send iscsi_client packets.
 </summary>
@@ -34262,7 +34079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38689">
+<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
 <summary>
 Receive iscsi_client packets.
 </summary>
@@ -34273,7 +34090,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38708">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
 <summary>
 Do not audit attempts to receive iscsi_client packets.
 </summary>
@@ -34284,7 +34101,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38727">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
 <summary>
 Send and receive iscsi_client packets.
 </summary>
@@ -34295,7 +34112,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38743">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
 <summary>
 Do not audit attempts to send and receive iscsi_client packets.
 </summary>
@@ -34306,7 +34123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38758">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
 <summary>
 Relabel packets to iscsi_client the packet type.
 </summary>
@@ -34316,7 +34133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38778">
+<interface name="corenet_send_iscsi_server_packets" lineno="38901">
 <summary>
 Send iscsi_server packets.
 </summary>
@@ -34327,7 +34144,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38797">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
 <summary>
 Do not audit attempts to send iscsi_server packets.
 </summary>
@@ -34338,7 +34155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38816">
+<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
 <summary>
 Receive iscsi_server packets.
 </summary>
@@ -34349,7 +34166,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38835">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
 <summary>
 Do not audit attempts to receive iscsi_server packets.
 </summary>
@@ -34360,7 +34177,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38854">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
 <summary>
 Send and receive iscsi_server packets.
 </summary>
@@ -34371,7 +34188,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38870">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
 <summary>
 Do not audit attempts to send and receive iscsi_server packets.
 </summary>
@@ -34382,7 +34199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="38885">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
 <summary>
 Relabel packets to iscsi_server the packet type.
 </summary>
@@ -34392,7 +34209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="38907">
+<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
 <summary>
 Send and receive TCP traffic on the isns port.
 </summary>
@@ -34403,7 +34220,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_isns_port" lineno="38922">
+<interface name="corenet_udp_send_isns_port" lineno="39045">
 <summary>
 Send UDP traffic on the isns port.
 </summary>
@@ -34414,7 +34231,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="38937">
+<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
 <summary>
 Do not audit attempts to send UDP traffic on the isns port.
 </summary>
@@ -34425,7 +34242,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_isns_port" lineno="38952">
+<interface name="corenet_udp_receive_isns_port" lineno="39075">
 <summary>
 Receive UDP traffic on the isns port.
 </summary>
@@ -34436,7 +34253,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="38967">
+<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
 <summary>
 Do not audit attempts to receive UDP traffic on the isns port.
 </summary>
@@ -34447,7 +34264,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="38982">
+<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
 <summary>
 Send and receive UDP traffic on the isns port.
 </summary>
@@ -34458,7 +34275,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="38998">
+<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the isns port.
@@ -34470,7 +34287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39013">
+<interface name="corenet_tcp_bind_isns_port" lineno="39136">
 <summary>
 Bind TCP sockets to the isns port.
 </summary>
@@ -34481,7 +34298,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39033">
+<interface name="corenet_udp_bind_isns_port" lineno="39156">
 <summary>
 Bind UDP sockets to the isns port.
 </summary>
@@ -34492,7 +34309,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39052">
+<interface name="corenet_tcp_connect_isns_port" lineno="39175">
 <summary>
 Make a TCP connection to the isns port.
 </summary>
@@ -34502,7 +34319,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_client_packets" lineno="39072">
+<interface name="corenet_send_isns_client_packets" lineno="39195">
 <summary>
 Send isns_client packets.
 </summary>
@@ -34513,7 +34330,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39091">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
 <summary>
 Do not audit attempts to send isns_client packets.
 </summary>
@@ -34524,7 +34341,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39110">
+<interface name="corenet_receive_isns_client_packets" lineno="39233">
 <summary>
 Receive isns_client packets.
 </summary>
@@ -34535,7 +34352,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39129">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
 <summary>
 Do not audit attempts to receive isns_client packets.
 </summary>
@@ -34546,7 +34363,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39148">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
 <summary>
 Send and receive isns_client packets.
 </summary>
@@ -34557,7 +34374,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39164">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
 <summary>
 Do not audit attempts to send and receive isns_client packets.
 </summary>
@@ -34568,7 +34385,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39179">
+<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
 <summary>
 Relabel packets to isns_client the packet type.
 </summary>
@@ -34578,7 +34395,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_server_packets" lineno="39199">
+<interface name="corenet_send_isns_server_packets" lineno="39322">
 <summary>
 Send isns_server packets.
 </summary>
@@ -34589,7 +34406,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39218">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
 <summary>
 Do not audit attempts to send isns_server packets.
 </summary>
@@ -34600,7 +34417,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39237">
+<interface name="corenet_receive_isns_server_packets" lineno="39360">
 <summary>
 Receive isns_server packets.
 </summary>
@@ -34611,7 +34428,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39256">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
 <summary>
 Do not audit attempts to receive isns_server packets.
 </summary>
@@ -34622,7 +34439,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39275">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
 <summary>
 Send and receive isns_server packets.
 </summary>
@@ -34633,7 +34450,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39291">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
 <summary>
 Do not audit attempts to send and receive isns_server packets.
 </summary>
@@ -34644,7 +34461,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39306">
+<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
 <summary>
 Relabel packets to isns_server the packet type.
 </summary>
@@ -34654,7 +34471,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39328">
+<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
 <summary>
 Send and receive TCP traffic on the jabber_client port.
 </summary>
@@ -34665,7 +34482,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39343">
+<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
 <summary>
 Send UDP traffic on the jabber_client port.
 </summary>
@@ -34676,7 +34493,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39358">
+<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
 <summary>
 Do not audit attempts to send UDP traffic on the jabber_client port.
 </summary>
@@ -34687,7 +34504,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39373">
+<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
 <summary>
 Receive UDP traffic on the jabber_client port.
 </summary>
@@ -34698,7 +34515,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39388">
+<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
 <summary>
 Do not audit attempts to receive UDP traffic on the jabber_client port.
 </summary>
@@ -34709,7 +34526,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39403">
+<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
 <summary>
 Send and receive UDP traffic on the jabber_client port.
 </summary>
@@ -34720,7 +34537,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39419">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jabber_client port.
@@ -34732,7 +34549,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39434">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
 <summary>
 Bind TCP sockets to the jabber_client port.
 </summary>
@@ -34743,7 +34560,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39454">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
 <summary>
 Bind UDP sockets to the jabber_client port.
 </summary>
@@ -34754,7 +34571,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39473">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
 <summary>
 Make a TCP connection to the jabber_client port.
 </summary>
@@ -34764,7 +34581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39493">
+<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
 <summary>
 Send jabber_client_client packets.
 </summary>
@@ -34775,7 +34592,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39512">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
 <summary>
 Do not audit attempts to send jabber_client_client packets.
 </summary>
@@ -34786,7 +34603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39531">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
 <summary>
 Receive jabber_client_client packets.
 </summary>
@@ -34797,7 +34614,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39550">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
 <summary>
 Do not audit attempts to receive jabber_client_client packets.
 </summary>
@@ -34808,7 +34625,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39569">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
 <summary>
 Send and receive jabber_client_client packets.
 </summary>
@@ -34819,7 +34636,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39585">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
 <summary>
 Do not audit attempts to send and receive jabber_client_client packets.
 </summary>
@@ -34830,7 +34647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39600">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
 <summary>
 Relabel packets to jabber_client_client the packet type.
 </summary>
@@ -34840,7 +34657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39620">
+<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
 <summary>
 Send jabber_client_server packets.
 </summary>
@@ -34851,7 +34668,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39639">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
 <summary>
 Do not audit attempts to send jabber_client_server packets.
 </summary>
@@ -34862,7 +34679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39658">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
 <summary>
 Receive jabber_client_server packets.
 </summary>
@@ -34873,7 +34690,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39677">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
 <summary>
 Do not audit attempts to receive jabber_client_server packets.
 </summary>
@@ -34884,7 +34701,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39696">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
 <summary>
 Send and receive jabber_client_server packets.
 </summary>
@@ -34895,7 +34712,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39712">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
 <summary>
 Do not audit attempts to send and receive jabber_client_server packets.
 </summary>
@@ -34906,7 +34723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39727">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
 <summary>
 Relabel packets to jabber_client_server the packet type.
 </summary>
@@ -34916,7 +34733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39749">
+<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
 <summary>
 Send and receive TCP traffic on the jabber_interserver port.
 </summary>
@@ -34927,7 +34744,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39764">
+<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
 <summary>
 Send UDP traffic on the jabber_interserver port.
 </summary>
@@ -34938,7 +34755,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39779">
+<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
 <summary>
 Do not audit attempts to send UDP traffic on the jabber_interserver port.
 </summary>
@@ -34949,7 +34766,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39794">
+<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
 <summary>
 Receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -34960,7 +34777,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39809">
+<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
 <summary>
 Do not audit attempts to receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -34971,7 +34788,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39824">
+<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
 <summary>
 Send and receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -34982,7 +34799,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39840">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jabber_interserver port.
@@ -34994,7 +34811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39855">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
 <summary>
 Bind TCP sockets to the jabber_interserver port.
 </summary>
@@ -35005,7 +34822,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39875">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
 <summary>
 Bind UDP sockets to the jabber_interserver port.
 </summary>
@@ -35016,7 +34833,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="39894">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
 <summary>
 Make a TCP connection to the jabber_interserver port.
 </summary>
@@ -35026,7 +34843,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="39914">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
 <summary>
 Send jabber_interserver_client packets.
 </summary>
@@ -35037,7 +34854,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="39933">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
 <summary>
 Do not audit attempts to send jabber_interserver_client packets.
 </summary>
@@ -35048,7 +34865,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="39952">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
 <summary>
 Receive jabber_interserver_client packets.
 </summary>
@@ -35059,7 +34876,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="39971">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
 <summary>
 Do not audit attempts to receive jabber_interserver_client packets.
 </summary>
@@ -35070,7 +34887,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="39990">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
 <summary>
 Send and receive jabber_interserver_client packets.
 </summary>
@@ -35081,7 +34898,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40006">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_client packets.
 </summary>
@@ -35092,7 +34909,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40021">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
 <summary>
 Relabel packets to jabber_interserver_client the packet type.
 </summary>
@@ -35102,7 +34919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40041">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
 <summary>
 Send jabber_interserver_server packets.
 </summary>
@@ -35113,7 +34930,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40060">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
 <summary>
 Do not audit attempts to send jabber_interserver_server packets.
 </summary>
@@ -35124,7 +34941,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40079">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
 <summary>
 Receive jabber_interserver_server packets.
 </summary>
@@ -35135,7 +34952,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40098">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
 <summary>
 Do not audit attempts to receive jabber_interserver_server packets.
 </summary>
@@ -35146,7 +34963,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40117">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
 <summary>
 Send and receive jabber_interserver_server packets.
 </summary>
@@ -35157,7 +34974,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40133">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_server packets.
 </summary>
@@ -35168,7 +34985,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40148">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
 <summary>
 Relabel packets to jabber_interserver_server the packet type.
 </summary>
@@ -35178,7 +34995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40170">
+<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
 <summary>
 Send and receive TCP traffic on the jboss_iiop port.
 </summary>
@@ -35189,7 +35006,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40185">
+<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
 <summary>
 Send UDP traffic on the jboss_iiop port.
 </summary>
@@ -35200,7 +35017,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40200">
+<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
 <summary>
 Do not audit attempts to send UDP traffic on the jboss_iiop port.
 </summary>
@@ -35211,7 +35028,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40215">
+<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
 <summary>
 Receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35222,7 +35039,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40230">
+<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
 <summary>
 Do not audit attempts to receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35233,7 +35050,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40245">
+<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
 <summary>
 Send and receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35244,7 +35061,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40261">
+<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jboss_iiop port.
@@ -35256,7 +35073,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40276">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
 <summary>
 Bind TCP sockets to the jboss_iiop port.
 </summary>
@@ -35267,7 +35084,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40296">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
 <summary>
 Bind UDP sockets to the jboss_iiop port.
 </summary>
@@ -35278,7 +35095,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40315">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
 <summary>
 Make a TCP connection to the jboss_iiop port.
 </summary>
@@ -35288,7 +35105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40335">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
 <summary>
 Send jboss_iiop_client packets.
 </summary>
@@ -35299,7 +35116,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40354">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
 <summary>
 Do not audit attempts to send jboss_iiop_client packets.
 </summary>
@@ -35310,7 +35127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40373">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
 <summary>
 Receive jboss_iiop_client packets.
 </summary>
@@ -35321,7 +35138,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40392">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
 <summary>
 Do not audit attempts to receive jboss_iiop_client packets.
 </summary>
@@ -35332,7 +35149,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40411">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
 <summary>
 Send and receive jboss_iiop_client packets.
 </summary>
@@ -35343,7 +35160,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40427">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_client packets.
 </summary>
@@ -35354,7 +35171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40442">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
 <summary>
 Relabel packets to jboss_iiop_client the packet type.
 </summary>
@@ -35364,7 +35181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40462">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
 <summary>
 Send jboss_iiop_server packets.
 </summary>
@@ -35375,7 +35192,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40481">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
 <summary>
 Do not audit attempts to send jboss_iiop_server packets.
 </summary>
@@ -35386,7 +35203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40500">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
 <summary>
 Receive jboss_iiop_server packets.
 </summary>
@@ -35397,7 +35214,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40519">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
 <summary>
 Do not audit attempts to receive jboss_iiop_server packets.
 </summary>
@@ -35408,7 +35225,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40538">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
 <summary>
 Send and receive jboss_iiop_server packets.
 </summary>
@@ -35419,7 +35236,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40554">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_server packets.
 </summary>
@@ -35430,7 +35247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40569">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
 <summary>
 Relabel packets to jboss_iiop_server the packet type.
 </summary>
@@ -35440,7 +35257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40591">
+<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
 <summary>
 Send and receive TCP traffic on the kerberos port.
 </summary>
@@ -35451,7 +35268,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40606">
+<interface name="corenet_udp_send_kerberos_port" lineno="40729">
 <summary>
 Send UDP traffic on the kerberos port.
 </summary>
@@ -35462,7 +35279,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40621">
+<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos port.
 </summary>
@@ -35473,7 +35290,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40636">
+<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
 <summary>
 Receive UDP traffic on the kerberos port.
 </summary>
@@ -35484,7 +35301,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40651">
+<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos port.
 </summary>
@@ -35495,7 +35312,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40666">
+<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
 <summary>
 Send and receive UDP traffic on the kerberos port.
 </summary>
@@ -35506,7 +35323,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40682">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos port.
@@ -35518,7 +35335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40697">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
 <summary>
 Bind TCP sockets to the kerberos port.
 </summary>
@@ -35529,7 +35346,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40717">
+<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
 <summary>
 Bind UDP sockets to the kerberos port.
 </summary>
@@ -35540,7 +35357,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40736">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
 <summary>
 Make a TCP connection to the kerberos port.
 </summary>
@@ -35550,7 +35367,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40756">
+<interface name="corenet_send_kerberos_client_packets" lineno="40879">
 <summary>
 Send kerberos_client packets.
 </summary>
@@ -35561,7 +35378,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40775">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
 <summary>
 Do not audit attempts to send kerberos_client packets.
 </summary>
@@ -35572,7 +35389,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40794">
+<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
 <summary>
 Receive kerberos_client packets.
 </summary>
@@ -35583,7 +35400,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40813">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
 <summary>
 Do not audit attempts to receive kerberos_client packets.
 </summary>
@@ -35594,7 +35411,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40832">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
 <summary>
 Send and receive kerberos_client packets.
 </summary>
@@ -35605,7 +35422,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40848">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
 <summary>
 Do not audit attempts to send and receive kerberos_client packets.
 </summary>
@@ -35616,7 +35433,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="40863">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
 <summary>
 Relabel packets to kerberos_client the packet type.
 </summary>
@@ -35626,7 +35443,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="40883">
+<interface name="corenet_send_kerberos_server_packets" lineno="41006">
 <summary>
 Send kerberos_server packets.
 </summary>
@@ -35637,7 +35454,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="40902">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
 <summary>
 Do not audit attempts to send kerberos_server packets.
 </summary>
@@ -35648,7 +35465,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="40921">
+<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
 <summary>
 Receive kerberos_server packets.
 </summary>
@@ -35659,7 +35476,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="40940">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
 <summary>
 Do not audit attempts to receive kerberos_server packets.
 </summary>
@@ -35670,7 +35487,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="40959">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
 <summary>
 Send and receive kerberos_server packets.
 </summary>
@@ -35681,7 +35498,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="40975">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
 <summary>
 Do not audit attempts to send and receive kerberos_server packets.
 </summary>
@@ -35692,7 +35509,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="40990">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
 <summary>
 Relabel packets to kerberos_server the packet type.
 </summary>
@@ -35702,7 +35519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41012">
+<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
 <summary>
 Send and receive TCP traffic on the kerberos_admin port.
 </summary>
@@ -35713,7 +35530,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41027">
+<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
 <summary>
 Send UDP traffic on the kerberos_admin port.
 </summary>
@@ -35724,7 +35541,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41042">
+<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos_admin port.
 </summary>
@@ -35735,7 +35552,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41057">
+<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
 <summary>
 Receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35746,7 +35563,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41072">
+<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35757,7 +35574,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41087">
+<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
 <summary>
 Send and receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35768,7 +35585,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41103">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos_admin port.
@@ -35780,7 +35597,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41118">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
 <summary>
 Bind TCP sockets to the kerberos_admin port.
 </summary>
@@ -35791,7 +35608,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41138">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
 <summary>
 Bind UDP sockets to the kerberos_admin port.
 </summary>
@@ -35802,7 +35619,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41157">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
 <summary>
 Make a TCP connection to the kerberos_admin port.
 </summary>
@@ -35812,7 +35629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41177">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
 <summary>
 Send kerberos_admin_client packets.
 </summary>
@@ -35823,7 +35640,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41196">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
 <summary>
 Do not audit attempts to send kerberos_admin_client packets.
 </summary>
@@ -35834,7 +35651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41215">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
 <summary>
 Receive kerberos_admin_client packets.
 </summary>
@@ -35845,7 +35662,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41234">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
 <summary>
 Do not audit attempts to receive kerberos_admin_client packets.
 </summary>
@@ -35856,7 +35673,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41253">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
 <summary>
 Send and receive kerberos_admin_client packets.
 </summary>
@@ -35867,7 +35684,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41269">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_client packets.
 </summary>
@@ -35878,7 +35695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41284">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
 <summary>
 Relabel packets to kerberos_admin_client the packet type.
 </summary>
@@ -35888,7 +35705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41304">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
 <summary>
 Send kerberos_admin_server packets.
 </summary>
@@ -35899,7 +35716,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41323">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
 <summary>
 Do not audit attempts to send kerberos_admin_server packets.
 </summary>
@@ -35910,7 +35727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41342">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
 <summary>
 Receive kerberos_admin_server packets.
 </summary>
@@ -35921,7 +35738,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41361">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
 <summary>
 Do not audit attempts to receive kerberos_admin_server packets.
 </summary>
@@ -35932,7 +35749,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41380">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
 <summary>
 Send and receive kerberos_admin_server packets.
 </summary>
@@ -35943,7 +35760,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41396">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_server packets.
 </summary>
@@ -35954,7 +35771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41411">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
 <summary>
 Relabel packets to kerberos_admin_server the packet type.
 </summary>
@@ -35964,7 +35781,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41433">
+<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
 <summary>
 Send and receive TCP traffic on the kerberos_master port.
 </summary>
@@ -35975,7 +35792,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41448">
+<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
 <summary>
 Send UDP traffic on the kerberos_master port.
 </summary>
@@ -35986,7 +35803,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41463">
+<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos_master port.
 </summary>
@@ -35997,7 +35814,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41478">
+<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
 <summary>
 Receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36008,7 +35825,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41493">
+<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36019,7 +35836,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41508">
+<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
 <summary>
 Send and receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36030,7 +35847,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41524">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos_master port.
@@ -36042,7 +35859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41539">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
 <summary>
 Bind TCP sockets to the kerberos_master port.
 </summary>
@@ -36053,7 +35870,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41559">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
 <summary>
 Bind UDP sockets to the kerberos_master port.
 </summary>
@@ -36064,7 +35881,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41578">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
 <summary>
 Make a TCP connection to the kerberos_master port.
 </summary>
@@ -36074,7 +35891,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41598">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
 <summary>
 Send kerberos_master_client packets.
 </summary>
@@ -36085,7 +35902,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41617">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
 <summary>
 Do not audit attempts to send kerberos_master_client packets.
 </summary>
@@ -36096,7 +35913,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41636">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
 <summary>
 Receive kerberos_master_client packets.
 </summary>
@@ -36107,7 +35924,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41655">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
 <summary>
 Do not audit attempts to receive kerberos_master_client packets.
 </summary>
@@ -36118,7 +35935,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41674">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
 <summary>
 Send and receive kerberos_master_client packets.
 </summary>
@@ -36129,7 +35946,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41690">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
 <summary>
 Do not audit attempts to send and receive kerberos_master_client packets.
 </summary>
@@ -36140,7 +35957,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41705">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
 <summary>
 Relabel packets to kerberos_master_client the packet type.
 </summary>
@@ -36150,7 +35967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41725">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
 <summary>
 Send kerberos_master_server packets.
 </summary>
@@ -36161,7 +35978,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41744">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
 <summary>
 Do not audit attempts to send kerberos_master_server packets.
 </summary>
@@ -36172,7 +35989,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41763">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
 <summary>
 Receive kerberos_master_server packets.
 </summary>
@@ -36183,7 +36000,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41782">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
 <summary>
 Do not audit attempts to receive kerberos_master_server packets.
 </summary>
@@ -36194,7 +36011,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41801">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
 <summary>
 Send and receive kerberos_master_server packets.
 </summary>
@@ -36205,7 +36022,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41817">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
 <summary>
 Do not audit attempts to send and receive kerberos_master_server packets.
 </summary>
@@ -36216,7 +36033,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41832">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
 <summary>
 Relabel packets to kerberos_master_server the packet type.
 </summary>
@@ -36226,7 +36043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41854">
+<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
 <summary>
 Send and receive TCP traffic on the kismet port.
 </summary>
@@ -36237,7 +36054,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kismet_port" lineno="41869">
+<interface name="corenet_udp_send_kismet_port" lineno="41992">
 <summary>
 Send UDP traffic on the kismet port.
 </summary>
@@ -36248,7 +36065,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="41884">
+<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
 <summary>
 Do not audit attempts to send UDP traffic on the kismet port.
 </summary>
@@ -36259,7 +36076,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="41899">
+<interface name="corenet_udp_receive_kismet_port" lineno="42022">
 <summary>
 Receive UDP traffic on the kismet port.
 </summary>
@@ -36270,7 +36087,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="41914">
+<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
 <summary>
 Do not audit attempts to receive UDP traffic on the kismet port.
 </summary>
@@ -36281,7 +36098,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="41929">
+<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
 <summary>
 Send and receive UDP traffic on the kismet port.
 </summary>
@@ -36292,7 +36109,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="41945">
+<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kismet port.
@@ -36304,7 +36121,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="41960">
+<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
 <summary>
 Bind TCP sockets to the kismet port.
 </summary>
@@ -36315,7 +36132,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="41980">
+<interface name="corenet_udp_bind_kismet_port" lineno="42103">
 <summary>
 Bind UDP sockets to the kismet port.
 </summary>
@@ -36326,7 +36143,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="41999">
+<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
 <summary>
 Make a TCP connection to the kismet port.
 </summary>
@@ -36336,7 +36153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42019">
+<interface name="corenet_send_kismet_client_packets" lineno="42142">
 <summary>
 Send kismet_client packets.
 </summary>
@@ -36347,7 +36164,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42038">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
 <summary>
 Do not audit attempts to send kismet_client packets.
 </summary>
@@ -36358,7 +36175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42057">
+<interface name="corenet_receive_kismet_client_packets" lineno="42180">
 <summary>
 Receive kismet_client packets.
 </summary>
@@ -36369,7 +36186,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42076">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
 <summary>
 Do not audit attempts to receive kismet_client packets.
 </summary>
@@ -36380,7 +36197,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42095">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
 <summary>
 Send and receive kismet_client packets.
 </summary>
@@ -36391,7 +36208,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42111">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
 <summary>
 Do not audit attempts to send and receive kismet_client packets.
 </summary>
@@ -36402,7 +36219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42126">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
 <summary>
 Relabel packets to kismet_client the packet type.
 </summary>
@@ -36412,7 +36229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42146">
+<interface name="corenet_send_kismet_server_packets" lineno="42269">
 <summary>
 Send kismet_server packets.
 </summary>
@@ -36423,7 +36240,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42165">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
 <summary>
 Do not audit attempts to send kismet_server packets.
 </summary>
@@ -36434,7 +36251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42184">
+<interface name="corenet_receive_kismet_server_packets" lineno="42307">
 <summary>
 Receive kismet_server packets.
 </summary>
@@ -36445,7 +36262,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42203">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
 <summary>
 Do not audit attempts to receive kismet_server packets.
 </summary>
@@ -36456,7 +36273,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42222">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
 <summary>
 Send and receive kismet_server packets.
 </summary>
@@ -36467,7 +36284,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42238">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
 <summary>
 Do not audit attempts to send and receive kismet_server packets.
 </summary>
@@ -36478,7 +36295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42253">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
 <summary>
 Relabel packets to kismet_server the packet type.
 </summary>
@@ -36488,7 +36305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42275">
+<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
 <summary>
 Send and receive TCP traffic on the kdeconnect port.
 </summary>
@@ -36499,7 +36316,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42290">
+<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
 <summary>
 Send UDP traffic on the kdeconnect port.
 </summary>
@@ -36510,7 +36327,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42305">
+<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
 <summary>
 Do not audit attempts to send UDP traffic on the kdeconnect port.
 </summary>
@@ -36521,7 +36338,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42320">
+<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
 <summary>
 Receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36532,7 +36349,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42335">
+<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
 <summary>
 Do not audit attempts to receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36543,7 +36360,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42350">
+<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
 <summary>
 Send and receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36554,7 +36371,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42366">
+<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kdeconnect port.
@@ -36566,7 +36383,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42381">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
 <summary>
 Bind TCP sockets to the kdeconnect port.
 </summary>
@@ -36577,7 +36394,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42401">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
 <summary>
 Bind UDP sockets to the kdeconnect port.
 </summary>
@@ -36588,7 +36405,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42420">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
 <summary>
 Make a TCP connection to the kdeconnect port.
 </summary>
@@ -36598,7 +36415,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42440">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
 <summary>
 Send kdeconnect_client packets.
 </summary>
@@ -36609,7 +36426,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42459">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
 <summary>
 Do not audit attempts to send kdeconnect_client packets.
 </summary>
@@ -36620,7 +36437,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42478">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
 <summary>
 Receive kdeconnect_client packets.
 </summary>
@@ -36631,7 +36448,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42497">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
 <summary>
 Do not audit attempts to receive kdeconnect_client packets.
 </summary>
@@ -36642,7 +36459,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42516">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
 <summary>
 Send and receive kdeconnect_client packets.
 </summary>
@@ -36653,7 +36470,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42532">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
 <summary>
 Do not audit attempts to send and receive kdeconnect_client packets.
 </summary>
@@ -36664,7 +36481,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42547">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
 <summary>
 Relabel packets to kdeconnect_client the packet type.
 </summary>
@@ -36674,7 +36491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42567">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
 <summary>
 Send kdeconnect_server packets.
 </summary>
@@ -36685,7 +36502,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42586">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
 <summary>
 Do not audit attempts to send kdeconnect_server packets.
 </summary>
@@ -36696,7 +36513,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42605">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
 <summary>
 Receive kdeconnect_server packets.
 </summary>
@@ -36707,7 +36524,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42624">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
 <summary>
 Do not audit attempts to receive kdeconnect_server packets.
 </summary>
@@ -36718,7 +36535,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42643">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
 <summary>
 Send and receive kdeconnect_server packets.
 </summary>
@@ -36729,7 +36546,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42659">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
 <summary>
 Do not audit attempts to send and receive kdeconnect_server packets.
 </summary>
@@ -36740,7 +36557,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42674">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
 <summary>
 Relabel packets to kdeconnect_server the packet type.
 </summary>
@@ -36750,7 +36567,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42696">
+<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
 <summary>
 Send and receive TCP traffic on the kprop port.
 </summary>
@@ -36761,7 +36578,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42711">
+<interface name="corenet_udp_send_kprop_port" lineno="42834">
 <summary>
 Send UDP traffic on the kprop port.
 </summary>
@@ -36772,7 +36589,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42726">
+<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
 <summary>
 Do not audit attempts to send UDP traffic on the kprop port.
 </summary>
@@ -36783,7 +36600,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42741">
+<interface name="corenet_udp_receive_kprop_port" lineno="42864">
 <summary>
 Receive UDP traffic on the kprop port.
 </summary>
@@ -36794,7 +36611,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42756">
+<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
 <summary>
 Do not audit attempts to receive UDP traffic on the kprop port.
 </summary>
@@ -36805,7 +36622,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42771">
+<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
 <summary>
 Send and receive UDP traffic on the kprop port.
 </summary>
@@ -36816,7 +36633,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42787">
+<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kprop port.
@@ -36828,7 +36645,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42802">
+<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
 <summary>
 Bind TCP sockets to the kprop port.
 </summary>
@@ -36839,7 +36656,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42822">
+<interface name="corenet_udp_bind_kprop_port" lineno="42945">
 <summary>
 Bind UDP sockets to the kprop port.
 </summary>
@@ -36850,7 +36667,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42841">
+<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
 <summary>
 Make a TCP connection to the kprop port.
 </summary>
@@ -36860,7 +36677,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_client_packets" lineno="42861">
+<interface name="corenet_send_kprop_client_packets" lineno="42984">
 <summary>
 Send kprop_client packets.
 </summary>
@@ -36871,7 +36688,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="42880">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
 <summary>
 Do not audit attempts to send kprop_client packets.
 </summary>
@@ -36882,7 +36699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="42899">
+<interface name="corenet_receive_kprop_client_packets" lineno="43022">
 <summary>
 Receive kprop_client packets.
 </summary>
@@ -36893,7 +36710,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="42918">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
 <summary>
 Do not audit attempts to receive kprop_client packets.
 </summary>
@@ -36904,7 +36721,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="42937">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
 <summary>
 Send and receive kprop_client packets.
 </summary>
@@ -36915,7 +36732,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="42953">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
 <summary>
 Do not audit attempts to send and receive kprop_client packets.
 </summary>
@@ -36926,7 +36743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="42968">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
 <summary>
 Relabel packets to kprop_client the packet type.
 </summary>
@@ -36936,7 +36753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_server_packets" lineno="42988">
+<interface name="corenet_send_kprop_server_packets" lineno="43111">
 <summary>
 Send kprop_server packets.
 </summary>
@@ -36947,7 +36764,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43007">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
 <summary>
 Do not audit attempts to send kprop_server packets.
 </summary>
@@ -36958,7 +36775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43026">
+<interface name="corenet_receive_kprop_server_packets" lineno="43149">
 <summary>
 Receive kprop_server packets.
 </summary>
@@ -36969,7 +36786,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43045">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
 <summary>
 Do not audit attempts to receive kprop_server packets.
 </summary>
@@ -36980,7 +36797,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43064">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
 <summary>
 Send and receive kprop_server packets.
 </summary>
@@ -36991,7 +36808,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43080">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
 <summary>
 Do not audit attempts to send and receive kprop_server packets.
 </summary>
@@ -37002,7 +36819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43095">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
 <summary>
 Relabel packets to kprop_server the packet type.
 </summary>
@@ -37012,7 +36829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43117">
+<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
 <summary>
 Send and receive TCP traffic on the ktalkd port.
 </summary>
@@ -37023,7 +36840,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43132">
+<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
 <summary>
 Send UDP traffic on the ktalkd port.
 </summary>
@@ -37034,7 +36851,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43147">
+<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
 <summary>
 Do not audit attempts to send UDP traffic on the ktalkd port.
 </summary>
@@ -37045,7 +36862,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43162">
+<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
 <summary>
 Receive UDP traffic on the ktalkd port.
 </summary>
@@ -37056,7 +36873,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43177">
+<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
 <summary>
 Do not audit attempts to receive UDP traffic on the ktalkd port.
 </summary>
@@ -37067,7 +36884,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43192">
+<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
 <summary>
 Send and receive UDP traffic on the ktalkd port.
 </summary>
@@ -37078,7 +36895,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43208">
+<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ktalkd port.
@@ -37090,7 +36907,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43223">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
 <summary>
 Bind TCP sockets to the ktalkd port.
 </summary>
@@ -37101,7 +36918,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43243">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
 <summary>
 Bind UDP sockets to the ktalkd port.
 </summary>
@@ -37112,7 +36929,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43262">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
 <summary>
 Make a TCP connection to the ktalkd port.
 </summary>
@@ -37122,7 +36939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43282">
+<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
 <summary>
 Send ktalkd_client packets.
 </summary>
@@ -37133,7 +36950,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43301">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
 <summary>
 Do not audit attempts to send ktalkd_client packets.
 </summary>
@@ -37144,7 +36961,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43320">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
 <summary>
 Receive ktalkd_client packets.
 </summary>
@@ -37155,7 +36972,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43339">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
 <summary>
 Do not audit attempts to receive ktalkd_client packets.
 </summary>
@@ -37166,7 +36983,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43358">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
 <summary>
 Send and receive ktalkd_client packets.
 </summary>
@@ -37177,7 +36994,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43374">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
 <summary>
 Do not audit attempts to send and receive ktalkd_client packets.
 </summary>
@@ -37188,7 +37005,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43389">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
 <summary>
 Relabel packets to ktalkd_client the packet type.
 </summary>
@@ -37198,7 +37015,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43409">
+<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
 <summary>
 Send ktalkd_server packets.
 </summary>
@@ -37209,7 +37026,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43428">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
 <summary>
 Do not audit attempts to send ktalkd_server packets.
 </summary>
@@ -37220,7 +37037,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43447">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
 <summary>
 Receive ktalkd_server packets.
 </summary>
@@ -37231,7 +37048,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43466">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
 <summary>
 Do not audit attempts to receive ktalkd_server packets.
 </summary>
@@ -37242,7 +37059,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43485">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
 <summary>
 Send and receive ktalkd_server packets.
 </summary>
@@ -37253,7 +37070,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43501">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
 <summary>
 Do not audit attempts to send and receive ktalkd_server packets.
 </summary>
@@ -37264,7 +37081,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43516">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
 <summary>
 Relabel packets to ktalkd_server the packet type.
 </summary>
@@ -37274,7 +37091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43538">
+<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
 <summary>
 Send and receive TCP traffic on the l2tp port.
 </summary>
@@ -37285,7 +37102,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43553">
+<interface name="corenet_udp_send_l2tp_port" lineno="43676">
 <summary>
 Send UDP traffic on the l2tp port.
 </summary>
@@ -37296,7 +37113,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43568">
+<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
 <summary>
 Do not audit attempts to send UDP traffic on the l2tp port.
 </summary>
@@ -37307,7 +37124,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43583">
+<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
 <summary>
 Receive UDP traffic on the l2tp port.
 </summary>
@@ -37318,7 +37135,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43598">
+<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
 <summary>
 Do not audit attempts to receive UDP traffic on the l2tp port.
 </summary>
@@ -37329,7 +37146,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43613">
+<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
 <summary>
 Send and receive UDP traffic on the l2tp port.
 </summary>
@@ -37340,7 +37157,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43629">
+<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the l2tp port.
@@ -37352,7 +37169,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43644">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
 <summary>
 Bind TCP sockets to the l2tp port.
 </summary>
@@ -37363,7 +37180,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43664">
+<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
 <summary>
 Bind UDP sockets to the l2tp port.
 </summary>
@@ -37374,7 +37191,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43683">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
 <summary>
 Make a TCP connection to the l2tp port.
 </summary>
@@ -37384,7 +37201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43703">
+<interface name="corenet_send_l2tp_client_packets" lineno="43826">
 <summary>
 Send l2tp_client packets.
 </summary>
@@ -37395,7 +37212,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43722">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
 <summary>
 Do not audit attempts to send l2tp_client packets.
 </summary>
@@ -37406,7 +37223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43741">
+<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
 <summary>
 Receive l2tp_client packets.
 </summary>
@@ -37417,7 +37234,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43760">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
 <summary>
 Do not audit attempts to receive l2tp_client packets.
 </summary>
@@ -37428,7 +37245,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43779">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
 <summary>
 Send and receive l2tp_client packets.
 </summary>
@@ -37439,7 +37256,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43795">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
 <summary>
 Do not audit attempts to send and receive l2tp_client packets.
 </summary>
@@ -37450,7 +37267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43810">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
 <summary>
 Relabel packets to l2tp_client the packet type.
 </summary>
@@ -37460,7 +37277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43830">
+<interface name="corenet_send_l2tp_server_packets" lineno="43953">
 <summary>
 Send l2tp_server packets.
 </summary>
@@ -37471,7 +37288,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43849">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
 <summary>
 Do not audit attempts to send l2tp_server packets.
 </summary>
@@ -37482,7 +37299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="43868">
+<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
 <summary>
 Receive l2tp_server packets.
 </summary>
@@ -37493,7 +37310,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="43887">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
 <summary>
 Do not audit attempts to receive l2tp_server packets.
 </summary>
@@ -37504,7 +37321,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="43906">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
 <summary>
 Send and receive l2tp_server packets.
 </summary>
@@ -37515,7 +37332,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="43922">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
 <summary>
 Do not audit attempts to send and receive l2tp_server packets.
 </summary>
@@ -37526,7 +37343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="43937">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
 <summary>
 Relabel packets to l2tp_server the packet type.
 </summary>
@@ -37536,7 +37353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="43959">
+<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
 <summary>
 Send and receive TCP traffic on the ldap port.
 </summary>
@@ -37547,7 +37364,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ldap_port" lineno="43974">
+<interface name="corenet_udp_send_ldap_port" lineno="44097">
 <summary>
 Send UDP traffic on the ldap port.
 </summary>
@@ -37558,7 +37375,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="43989">
+<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
 <summary>
 Do not audit attempts to send UDP traffic on the ldap port.
 </summary>
@@ -37569,7 +37386,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44004">
+<interface name="corenet_udp_receive_ldap_port" lineno="44127">
 <summary>
 Receive UDP traffic on the ldap port.
 </summary>
@@ -37580,7 +37397,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44019">
+<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
 <summary>
 Do not audit attempts to receive UDP traffic on the ldap port.
 </summary>
@@ -37591,7 +37408,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44034">
+<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
 <summary>
 Send and receive UDP traffic on the ldap port.
 </summary>
@@ -37602,7 +37419,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44050">
+<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ldap port.
@@ -37614,7 +37431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44065">
+<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
 <summary>
 Bind TCP sockets to the ldap port.
 </summary>
@@ -37625,7 +37442,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44085">
+<interface name="corenet_udp_bind_ldap_port" lineno="44208">
 <summary>
 Bind UDP sockets to the ldap port.
 </summary>
@@ -37636,7 +37453,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44104">
+<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
 <summary>
 Make a TCP connection to the ldap port.
 </summary>
@@ -37646,7 +37463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44124">
+<interface name="corenet_send_ldap_client_packets" lineno="44247">
 <summary>
 Send ldap_client packets.
 </summary>
@@ -37657,7 +37474,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44143">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
 <summary>
 Do not audit attempts to send ldap_client packets.
 </summary>
@@ -37668,7 +37485,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44162">
+<interface name="corenet_receive_ldap_client_packets" lineno="44285">
 <summary>
 Receive ldap_client packets.
 </summary>
@@ -37679,7 +37496,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44181">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
 <summary>
 Do not audit attempts to receive ldap_client packets.
 </summary>
@@ -37690,7 +37507,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44200">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
 <summary>
 Send and receive ldap_client packets.
 </summary>
@@ -37701,7 +37518,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44216">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
 <summary>
 Do not audit attempts to send and receive ldap_client packets.
 </summary>
@@ -37712,7 +37529,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44231">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
 <summary>
 Relabel packets to ldap_client the packet type.
 </summary>
@@ -37722,7 +37539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44251">
+<interface name="corenet_send_ldap_server_packets" lineno="44374">
 <summary>
 Send ldap_server packets.
 </summary>
@@ -37733,7 +37550,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44270">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
 <summary>
 Do not audit attempts to send ldap_server packets.
 </summary>
@@ -37744,7 +37561,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44289">
+<interface name="corenet_receive_ldap_server_packets" lineno="44412">
 <summary>
 Receive ldap_server packets.
 </summary>
@@ -37755,7 +37572,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44308">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
 <summary>
 Do not audit attempts to receive ldap_server packets.
 </summary>
@@ -37766,7 +37583,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44327">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
 <summary>
 Send and receive ldap_server packets.
 </summary>
@@ -37777,7 +37594,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44343">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
 <summary>
 Do not audit attempts to send and receive ldap_server packets.
 </summary>
@@ -37788,7 +37605,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44358">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
 <summary>
 Relabel packets to ldap_server the packet type.
 </summary>
@@ -37798,7 +37615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44380">
+<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
 <summary>
 Send and receive TCP traffic on the lirc port.
 </summary>
@@ -37809,7 +37626,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44395">
+<interface name="corenet_udp_send_lirc_port" lineno="44518">
 <summary>
 Send UDP traffic on the lirc port.
 </summary>
@@ -37820,7 +37637,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44410">
+<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
 <summary>
 Do not audit attempts to send UDP traffic on the lirc port.
 </summary>
@@ -37831,7 +37648,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44425">
+<interface name="corenet_udp_receive_lirc_port" lineno="44548">
 <summary>
 Receive UDP traffic on the lirc port.
 </summary>
@@ -37842,7 +37659,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44440">
+<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
 <summary>
 Do not audit attempts to receive UDP traffic on the lirc port.
 </summary>
@@ -37853,7 +37670,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44455">
+<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
 <summary>
 Send and receive UDP traffic on the lirc port.
 </summary>
@@ -37864,7 +37681,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44471">
+<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lirc port.
@@ -37876,7 +37693,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44486">
+<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
 <summary>
 Bind TCP sockets to the lirc port.
 </summary>
@@ -37887,7 +37704,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44506">
+<interface name="corenet_udp_bind_lirc_port" lineno="44629">
 <summary>
 Bind UDP sockets to the lirc port.
 </summary>
@@ -37898,7 +37715,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44525">
+<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
 <summary>
 Make a TCP connection to the lirc port.
 </summary>
@@ -37908,7 +37725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44545">
+<interface name="corenet_send_lirc_client_packets" lineno="44668">
 <summary>
 Send lirc_client packets.
 </summary>
@@ -37919,7 +37736,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44564">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
 <summary>
 Do not audit attempts to send lirc_client packets.
 </summary>
@@ -37930,7 +37747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44583">
+<interface name="corenet_receive_lirc_client_packets" lineno="44706">
 <summary>
 Receive lirc_client packets.
 </summary>
@@ -37941,7 +37758,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44602">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
 <summary>
 Do not audit attempts to receive lirc_client packets.
 </summary>
@@ -37952,7 +37769,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44621">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
 <summary>
 Send and receive lirc_client packets.
 </summary>
@@ -37963,7 +37780,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44637">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
 <summary>
 Do not audit attempts to send and receive lirc_client packets.
 </summary>
@@ -37974,7 +37791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44652">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
 <summary>
 Relabel packets to lirc_client the packet type.
 </summary>
@@ -37984,7 +37801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44672">
+<interface name="corenet_send_lirc_server_packets" lineno="44795">
 <summary>
 Send lirc_server packets.
 </summary>
@@ -37995,7 +37812,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44691">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
 <summary>
 Do not audit attempts to send lirc_server packets.
 </summary>
@@ -38006,7 +37823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44710">
+<interface name="corenet_receive_lirc_server_packets" lineno="44833">
 <summary>
 Receive lirc_server packets.
 </summary>
@@ -38017,7 +37834,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44729">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
 <summary>
 Do not audit attempts to receive lirc_server packets.
 </summary>
@@ -38028,7 +37845,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44748">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
 <summary>
 Send and receive lirc_server packets.
 </summary>
@@ -38039,7 +37856,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44764">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
 <summary>
 Do not audit attempts to send and receive lirc_server packets.
 </summary>
@@ -38050,7 +37867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44779">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
 <summary>
 Relabel packets to lirc_server the packet type.
 </summary>
@@ -38060,7 +37877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44801">
+<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
 <summary>
 Send and receive TCP traffic on the llmnr port.
 </summary>
@@ -38071,7 +37888,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44816">
+<interface name="corenet_udp_send_llmnr_port" lineno="44939">
 <summary>
 Send UDP traffic on the llmnr port.
 </summary>
@@ -38082,7 +37899,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44831">
+<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
 <summary>
 Do not audit attempts to send UDP traffic on the llmnr port.
 </summary>
@@ -38093,7 +37910,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44846">
+<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
 <summary>
 Receive UDP traffic on the llmnr port.
 </summary>
@@ -38104,7 +37921,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44861">
+<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
 <summary>
 Do not audit attempts to receive UDP traffic on the llmnr port.
 </summary>
@@ -38115,7 +37932,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44876">
+<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
 <summary>
 Send and receive UDP traffic on the llmnr port.
 </summary>
@@ -38126,7 +37943,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="44892">
+<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the llmnr port.
@@ -38138,7 +37955,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="44907">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
 <summary>
 Bind TCP sockets to the llmnr port.
 </summary>
@@ -38149,7 +37966,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="44927">
+<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
 <summary>
 Bind UDP sockets to the llmnr port.
 </summary>
@@ -38160,7 +37977,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="44946">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
 <summary>
 Make a TCP connection to the llmnr port.
 </summary>
@@ -38170,7 +37987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="44966">
+<interface name="corenet_send_llmnr_client_packets" lineno="45089">
 <summary>
 Send llmnr_client packets.
 </summary>
@@ -38181,7 +37998,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="44985">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
 <summary>
 Do not audit attempts to send llmnr_client packets.
 </summary>
@@ -38192,7 +38009,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45004">
+<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
 <summary>
 Receive llmnr_client packets.
 </summary>
@@ -38203,7 +38020,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45023">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
 <summary>
 Do not audit attempts to receive llmnr_client packets.
 </summary>
@@ -38214,7 +38031,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45042">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
 <summary>
 Send and receive llmnr_client packets.
 </summary>
@@ -38225,7 +38042,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45058">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
 <summary>
 Do not audit attempts to send and receive llmnr_client packets.
 </summary>
@@ -38236,7 +38053,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45073">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
 <summary>
 Relabel packets to llmnr_client the packet type.
 </summary>
@@ -38246,7 +38063,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45093">
+<interface name="corenet_send_llmnr_server_packets" lineno="45216">
 <summary>
 Send llmnr_server packets.
 </summary>
@@ -38257,7 +38074,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45112">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
 <summary>
 Do not audit attempts to send llmnr_server packets.
 </summary>
@@ -38268,7 +38085,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45131">
+<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
 <summary>
 Receive llmnr_server packets.
 </summary>
@@ -38279,7 +38096,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45150">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
 <summary>
 Do not audit attempts to receive llmnr_server packets.
 </summary>
@@ -38290,7 +38107,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45169">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
 <summary>
 Send and receive llmnr_server packets.
 </summary>
@@ -38301,7 +38118,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45185">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
 <summary>
 Do not audit attempts to send and receive llmnr_server packets.
 </summary>
@@ -38312,7 +38129,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45200">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
 <summary>
 Relabel packets to llmnr_server the packet type.
 </summary>
@@ -38322,7 +38139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45222">
+<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
 <summary>
 Send and receive TCP traffic on the lmtp port.
 </summary>
@@ -38333,7 +38150,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45237">
+<interface name="corenet_udp_send_lmtp_port" lineno="45360">
 <summary>
 Send UDP traffic on the lmtp port.
 </summary>
@@ -38344,7 +38161,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45252">
+<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
 <summary>
 Do not audit attempts to send UDP traffic on the lmtp port.
 </summary>
@@ -38355,7 +38172,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45267">
+<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
 <summary>
 Receive UDP traffic on the lmtp port.
 </summary>
@@ -38366,7 +38183,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45282">
+<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
 <summary>
 Do not audit attempts to receive UDP traffic on the lmtp port.
 </summary>
@@ -38377,7 +38194,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45297">
+<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
 <summary>
 Send and receive UDP traffic on the lmtp port.
 </summary>
@@ -38388,7 +38205,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45313">
+<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lmtp port.
@@ -38400,7 +38217,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45328">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
 <summary>
 Bind TCP sockets to the lmtp port.
 </summary>
@@ -38411,7 +38228,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45348">
+<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
 <summary>
 Bind UDP sockets to the lmtp port.
 </summary>
@@ -38422,7 +38239,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45367">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
 <summary>
 Make a TCP connection to the lmtp port.
 </summary>
@@ -38432,7 +38249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45387">
+<interface name="corenet_send_lmtp_client_packets" lineno="45510">
 <summary>
 Send lmtp_client packets.
 </summary>
@@ -38443,7 +38260,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45406">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
 <summary>
 Do not audit attempts to send lmtp_client packets.
 </summary>
@@ -38454,7 +38271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45425">
+<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
 <summary>
 Receive lmtp_client packets.
 </summary>
@@ -38465,7 +38282,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45444">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
 <summary>
 Do not audit attempts to receive lmtp_client packets.
 </summary>
@@ -38476,7 +38293,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45463">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
 <summary>
 Send and receive lmtp_client packets.
 </summary>
@@ -38487,7 +38304,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45479">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
 <summary>
 Do not audit attempts to send and receive lmtp_client packets.
 </summary>
@@ -38498,7 +38315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45494">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
 <summary>
 Relabel packets to lmtp_client the packet type.
 </summary>
@@ -38508,7 +38325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45514">
+<interface name="corenet_send_lmtp_server_packets" lineno="45637">
 <summary>
 Send lmtp_server packets.
 </summary>
@@ -38519,7 +38336,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45533">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
 <summary>
 Do not audit attempts to send lmtp_server packets.
 </summary>
@@ -38530,7 +38347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45552">
+<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
 <summary>
 Receive lmtp_server packets.
 </summary>
@@ -38541,7 +38358,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45571">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
 <summary>
 Do not audit attempts to receive lmtp_server packets.
 </summary>
@@ -38552,7 +38369,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45590">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
 <summary>
 Send and receive lmtp_server packets.
 </summary>
@@ -38563,7 +38380,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45606">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
 <summary>
 Do not audit attempts to send and receive lmtp_server packets.
 </summary>
@@ -38574,7 +38391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45621">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
 <summary>
 Relabel packets to lmtp_server the packet type.
 </summary>
@@ -38584,7 +38401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45643">
+<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
 <summary>
 Send and receive TCP traffic on the lrrd port.
 </summary>
@@ -38595,7 +38412,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45658">
+<interface name="corenet_udp_send_lrrd_port" lineno="45781">
 <summary>
 Send UDP traffic on the lrrd port.
 </summary>
@@ -38606,7 +38423,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45673">
+<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
 <summary>
 Do not audit attempts to send UDP traffic on the lrrd port.
 </summary>
@@ -38617,7 +38434,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45688">
+<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
 <summary>
 Receive UDP traffic on the lrrd port.
 </summary>
@@ -38628,7 +38445,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45703">
+<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
 <summary>
 Do not audit attempts to receive UDP traffic on the lrrd port.
 </summary>
@@ -38639,7 +38456,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45718">
+<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
 <summary>
 Send and receive UDP traffic on the lrrd port.
 </summary>
@@ -38650,7 +38467,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45734">
+<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lrrd port.
@@ -38662,7 +38479,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45749">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
 <summary>
 Bind TCP sockets to the lrrd port.
 </summary>
@@ -38673,7 +38490,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45769">
+<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
 <summary>
 Bind UDP sockets to the lrrd port.
 </summary>
@@ -38684,7 +38501,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45788">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
 <summary>
 Make a TCP connection to the lrrd port.
 </summary>
@@ -38694,7 +38511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45808">
+<interface name="corenet_send_lrrd_client_packets" lineno="45931">
 <summary>
 Send lrrd_client packets.
 </summary>
@@ -38705,7 +38522,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45827">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
 <summary>
 Do not audit attempts to send lrrd_client packets.
 </summary>
@@ -38716,7 +38533,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45846">
+<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
 <summary>
 Receive lrrd_client packets.
 </summary>
@@ -38727,7 +38544,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45865">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
 <summary>
 Do not audit attempts to receive lrrd_client packets.
 </summary>
@@ -38738,7 +38555,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="45884">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
 <summary>
 Send and receive lrrd_client packets.
 </summary>
@@ -38749,7 +38566,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="45900">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
 <summary>
 Do not audit attempts to send and receive lrrd_client packets.
 </summary>
@@ -38760,7 +38577,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="45915">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
 <summary>
 Relabel packets to lrrd_client the packet type.
 </summary>
@@ -38770,7 +38587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="45935">
+<interface name="corenet_send_lrrd_server_packets" lineno="46058">
 <summary>
 Send lrrd_server packets.
 </summary>
@@ -38781,7 +38598,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="45954">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
 <summary>
 Do not audit attempts to send lrrd_server packets.
 </summary>
@@ -38792,7 +38609,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="45973">
+<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
 <summary>
 Receive lrrd_server packets.
 </summary>
@@ -38803,7 +38620,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="45992">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
 <summary>
 Do not audit attempts to receive lrrd_server packets.
 </summary>
@@ -38814,7 +38631,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46011">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
 <summary>
 Send and receive lrrd_server packets.
 </summary>
@@ -38825,7 +38642,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46027">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
 <summary>
 Do not audit attempts to send and receive lrrd_server packets.
 </summary>
@@ -38836,7 +38653,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46042">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
 <summary>
 Relabel packets to lrrd_server the packet type.
 </summary>
@@ -38846,7 +38663,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46064">
+<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
 <summary>
 Send and receive TCP traffic on the mail port.
 </summary>
@@ -38857,7 +38674,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mail_port" lineno="46079">
+<interface name="corenet_udp_send_mail_port" lineno="46202">
 <summary>
 Send UDP traffic on the mail port.
 </summary>
@@ -38868,7 +38685,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46094">
+<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
 <summary>
 Do not audit attempts to send UDP traffic on the mail port.
 </summary>
@@ -38879,7 +38696,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46109">
+<interface name="corenet_udp_receive_mail_port" lineno="46232">
 <summary>
 Receive UDP traffic on the mail port.
 </summary>
@@ -38890,7 +38707,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46124">
+<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
 <summary>
 Do not audit attempts to receive UDP traffic on the mail port.
 </summary>
@@ -38901,7 +38718,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46139">
+<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
 <summary>
 Send and receive UDP traffic on the mail port.
 </summary>
@@ -38912,7 +38729,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46155">
+<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mail port.
@@ -38924,7 +38741,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46170">
+<interface name="corenet_tcp_bind_mail_port" lineno="46293">
 <summary>
 Bind TCP sockets to the mail port.
 </summary>
@@ -38935,7 +38752,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46190">
+<interface name="corenet_udp_bind_mail_port" lineno="46313">
 <summary>
 Bind UDP sockets to the mail port.
 </summary>
@@ -38946,7 +38763,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46209">
+<interface name="corenet_tcp_connect_mail_port" lineno="46332">
 <summary>
 Make a TCP connection to the mail port.
 </summary>
@@ -38956,7 +38773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_client_packets" lineno="46229">
+<interface name="corenet_send_mail_client_packets" lineno="46352">
 <summary>
 Send mail_client packets.
 </summary>
@@ -38967,7 +38784,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46248">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
 <summary>
 Do not audit attempts to send mail_client packets.
 </summary>
@@ -38978,7 +38795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46267">
+<interface name="corenet_receive_mail_client_packets" lineno="46390">
 <summary>
 Receive mail_client packets.
 </summary>
@@ -38989,7 +38806,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46286">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
 <summary>
 Do not audit attempts to receive mail_client packets.
 </summary>
@@ -39000,7 +38817,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46305">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
 <summary>
 Send and receive mail_client packets.
 </summary>
@@ -39011,7 +38828,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46321">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
 <summary>
 Do not audit attempts to send and receive mail_client packets.
 </summary>
@@ -39022,7 +38839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46336">
+<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
 <summary>
 Relabel packets to mail_client the packet type.
 </summary>
@@ -39032,7 +38849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_server_packets" lineno="46356">
+<interface name="corenet_send_mail_server_packets" lineno="46479">
 <summary>
 Send mail_server packets.
 </summary>
@@ -39043,7 +38860,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46375">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
 <summary>
 Do not audit attempts to send mail_server packets.
 </summary>
@@ -39054,7 +38871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46394">
+<interface name="corenet_receive_mail_server_packets" lineno="46517">
 <summary>
 Receive mail_server packets.
 </summary>
@@ -39065,7 +38882,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46413">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
 <summary>
 Do not audit attempts to receive mail_server packets.
 </summary>
@@ -39076,7 +38893,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46432">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
 <summary>
 Send and receive mail_server packets.
 </summary>
@@ -39087,7 +38904,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46448">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
 <summary>
 Do not audit attempts to send and receive mail_server packets.
 </summary>
@@ -39098,7 +38915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46463">
+<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
 <summary>
 Relabel packets to mail_server the packet type.
 </summary>
@@ -39108,7 +38925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46485">
+<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
 <summary>
 Send and receive TCP traffic on the matahari port.
 </summary>
@@ -39119,7 +38936,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46500">
+<interface name="corenet_udp_send_matahari_port" lineno="46623">
 <summary>
 Send UDP traffic on the matahari port.
 </summary>
@@ -39130,7 +38947,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46515">
+<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
 <summary>
 Do not audit attempts to send UDP traffic on the matahari port.
 </summary>
@@ -39141,7 +38958,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46530">
+<interface name="corenet_udp_receive_matahari_port" lineno="46653">
 <summary>
 Receive UDP traffic on the matahari port.
 </summary>
@@ -39152,7 +38969,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46545">
+<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
 <summary>
 Do not audit attempts to receive UDP traffic on the matahari port.
 </summary>
@@ -39163,7 +38980,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46560">
+<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
 <summary>
 Send and receive UDP traffic on the matahari port.
 </summary>
@@ -39174,7 +38991,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46576">
+<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the matahari port.
@@ -39186,7 +39003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46591">
+<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
 <summary>
 Bind TCP sockets to the matahari port.
 </summary>
@@ -39197,7 +39014,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46611">
+<interface name="corenet_udp_bind_matahari_port" lineno="46734">
 <summary>
 Bind UDP sockets to the matahari port.
 </summary>
@@ -39208,7 +39025,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46630">
+<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
 <summary>
 Make a TCP connection to the matahari port.
 </summary>
@@ -39218,7 +39035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46650">
+<interface name="corenet_send_matahari_client_packets" lineno="46773">
 <summary>
 Send matahari_client packets.
 </summary>
@@ -39229,7 +39046,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46669">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
 <summary>
 Do not audit attempts to send matahari_client packets.
 </summary>
@@ -39240,7 +39057,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46688">
+<interface name="corenet_receive_matahari_client_packets" lineno="46811">
 <summary>
 Receive matahari_client packets.
 </summary>
@@ -39251,7 +39068,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46707">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
 <summary>
 Do not audit attempts to receive matahari_client packets.
 </summary>
@@ -39262,7 +39079,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46726">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
 <summary>
 Send and receive matahari_client packets.
 </summary>
@@ -39273,7 +39090,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46742">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
 <summary>
 Do not audit attempts to send and receive matahari_client packets.
 </summary>
@@ -39284,7 +39101,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46757">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
 <summary>
 Relabel packets to matahari_client the packet type.
 </summary>
@@ -39294,7 +39111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46777">
+<interface name="corenet_send_matahari_server_packets" lineno="46900">
 <summary>
 Send matahari_server packets.
 </summary>
@@ -39305,7 +39122,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46796">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
 <summary>
 Do not audit attempts to send matahari_server packets.
 </summary>
@@ -39316,7 +39133,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46815">
+<interface name="corenet_receive_matahari_server_packets" lineno="46938">
 <summary>
 Receive matahari_server packets.
 </summary>
@@ -39327,7 +39144,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46834">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
 <summary>
 Do not audit attempts to receive matahari_server packets.
 </summary>
@@ -39338,7 +39155,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46853">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
 <summary>
 Send and receive matahari_server packets.
 </summary>
@@ -39349,7 +39166,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46869">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
 <summary>
 Do not audit attempts to send and receive matahari_server packets.
 </summary>
@@ -39360,7 +39177,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="46884">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
 <summary>
 Relabel packets to matahari_server the packet type.
 </summary>
@@ -39370,7 +39187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="46906">
+<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
 <summary>
 Send and receive TCP traffic on the memcache port.
 </summary>
@@ -39381,7 +39198,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_memcache_port" lineno="46921">
+<interface name="corenet_udp_send_memcache_port" lineno="47044">
 <summary>
 Send UDP traffic on the memcache port.
 </summary>
@@ -39392,7 +39209,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="46936">
+<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
 <summary>
 Do not audit attempts to send UDP traffic on the memcache port.
 </summary>
@@ -39403,7 +39220,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="46951">
+<interface name="corenet_udp_receive_memcache_port" lineno="47074">
 <summary>
 Receive UDP traffic on the memcache port.
 </summary>
@@ -39414,7 +39231,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="46966">
+<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
 <summary>
 Do not audit attempts to receive UDP traffic on the memcache port.
 </summary>
@@ -39425,7 +39242,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="46981">
+<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
 <summary>
 Send and receive UDP traffic on the memcache port.
 </summary>
@@ -39436,7 +39253,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="46997">
+<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the memcache port.
@@ -39448,7 +39265,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47012">
+<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
 <summary>
 Bind TCP sockets to the memcache port.
 </summary>
@@ -39459,7 +39276,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47032">
+<interface name="corenet_udp_bind_memcache_port" lineno="47155">
 <summary>
 Bind UDP sockets to the memcache port.
 </summary>
@@ -39470,7 +39287,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47051">
+<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
 <summary>
 Make a TCP connection to the memcache port.
 </summary>
@@ -39480,7 +39297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47071">
+<interface name="corenet_send_memcache_client_packets" lineno="47194">
 <summary>
 Send memcache_client packets.
 </summary>
@@ -39491,7 +39308,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47090">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
 <summary>
 Do not audit attempts to send memcache_client packets.
 </summary>
@@ -39502,7 +39319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47109">
+<interface name="corenet_receive_memcache_client_packets" lineno="47232">
 <summary>
 Receive memcache_client packets.
 </summary>
@@ -39513,7 +39330,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47128">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
 <summary>
 Do not audit attempts to receive memcache_client packets.
 </summary>
@@ -39524,7 +39341,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47147">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
 <summary>
 Send and receive memcache_client packets.
 </summary>
@@ -39535,7 +39352,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47163">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
 <summary>
 Do not audit attempts to send and receive memcache_client packets.
 </summary>
@@ -39546,7 +39363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47178">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
 <summary>
 Relabel packets to memcache_client the packet type.
 </summary>
@@ -39556,7 +39373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47198">
+<interface name="corenet_send_memcache_server_packets" lineno="47321">
 <summary>
 Send memcache_server packets.
 </summary>
@@ -39567,7 +39384,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47217">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
 <summary>
 Do not audit attempts to send memcache_server packets.
 </summary>
@@ -39578,7 +39395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47236">
+<interface name="corenet_receive_memcache_server_packets" lineno="47359">
 <summary>
 Receive memcache_server packets.
 </summary>
@@ -39589,7 +39406,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47255">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
 <summary>
 Do not audit attempts to receive memcache_server packets.
 </summary>
@@ -39600,7 +39417,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47274">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
 <summary>
 Send and receive memcache_server packets.
 </summary>
@@ -39611,7 +39428,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47290">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
 <summary>
 Do not audit attempts to send and receive memcache_server packets.
 </summary>
@@ -39622,7 +39439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47305">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
 <summary>
 Relabel packets to memcache_server the packet type.
 </summary>
@@ -39632,7 +39449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47327">
+<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
 <summary>
 Send and receive TCP traffic on the milter port.
 </summary>
@@ -39643,7 +39460,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_milter_port" lineno="47342">
+<interface name="corenet_udp_send_milter_port" lineno="47465">
 <summary>
 Send UDP traffic on the milter port.
 </summary>
@@ -39654,7 +39471,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47357">
+<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
 <summary>
 Do not audit attempts to send UDP traffic on the milter port.
 </summary>
@@ -39665,7 +39482,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47372">
+<interface name="corenet_udp_receive_milter_port" lineno="47495">
 <summary>
 Receive UDP traffic on the milter port.
 </summary>
@@ -39676,7 +39493,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47387">
+<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
 <summary>
 Do not audit attempts to receive UDP traffic on the milter port.
 </summary>
@@ -39687,7 +39504,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47402">
+<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
 <summary>
 Send and receive UDP traffic on the milter port.
 </summary>
@@ -39698,7 +39515,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47418">
+<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the milter port.
@@ -39710,7 +39527,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47433">
+<interface name="corenet_tcp_bind_milter_port" lineno="47556">
 <summary>
 Bind TCP sockets to the milter port.
 </summary>
@@ -39721,7 +39538,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47453">
+<interface name="corenet_udp_bind_milter_port" lineno="47576">
 <summary>
 Bind UDP sockets to the milter port.
 </summary>
@@ -39732,7 +39549,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47472">
+<interface name="corenet_tcp_connect_milter_port" lineno="47595">
 <summary>
 Make a TCP connection to the milter port.
 </summary>
@@ -39742,7 +39559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_client_packets" lineno="47492">
+<interface name="corenet_send_milter_client_packets" lineno="47615">
 <summary>
 Send milter_client packets.
 </summary>
@@ -39753,7 +39570,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47511">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
 <summary>
 Do not audit attempts to send milter_client packets.
 </summary>
@@ -39764,7 +39581,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47530">
+<interface name="corenet_receive_milter_client_packets" lineno="47653">
 <summary>
 Receive milter_client packets.
 </summary>
@@ -39775,7 +39592,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47549">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
 <summary>
 Do not audit attempts to receive milter_client packets.
 </summary>
@@ -39786,7 +39603,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47568">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
 <summary>
 Send and receive milter_client packets.
 </summary>
@@ -39797,7 +39614,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47584">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
 <summary>
 Do not audit attempts to send and receive milter_client packets.
 </summary>
@@ -39808,7 +39625,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47599">
+<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
 <summary>
 Relabel packets to milter_client the packet type.
 </summary>
@@ -39818,7 +39635,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_server_packets" lineno="47619">
+<interface name="corenet_send_milter_server_packets" lineno="47742">
 <summary>
 Send milter_server packets.
 </summary>
@@ -39829,7 +39646,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47638">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
 <summary>
 Do not audit attempts to send milter_server packets.
 </summary>
@@ -39840,7 +39657,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47657">
+<interface name="corenet_receive_milter_server_packets" lineno="47780">
 <summary>
 Receive milter_server packets.
 </summary>
@@ -39851,7 +39668,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47676">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
 <summary>
 Do not audit attempts to receive milter_server packets.
 </summary>
@@ -39862,7 +39679,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47695">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
 <summary>
 Send and receive milter_server packets.
 </summary>
@@ -39873,7 +39690,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47711">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
 <summary>
 Do not audit attempts to send and receive milter_server packets.
 </summary>
@@ -39884,7 +39701,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47726">
+<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
 <summary>
 Relabel packets to milter_server the packet type.
 </summary>
@@ -39894,7 +39711,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47748">
+<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
 <summary>
 Send and receive TCP traffic on the mmcc port.
 </summary>
@@ -39905,7 +39722,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47763">
+<interface name="corenet_udp_send_mmcc_port" lineno="47886">
 <summary>
 Send UDP traffic on the mmcc port.
 </summary>
@@ -39916,7 +39733,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47778">
+<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
 <summary>
 Do not audit attempts to send UDP traffic on the mmcc port.
 </summary>
@@ -39927,7 +39744,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47793">
+<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
 <summary>
 Receive UDP traffic on the mmcc port.
 </summary>
@@ -39938,7 +39755,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47808">
+<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
 <summary>
 Do not audit attempts to receive UDP traffic on the mmcc port.
 </summary>
@@ -39949,7 +39766,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47823">
+<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
 <summary>
 Send and receive UDP traffic on the mmcc port.
 </summary>
@@ -39960,7 +39777,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47839">
+<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mmcc port.
@@ -39972,7 +39789,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47854">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
 <summary>
 Bind TCP sockets to the mmcc port.
 </summary>
@@ -39983,7 +39800,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="47874">
+<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
 <summary>
 Bind UDP sockets to the mmcc port.
 </summary>
@@ -39994,7 +39811,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="47893">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
 <summary>
 Make a TCP connection to the mmcc port.
 </summary>
@@ -40004,7 +39821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="47913">
+<interface name="corenet_send_mmcc_client_packets" lineno="48036">
 <summary>
 Send mmcc_client packets.
 </summary>
@@ -40015,7 +39832,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="47932">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
 <summary>
 Do not audit attempts to send mmcc_client packets.
 </summary>
@@ -40026,7 +39843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="47951">
+<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
 <summary>
 Receive mmcc_client packets.
 </summary>
@@ -40037,7 +39854,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="47970">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
 <summary>
 Do not audit attempts to receive mmcc_client packets.
 </summary>
@@ -40048,7 +39865,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="47989">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
 <summary>
 Send and receive mmcc_client packets.
 </summary>
@@ -40059,7 +39876,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48005">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
 <summary>
 Do not audit attempts to send and receive mmcc_client packets.
 </summary>
@@ -40070,7 +39887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48020">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
 <summary>
 Relabel packets to mmcc_client the packet type.
 </summary>
@@ -40080,7 +39897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48040">
+<interface name="corenet_send_mmcc_server_packets" lineno="48163">
 <summary>
 Send mmcc_server packets.
 </summary>
@@ -40091,7 +39908,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48059">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
 <summary>
 Do not audit attempts to send mmcc_server packets.
 </summary>
@@ -40102,7 +39919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48078">
+<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
 <summary>
 Receive mmcc_server packets.
 </summary>
@@ -40113,7 +39930,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48097">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
 <summary>
 Do not audit attempts to receive mmcc_server packets.
 </summary>
@@ -40124,7 +39941,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48116">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
 <summary>
 Send and receive mmcc_server packets.
 </summary>
@@ -40135,7 +39952,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48132">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
 <summary>
 Do not audit attempts to send and receive mmcc_server packets.
 </summary>
@@ -40146,7 +39963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48147">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
 <summary>
 Relabel packets to mmcc_server the packet type.
 </summary>
@@ -40156,7 +39973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48169">
+<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
 <summary>
 Send and receive TCP traffic on the mon port.
 </summary>
@@ -40167,7 +39984,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mon_port" lineno="48184">
+<interface name="corenet_udp_send_mon_port" lineno="48307">
 <summary>
 Send UDP traffic on the mon port.
 </summary>
@@ -40178,7 +39995,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48199">
+<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
 <summary>
 Do not audit attempts to send UDP traffic on the mon port.
 </summary>
@@ -40189,7 +40006,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48214">
+<interface name="corenet_udp_receive_mon_port" lineno="48337">
 <summary>
 Receive UDP traffic on the mon port.
 </summary>
@@ -40200,7 +40017,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48229">
+<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
 <summary>
 Do not audit attempts to receive UDP traffic on the mon port.
 </summary>
@@ -40211,7 +40028,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48244">
+<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
 <summary>
 Send and receive UDP traffic on the mon port.
 </summary>
@@ -40222,7 +40039,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48260">
+<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mon port.
@@ -40234,7 +40051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48275">
+<interface name="corenet_tcp_bind_mon_port" lineno="48398">
 <summary>
 Bind TCP sockets to the mon port.
 </summary>
@@ -40245,7 +40062,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48295">
+<interface name="corenet_udp_bind_mon_port" lineno="48418">
 <summary>
 Bind UDP sockets to the mon port.
 </summary>
@@ -40256,7 +40073,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48314">
+<interface name="corenet_tcp_connect_mon_port" lineno="48437">
 <summary>
 Make a TCP connection to the mon port.
 </summary>
@@ -40266,7 +40083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_client_packets" lineno="48334">
+<interface name="corenet_send_mon_client_packets" lineno="48457">
 <summary>
 Send mon_client packets.
 </summary>
@@ -40277,7 +40094,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48353">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
 <summary>
 Do not audit attempts to send mon_client packets.
 </summary>
@@ -40288,7 +40105,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48372">
+<interface name="corenet_receive_mon_client_packets" lineno="48495">
 <summary>
 Receive mon_client packets.
 </summary>
@@ -40299,7 +40116,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48391">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
 <summary>
 Do not audit attempts to receive mon_client packets.
 </summary>
@@ -40310,7 +40127,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48410">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
 <summary>
 Send and receive mon_client packets.
 </summary>
@@ -40321,7 +40138,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48426">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
 <summary>
 Do not audit attempts to send and receive mon_client packets.
 </summary>
@@ -40332,7 +40149,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48441">
+<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
 <summary>
 Relabel packets to mon_client the packet type.
 </summary>
@@ -40342,7 +40159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_server_packets" lineno="48461">
+<interface name="corenet_send_mon_server_packets" lineno="48584">
 <summary>
 Send mon_server packets.
 </summary>
@@ -40353,7 +40170,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48480">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
 <summary>
 Do not audit attempts to send mon_server packets.
 </summary>
@@ -40364,7 +40181,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48499">
+<interface name="corenet_receive_mon_server_packets" lineno="48622">
 <summary>
 Receive mon_server packets.
 </summary>
@@ -40375,7 +40192,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48518">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
 <summary>
 Do not audit attempts to receive mon_server packets.
 </summary>
@@ -40386,7 +40203,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48537">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
 <summary>
 Send and receive mon_server packets.
 </summary>
@@ -40397,7 +40214,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48553">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
 <summary>
 Do not audit attempts to send and receive mon_server packets.
 </summary>
@@ -40408,7 +40225,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48568">
+<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
 <summary>
 Relabel packets to mon_server the packet type.
 </summary>
@@ -40418,7 +40235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48590">
+<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
 <summary>
 Send and receive TCP traffic on the monit port.
 </summary>
@@ -40429,7 +40246,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_monit_port" lineno="48605">
+<interface name="corenet_udp_send_monit_port" lineno="48728">
 <summary>
 Send UDP traffic on the monit port.
 </summary>
@@ -40440,7 +40257,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48620">
+<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
 <summary>
 Do not audit attempts to send UDP traffic on the monit port.
 </summary>
@@ -40451,7 +40268,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48635">
+<interface name="corenet_udp_receive_monit_port" lineno="48758">
 <summary>
 Receive UDP traffic on the monit port.
 </summary>
@@ -40462,7 +40279,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48650">
+<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
 <summary>
 Do not audit attempts to receive UDP traffic on the monit port.
 </summary>
@@ -40473,7 +40290,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48665">
+<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
 <summary>
 Send and receive UDP traffic on the monit port.
 </summary>
@@ -40484,7 +40301,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48681">
+<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the monit port.
@@ -40496,7 +40313,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48696">
+<interface name="corenet_tcp_bind_monit_port" lineno="48819">
 <summary>
 Bind TCP sockets to the monit port.
 </summary>
@@ -40507,7 +40324,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48716">
+<interface name="corenet_udp_bind_monit_port" lineno="48839">
 <summary>
 Bind UDP sockets to the monit port.
 </summary>
@@ -40518,7 +40335,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48735">
+<interface name="corenet_tcp_connect_monit_port" lineno="48858">
 <summary>
 Make a TCP connection to the monit port.
 </summary>
@@ -40528,7 +40345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_client_packets" lineno="48755">
+<interface name="corenet_send_monit_client_packets" lineno="48878">
 <summary>
 Send monit_client packets.
 </summary>
@@ -40539,7 +40356,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48774">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
 <summary>
 Do not audit attempts to send monit_client packets.
 </summary>
@@ -40550,7 +40367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48793">
+<interface name="corenet_receive_monit_client_packets" lineno="48916">
 <summary>
 Receive monit_client packets.
 </summary>
@@ -40561,7 +40378,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48812">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
 <summary>
 Do not audit attempts to receive monit_client packets.
 </summary>
@@ -40572,7 +40389,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48831">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
 <summary>
 Send and receive monit_client packets.
 </summary>
@@ -40583,7 +40400,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48847">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
 <summary>
 Do not audit attempts to send and receive monit_client packets.
 </summary>
@@ -40594,7 +40411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="48862">
+<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
 <summary>
 Relabel packets to monit_client the packet type.
 </summary>
@@ -40604,7 +40421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_server_packets" lineno="48882">
+<interface name="corenet_send_monit_server_packets" lineno="49005">
 <summary>
 Send monit_server packets.
 </summary>
@@ -40615,7 +40432,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="48901">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
 <summary>
 Do not audit attempts to send monit_server packets.
 </summary>
@@ -40626,7 +40443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_server_packets" lineno="48920">
+<interface name="corenet_receive_monit_server_packets" lineno="49043">
 <summary>
 Receive monit_server packets.
 </summary>
@@ -40637,7 +40454,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="48939">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
 <summary>
 Do not audit attempts to receive monit_server packets.
 </summary>
@@ -40648,7 +40465,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="48958">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
 <summary>
 Send and receive monit_server packets.
 </summary>
@@ -40659,7 +40476,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="48974">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
 <summary>
 Do not audit attempts to send and receive monit_server packets.
 </summary>
@@ -40670,7 +40487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="48989">
+<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
 <summary>
 Relabel packets to monit_server the packet type.
 </summary>
@@ -40680,7 +40497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49011">
+<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
 <summary>
 Send and receive TCP traffic on the monopd port.
 </summary>
@@ -40691,7 +40508,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49026">
+<interface name="corenet_udp_send_monopd_port" lineno="49149">
 <summary>
 Send UDP traffic on the monopd port.
 </summary>
@@ -40702,7 +40519,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49041">
+<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
 <summary>
 Do not audit attempts to send UDP traffic on the monopd port.
 </summary>
@@ -40713,7 +40530,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49056">
+<interface name="corenet_udp_receive_monopd_port" lineno="49179">
 <summary>
 Receive UDP traffic on the monopd port.
 </summary>
@@ -40724,7 +40541,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49071">
+<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
 <summary>
 Do not audit attempts to receive UDP traffic on the monopd port.
 </summary>
@@ -40735,7 +40552,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49086">
+<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
 <summary>
 Send and receive UDP traffic on the monopd port.
 </summary>
@@ -40746,7 +40563,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49102">
+<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the monopd port.
@@ -40758,7 +40575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49117">
+<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
 <summary>
 Bind TCP sockets to the monopd port.
 </summary>
@@ -40769,7 +40586,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49137">
+<interface name="corenet_udp_bind_monopd_port" lineno="49260">
 <summary>
 Bind UDP sockets to the monopd port.
 </summary>
@@ -40780,7 +40597,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49156">
+<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
 <summary>
 Make a TCP connection to the monopd port.
 </summary>
@@ -40790,7 +40607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49176">
+<interface name="corenet_send_monopd_client_packets" lineno="49299">
 <summary>
 Send monopd_client packets.
 </summary>
@@ -40801,7 +40618,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49195">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
 <summary>
 Do not audit attempts to send monopd_client packets.
 </summary>
@@ -40812,7 +40629,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49214">
+<interface name="corenet_receive_monopd_client_packets" lineno="49337">
 <summary>
 Receive monopd_client packets.
 </summary>
@@ -40823,7 +40640,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49233">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
 <summary>
 Do not audit attempts to receive monopd_client packets.
 </summary>
@@ -40834,7 +40651,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49252">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
 <summary>
 Send and receive monopd_client packets.
 </summary>
@@ -40845,7 +40662,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49268">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
 <summary>
 Do not audit attempts to send and receive monopd_client packets.
 </summary>
@@ -40856,7 +40673,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49283">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
 <summary>
 Relabel packets to monopd_client the packet type.
 </summary>
@@ -40866,7 +40683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49303">
+<interface name="corenet_send_monopd_server_packets" lineno="49426">
 <summary>
 Send monopd_server packets.
 </summary>
@@ -40877,7 +40694,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49322">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
 <summary>
 Do not audit attempts to send monopd_server packets.
 </summary>
@@ -40888,7 +40705,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49341">
+<interface name="corenet_receive_monopd_server_packets" lineno="49464">
 <summary>
 Receive monopd_server packets.
 </summary>
@@ -40899,7 +40716,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49360">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
 <summary>
 Do not audit attempts to receive monopd_server packets.
 </summary>
@@ -40910,7 +40727,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49379">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
 <summary>
 Send and receive monopd_server packets.
 </summary>
@@ -40921,7 +40738,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49395">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
 <summary>
 Do not audit attempts to send and receive monopd_server packets.
 </summary>
@@ -40932,7 +40749,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49410">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
 <summary>
 Relabel packets to monopd_server the packet type.
 </summary>
@@ -40942,7 +40759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49432">
+<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
 <summary>
 Send and receive TCP traffic on the mountd port.
 </summary>
@@ -40953,7 +40770,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49447">
+<interface name="corenet_udp_send_mountd_port" lineno="49570">
 <summary>
 Send UDP traffic on the mountd port.
 </summary>
@@ -40964,7 +40781,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49462">
+<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
 <summary>
 Do not audit attempts to send UDP traffic on the mountd port.
 </summary>
@@ -40975,7 +40792,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49477">
+<interface name="corenet_udp_receive_mountd_port" lineno="49600">
 <summary>
 Receive UDP traffic on the mountd port.
 </summary>
@@ -40986,7 +40803,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49492">
+<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
 <summary>
 Do not audit attempts to receive UDP traffic on the mountd port.
 </summary>
@@ -40997,7 +40814,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49507">
+<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
 <summary>
 Send and receive UDP traffic on the mountd port.
 </summary>
@@ -41008,7 +40825,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49523">
+<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mountd port.
@@ -41020,7 +40837,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49538">
+<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
 <summary>
 Bind TCP sockets to the mountd port.
 </summary>
@@ -41031,7 +40848,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49558">
+<interface name="corenet_udp_bind_mountd_port" lineno="49681">
 <summary>
 Bind UDP sockets to the mountd port.
 </summary>
@@ -41042,7 +40859,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49577">
+<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
 <summary>
 Make a TCP connection to the mountd port.
 </summary>
@@ -41052,7 +40869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49597">
+<interface name="corenet_send_mountd_client_packets" lineno="49720">
 <summary>
 Send mountd_client packets.
 </summary>
@@ -41063,7 +40880,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49616">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
 <summary>
 Do not audit attempts to send mountd_client packets.
 </summary>
@@ -41074,7 +40891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49635">
+<interface name="corenet_receive_mountd_client_packets" lineno="49758">
 <summary>
 Receive mountd_client packets.
 </summary>
@@ -41085,7 +40902,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49654">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
 <summary>
 Do not audit attempts to receive mountd_client packets.
 </summary>
@@ -41096,7 +40913,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49673">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
 <summary>
 Send and receive mountd_client packets.
 </summary>
@@ -41107,7 +40924,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49689">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
 <summary>
 Do not audit attempts to send and receive mountd_client packets.
 </summary>
@@ -41118,7 +40935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49704">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
 <summary>
 Relabel packets to mountd_client the packet type.
 </summary>
@@ -41128,7 +40945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49724">
+<interface name="corenet_send_mountd_server_packets" lineno="49847">
 <summary>
 Send mountd_server packets.
 </summary>
@@ -41139,7 +40956,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49743">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
 <summary>
 Do not audit attempts to send mountd_server packets.
 </summary>
@@ -41150,7 +40967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49762">
+<interface name="corenet_receive_mountd_server_packets" lineno="49885">
 <summary>
 Receive mountd_server packets.
 </summary>
@@ -41161,7 +40978,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49781">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
 <summary>
 Do not audit attempts to receive mountd_server packets.
 </summary>
@@ -41172,7 +40989,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49800">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
 <summary>
 Send and receive mountd_server packets.
 </summary>
@@ -41183,7 +41000,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49816">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
 <summary>
 Do not audit attempts to send and receive mountd_server packets.
 </summary>
@@ -41194,7 +41011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49831">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
 <summary>
 Relabel packets to mountd_server the packet type.
 </summary>
@@ -41204,7 +41021,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49853">
+<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
 <summary>
 Send and receive TCP traffic on the movaz_ssc port.
 </summary>
@@ -41215,7 +41032,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="49868">
+<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
 <summary>
 Send UDP traffic on the movaz_ssc port.
 </summary>
@@ -41226,7 +41043,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="49883">
+<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
 <summary>
 Do not audit attempts to send UDP traffic on the movaz_ssc port.
 </summary>
@@ -41237,7 +41054,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="49898">
+<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
 <summary>
 Receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41248,7 +41065,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="49913">
+<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
 <summary>
 Do not audit attempts to receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41259,7 +41076,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="49928">
+<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
 <summary>
 Send and receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41270,7 +41087,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="49944">
+<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the movaz_ssc port.
@@ -41282,7 +41099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="49959">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
 <summary>
 Bind TCP sockets to the movaz_ssc port.
 </summary>
@@ -41293,7 +41110,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="49979">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
 <summary>
 Bind UDP sockets to the movaz_ssc port.
 </summary>
@@ -41304,7 +41121,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="49998">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
 <summary>
 Make a TCP connection to the movaz_ssc port.
 </summary>
@@ -41314,7 +41131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50018">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
 <summary>
 Send movaz_ssc_client packets.
 </summary>
@@ -41325,7 +41142,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50037">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
 <summary>
 Do not audit attempts to send movaz_ssc_client packets.
 </summary>
@@ -41336,7 +41153,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50056">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
 <summary>
 Receive movaz_ssc_client packets.
 </summary>
@@ -41347,7 +41164,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50075">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
 <summary>
 Do not audit attempts to receive movaz_ssc_client packets.
 </summary>
@@ -41358,7 +41175,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50094">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
 <summary>
 Send and receive movaz_ssc_client packets.
 </summary>
@@ -41369,7 +41186,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50110">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_client packets.
 </summary>
@@ -41380,7 +41197,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50125">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
 <summary>
 Relabel packets to movaz_ssc_client the packet type.
 </summary>
@@ -41390,7 +41207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50145">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
 <summary>
 Send movaz_ssc_server packets.
 </summary>
@@ -41401,7 +41218,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50164">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
 <summary>
 Do not audit attempts to send movaz_ssc_server packets.
 </summary>
@@ -41412,7 +41229,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50183">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
 <summary>
 Receive movaz_ssc_server packets.
 </summary>
@@ -41423,7 +41240,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50202">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
 <summary>
 Do not audit attempts to receive movaz_ssc_server packets.
 </summary>
@@ -41434,7 +41251,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50221">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
 <summary>
 Send and receive movaz_ssc_server packets.
 </summary>
@@ -41445,7 +41262,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50237">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_server packets.
 </summary>
@@ -41456,7 +41273,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50252">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
 <summary>
 Relabel packets to movaz_ssc_server the packet type.
 </summary>
@@ -41466,7 +41283,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50274">
+<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
 <summary>
 Send and receive TCP traffic on the mpd port.
 </summary>
@@ -41477,7 +41294,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50289">
+<interface name="corenet_udp_send_mpd_port" lineno="50412">
 <summary>
 Send UDP traffic on the mpd port.
 </summary>
@@ -41488,7 +41305,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50304">
+<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
 <summary>
 Do not audit attempts to send UDP traffic on the mpd port.
 </summary>
@@ -41499,7 +41316,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50319">
+<interface name="corenet_udp_receive_mpd_port" lineno="50442">
 <summary>
 Receive UDP traffic on the mpd port.
 </summary>
@@ -41510,7 +41327,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50334">
+<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
 <summary>
 Do not audit attempts to receive UDP traffic on the mpd port.
 </summary>
@@ -41521,7 +41338,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50349">
+<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
 <summary>
 Send and receive UDP traffic on the mpd port.
 </summary>
@@ -41532,7 +41349,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50365">
+<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mpd port.
@@ -41544,7 +41361,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50380">
+<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
 <summary>
 Bind TCP sockets to the mpd port.
 </summary>
@@ -41555,7 +41372,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50400">
+<interface name="corenet_udp_bind_mpd_port" lineno="50523">
 <summary>
 Bind UDP sockets to the mpd port.
 </summary>
@@ -41566,7 +41383,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50419">
+<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
 <summary>
 Make a TCP connection to the mpd port.
 </summary>
@@ -41576,7 +41393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50439">
+<interface name="corenet_send_mpd_client_packets" lineno="50562">
 <summary>
 Send mpd_client packets.
 </summary>
@@ -41587,7 +41404,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50458">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
 <summary>
 Do not audit attempts to send mpd_client packets.
 </summary>
@@ -41598,7 +41415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50477">
+<interface name="corenet_receive_mpd_client_packets" lineno="50600">
 <summary>
 Receive mpd_client packets.
 </summary>
@@ -41609,7 +41426,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50496">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
 <summary>
 Do not audit attempts to receive mpd_client packets.
 </summary>
@@ -41620,7 +41437,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50515">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
 <summary>
 Send and receive mpd_client packets.
 </summary>
@@ -41631,7 +41448,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50531">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
 <summary>
 Do not audit attempts to send and receive mpd_client packets.
 </summary>
@@ -41642,7 +41459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50546">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
 <summary>
 Relabel packets to mpd_client the packet type.
 </summary>
@@ -41652,7 +41469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50566">
+<interface name="corenet_send_mpd_server_packets" lineno="50689">
 <summary>
 Send mpd_server packets.
 </summary>
@@ -41663,7 +41480,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50585">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
 <summary>
 Do not audit attempts to send mpd_server packets.
 </summary>
@@ -41674,7 +41491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50604">
+<interface name="corenet_receive_mpd_server_packets" lineno="50727">
 <summary>
 Receive mpd_server packets.
 </summary>
@@ -41685,7 +41502,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50623">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
 <summary>
 Do not audit attempts to receive mpd_server packets.
 </summary>
@@ -41696,7 +41513,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50642">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
 <summary>
 Send and receive mpd_server packets.
 </summary>
@@ -41707,7 +41524,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50658">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
 <summary>
 Do not audit attempts to send and receive mpd_server packets.
 </summary>
@@ -41718,7 +41535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50673">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
 <summary>
 Relabel packets to mpd_server the packet type.
 </summary>
@@ -41728,7 +41545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50695">
+<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
 <summary>
 Send and receive TCP traffic on the msgsrvr port.
 </summary>
@@ -41739,7 +41556,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50710">
+<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
 <summary>
 Send UDP traffic on the msgsrvr port.
 </summary>
@@ -41750,7 +41567,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50725">
+<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
 <summary>
 Do not audit attempts to send UDP traffic on the msgsrvr port.
 </summary>
@@ -41761,7 +41578,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50740">
+<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
 <summary>
 Receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41772,7 +41589,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50755">
+<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
 <summary>
 Do not audit attempts to receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41783,7 +41600,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50770">
+<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
 <summary>
 Send and receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41794,7 +41611,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50786">
+<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the msgsrvr port.
@@ -41806,7 +41623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50801">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
 <summary>
 Bind TCP sockets to the msgsrvr port.
 </summary>
@@ -41817,7 +41634,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50821">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
 <summary>
 Bind UDP sockets to the msgsrvr port.
 </summary>
@@ -41828,7 +41645,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50840">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
 <summary>
 Make a TCP connection to the msgsrvr port.
 </summary>
@@ -41838,7 +41655,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="50860">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
 <summary>
 Send msgsrvr_client packets.
 </summary>
@@ -41849,7 +41666,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="50879">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
 <summary>
 Do not audit attempts to send msgsrvr_client packets.
 </summary>
@@ -41860,7 +41677,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="50898">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
 <summary>
 Receive msgsrvr_client packets.
 </summary>
@@ -41871,7 +41688,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="50917">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
 <summary>
 Do not audit attempts to receive msgsrvr_client packets.
 </summary>
@@ -41882,7 +41699,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="50936">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
 <summary>
 Send and receive msgsrvr_client packets.
 </summary>
@@ -41893,7 +41710,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="50952">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
 <summary>
 Do not audit attempts to send and receive msgsrvr_client packets.
 </summary>
@@ -41904,7 +41721,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="50967">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
 <summary>
 Relabel packets to msgsrvr_client the packet type.
 </summary>
@@ -41914,7 +41731,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="50987">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
 <summary>
 Send msgsrvr_server packets.
 </summary>
@@ -41925,7 +41742,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51006">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
 <summary>
 Do not audit attempts to send msgsrvr_server packets.
 </summary>
@@ -41936,7 +41753,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51025">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
 <summary>
 Receive msgsrvr_server packets.
 </summary>
@@ -41947,7 +41764,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51044">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
 <summary>
 Do not audit attempts to receive msgsrvr_server packets.
 </summary>
@@ -41958,7 +41775,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51063">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
 <summary>
 Send and receive msgsrvr_server packets.
 </summary>
@@ -41969,7 +41786,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51079">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
 <summary>
 Do not audit attempts to send and receive msgsrvr_server packets.
 </summary>
@@ -41980,7 +41797,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51094">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
 <summary>
 Relabel packets to msgsrvr_server the packet type.
 </summary>
@@ -41990,7 +41807,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51116">
+<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
 <summary>
 Send and receive TCP traffic on the msnp port.
 </summary>
@@ -42001,7 +41818,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51131">
+<interface name="corenet_udp_send_msnp_port" lineno="51254">
 <summary>
 Send UDP traffic on the msnp port.
 </summary>
@@ -42012,7 +41829,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51146">
+<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
 <summary>
 Do not audit attempts to send UDP traffic on the msnp port.
 </summary>
@@ -42023,7 +41840,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51161">
+<interface name="corenet_udp_receive_msnp_port" lineno="51284">
 <summary>
 Receive UDP traffic on the msnp port.
 </summary>
@@ -42034,7 +41851,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51176">
+<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
 <summary>
 Do not audit attempts to receive UDP traffic on the msnp port.
 </summary>
@@ -42045,7 +41862,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51191">
+<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
 <summary>
 Send and receive UDP traffic on the msnp port.
 </summary>
@@ -42056,7 +41873,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51207">
+<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the msnp port.
@@ -42068,7 +41885,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51222">
+<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
 <summary>
 Bind TCP sockets to the msnp port.
 </summary>
@@ -42079,7 +41896,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51242">
+<interface name="corenet_udp_bind_msnp_port" lineno="51365">
 <summary>
 Bind UDP sockets to the msnp port.
 </summary>
@@ -42090,7 +41907,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51261">
+<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
 <summary>
 Make a TCP connection to the msnp port.
 </summary>
@@ -42100,7 +41917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51281">
+<interface name="corenet_send_msnp_client_packets" lineno="51404">
 <summary>
 Send msnp_client packets.
 </summary>
@@ -42111,7 +41928,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51300">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
 <summary>
 Do not audit attempts to send msnp_client packets.
 </summary>
@@ -42122,7 +41939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51319">
+<interface name="corenet_receive_msnp_client_packets" lineno="51442">
 <summary>
 Receive msnp_client packets.
 </summary>
@@ -42133,7 +41950,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51338">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
 <summary>
 Do not audit attempts to receive msnp_client packets.
 </summary>
@@ -42144,7 +41961,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51357">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
 <summary>
 Send and receive msnp_client packets.
 </summary>
@@ -42155,7 +41972,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51373">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
 <summary>
 Do not audit attempts to send and receive msnp_client packets.
 </summary>
@@ -42166,7 +41983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51388">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
 <summary>
 Relabel packets to msnp_client the packet type.
 </summary>
@@ -42176,7 +41993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51408">
+<interface name="corenet_send_msnp_server_packets" lineno="51531">
 <summary>
 Send msnp_server packets.
 </summary>
@@ -42187,7 +42004,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51427">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
 <summary>
 Do not audit attempts to send msnp_server packets.
 </summary>
@@ -42198,7 +42015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51446">
+<interface name="corenet_receive_msnp_server_packets" lineno="51569">
 <summary>
 Receive msnp_server packets.
 </summary>
@@ -42209,7 +42026,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51465">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
 <summary>
 Do not audit attempts to receive msnp_server packets.
 </summary>
@@ -42220,7 +42037,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51484">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
 <summary>
 Send and receive msnp_server packets.
 </summary>
@@ -42231,7 +42048,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51500">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
 <summary>
 Do not audit attempts to send and receive msnp_server packets.
 </summary>
@@ -42242,7 +42059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51515">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
 <summary>
 Relabel packets to msnp_server the packet type.
 </summary>
@@ -42252,7 +42069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51537">
+<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
 <summary>
 Send and receive TCP traffic on the mssql port.
 </summary>
@@ -42263,7 +42080,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51552">
+<interface name="corenet_udp_send_mssql_port" lineno="51675">
 <summary>
 Send UDP traffic on the mssql port.
 </summary>
@@ -42274,7 +42091,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51567">
+<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
 <summary>
 Do not audit attempts to send UDP traffic on the mssql port.
 </summary>
@@ -42285,7 +42102,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51582">
+<interface name="corenet_udp_receive_mssql_port" lineno="51705">
 <summary>
 Receive UDP traffic on the mssql port.
 </summary>
@@ -42296,7 +42113,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51597">
+<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
 <summary>
 Do not audit attempts to receive UDP traffic on the mssql port.
 </summary>
@@ -42307,7 +42124,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51612">
+<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
 <summary>
 Send and receive UDP traffic on the mssql port.
 </summary>
@@ -42318,7 +42135,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51628">
+<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mssql port.
@@ -42330,7 +42147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51643">
+<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
 <summary>
 Bind TCP sockets to the mssql port.
 </summary>
@@ -42341,7 +42158,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51663">
+<interface name="corenet_udp_bind_mssql_port" lineno="51786">
 <summary>
 Bind UDP sockets to the mssql port.
 </summary>
@@ -42352,7 +42169,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51682">
+<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
 <summary>
 Make a TCP connection to the mssql port.
 </summary>
@@ -42362,7 +42179,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51702">
+<interface name="corenet_send_mssql_client_packets" lineno="51825">
 <summary>
 Send mssql_client packets.
 </summary>
@@ -42373,7 +42190,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51721">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
 <summary>
 Do not audit attempts to send mssql_client packets.
 </summary>
@@ -42384,7 +42201,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51740">
+<interface name="corenet_receive_mssql_client_packets" lineno="51863">
 <summary>
 Receive mssql_client packets.
 </summary>
@@ -42395,7 +42212,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51759">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
 <summary>
 Do not audit attempts to receive mssql_client packets.
 </summary>
@@ -42406,7 +42223,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51778">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
 <summary>
 Send and receive mssql_client packets.
 </summary>
@@ -42417,7 +42234,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51794">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
 <summary>
 Do not audit attempts to send and receive mssql_client packets.
 </summary>
@@ -42428,7 +42245,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51809">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
 <summary>
 Relabel packets to mssql_client the packet type.
 </summary>
@@ -42438,7 +42255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51829">
+<interface name="corenet_send_mssql_server_packets" lineno="51952">
 <summary>
 Send mssql_server packets.
 </summary>
@@ -42449,7 +42266,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51848">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
 <summary>
 Do not audit attempts to send mssql_server packets.
 </summary>
@@ -42460,7 +42277,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="51867">
+<interface name="corenet_receive_mssql_server_packets" lineno="51990">
 <summary>
 Receive mssql_server packets.
 </summary>
@@ -42471,7 +42288,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="51886">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
 <summary>
 Do not audit attempts to receive mssql_server packets.
 </summary>
@@ -42482,7 +42299,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="51905">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
 <summary>
 Send and receive mssql_server packets.
 </summary>
@@ -42493,7 +42310,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="51921">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
 <summary>
 Do not audit attempts to send and receive mssql_server packets.
 </summary>
@@ -42504,7 +42321,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="51936">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
 <summary>
 Relabel packets to mssql_server the packet type.
 </summary>
@@ -42514,7 +42331,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="51958">
+<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
 <summary>
 Send and receive TCP traffic on the ms_streaming port.
 </summary>
@@ -42525,7 +42342,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="51973">
+<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
 <summary>
 Send UDP traffic on the ms_streaming port.
 </summary>
@@ -42536,7 +42353,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="51988">
+<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
 <summary>
 Do not audit attempts to send UDP traffic on the ms_streaming port.
 </summary>
@@ -42547,7 +42364,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52003">
+<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
 <summary>
 Receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42558,7 +42375,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52018">
+<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
 <summary>
 Do not audit attempts to receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42569,7 +42386,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52033">
+<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
 <summary>
 Send and receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42580,7 +42397,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52049">
+<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ms_streaming port.
@@ -42592,7 +42409,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52064">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
 <summary>
 Bind TCP sockets to the ms_streaming port.
 </summary>
@@ -42603,7 +42420,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52084">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
 <summary>
 Bind UDP sockets to the ms_streaming port.
 </summary>
@@ -42614,7 +42431,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52103">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
 <summary>
 Make a TCP connection to the ms_streaming port.
 </summary>
@@ -42624,7 +42441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52123">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
 <summary>
 Send ms_streaming_client packets.
 </summary>
@@ -42635,7 +42452,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52142">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
 <summary>
 Do not audit attempts to send ms_streaming_client packets.
 </summary>
@@ -42646,7 +42463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52161">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
 <summary>
 Receive ms_streaming_client packets.
 </summary>
@@ -42657,7 +42474,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52180">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
 <summary>
 Do not audit attempts to receive ms_streaming_client packets.
 </summary>
@@ -42668,7 +42485,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52199">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
 <summary>
 Send and receive ms_streaming_client packets.
 </summary>
@@ -42679,7 +42496,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52215">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
 <summary>
 Do not audit attempts to send and receive ms_streaming_client packets.
 </summary>
@@ -42690,7 +42507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52230">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
 <summary>
 Relabel packets to ms_streaming_client the packet type.
 </summary>
@@ -42700,7 +42517,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52250">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
 <summary>
 Send ms_streaming_server packets.
 </summary>
@@ -42711,7 +42528,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52269">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
 <summary>
 Do not audit attempts to send ms_streaming_server packets.
 </summary>
@@ -42722,7 +42539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52288">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
 <summary>
 Receive ms_streaming_server packets.
 </summary>
@@ -42733,7 +42550,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52307">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
 <summary>
 Do not audit attempts to receive ms_streaming_server packets.
 </summary>
@@ -42744,7 +42561,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52326">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
 <summary>
 Send and receive ms_streaming_server packets.
 </summary>
@@ -42755,7 +42572,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52342">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
 <summary>
 Do not audit attempts to send and receive ms_streaming_server packets.
 </summary>
@@ -42766,7 +42583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52357">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
 <summary>
 Relabel packets to ms_streaming_server the packet type.
 </summary>
@@ -42776,7 +42593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52379">
+<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
 <summary>
 Send and receive TCP traffic on the munin port.
 </summary>
@@ -42787,7 +42604,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_munin_port" lineno="52394">
+<interface name="corenet_udp_send_munin_port" lineno="52517">
 <summary>
 Send UDP traffic on the munin port.
 </summary>
@@ -42798,7 +42615,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52409">
+<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
 <summary>
 Do not audit attempts to send UDP traffic on the munin port.
 </summary>
@@ -42809,7 +42626,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52424">
+<interface name="corenet_udp_receive_munin_port" lineno="52547">
 <summary>
 Receive UDP traffic on the munin port.
 </summary>
@@ -42820,7 +42637,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52439">
+<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
 <summary>
 Do not audit attempts to receive UDP traffic on the munin port.
 </summary>
@@ -42831,7 +42648,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52454">
+<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
 <summary>
 Send and receive UDP traffic on the munin port.
 </summary>
@@ -42842,7 +42659,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52470">
+<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the munin port.
@@ -42854,7 +42671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52485">
+<interface name="corenet_tcp_bind_munin_port" lineno="52608">
 <summary>
 Bind TCP sockets to the munin port.
 </summary>
@@ -42865,7 +42682,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52505">
+<interface name="corenet_udp_bind_munin_port" lineno="52628">
 <summary>
 Bind UDP sockets to the munin port.
 </summary>
@@ -42876,7 +42693,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52524">
+<interface name="corenet_tcp_connect_munin_port" lineno="52647">
 <summary>
 Make a TCP connection to the munin port.
 </summary>
@@ -42886,7 +42703,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_client_packets" lineno="52544">
+<interface name="corenet_send_munin_client_packets" lineno="52667">
 <summary>
 Send munin_client packets.
 </summary>
@@ -42897,7 +42714,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52563">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
 <summary>
 Do not audit attempts to send munin_client packets.
 </summary>
@@ -42908,7 +42725,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52582">
+<interface name="corenet_receive_munin_client_packets" lineno="52705">
 <summary>
 Receive munin_client packets.
 </summary>
@@ -42919,7 +42736,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52601">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
 <summary>
 Do not audit attempts to receive munin_client packets.
 </summary>
@@ -42930,7 +42747,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52620">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
 <summary>
 Send and receive munin_client packets.
 </summary>
@@ -42941,7 +42758,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52636">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
 <summary>
 Do not audit attempts to send and receive munin_client packets.
 </summary>
@@ -42952,7 +42769,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52651">
+<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
 <summary>
 Relabel packets to munin_client the packet type.
 </summary>
@@ -42962,7 +42779,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_server_packets" lineno="52671">
+<interface name="corenet_send_munin_server_packets" lineno="52794">
 <summary>
 Send munin_server packets.
 </summary>
@@ -42973,7 +42790,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52690">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
 <summary>
 Do not audit attempts to send munin_server packets.
 </summary>
@@ -42984,7 +42801,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52709">
+<interface name="corenet_receive_munin_server_packets" lineno="52832">
 <summary>
 Receive munin_server packets.
 </summary>
@@ -42995,7 +42812,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52728">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
 <summary>
 Do not audit attempts to receive munin_server packets.
 </summary>
@@ -43006,7 +42823,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52747">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
 <summary>
 Send and receive munin_server packets.
 </summary>
@@ -43017,7 +42834,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52763">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
 <summary>
 Do not audit attempts to send and receive munin_server packets.
 </summary>
@@ -43028,7 +42845,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52778">
+<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
 <summary>
 Relabel packets to munin_server the packet type.
 </summary>
@@ -43038,7 +42855,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52800">
+<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
 <summary>
 Send and receive TCP traffic on the mxi port.
 </summary>
@@ -43049,7 +42866,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52815">
+<interface name="corenet_udp_send_mxi_port" lineno="52938">
 <summary>
 Send UDP traffic on the mxi port.
 </summary>
@@ -43060,7 +42877,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52830">
+<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
 <summary>
 Do not audit attempts to send UDP traffic on the mxi port.
 </summary>
@@ -43071,7 +42888,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52845">
+<interface name="corenet_udp_receive_mxi_port" lineno="52968">
 <summary>
 Receive UDP traffic on the mxi port.
 </summary>
@@ -43082,7 +42899,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52860">
+<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
 <summary>
 Do not audit attempts to receive UDP traffic on the mxi port.
 </summary>
@@ -43093,7 +42910,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="52875">
+<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
 <summary>
 Send and receive UDP traffic on the mxi port.
 </summary>
@@ -43104,7 +42921,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="52891">
+<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mxi port.
@@ -43116,7 +42933,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="52906">
+<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
 <summary>
 Bind TCP sockets to the mxi port.
 </summary>
@@ -43127,7 +42944,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="52926">
+<interface name="corenet_udp_bind_mxi_port" lineno="53049">
 <summary>
 Bind UDP sockets to the mxi port.
 </summary>
@@ -43138,7 +42955,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="52945">
+<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
 <summary>
 Make a TCP connection to the mxi port.
 </summary>
@@ -43148,7 +42965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_client_packets" lineno="52965">
+<interface name="corenet_send_mxi_client_packets" lineno="53088">
 <summary>
 Send mxi_client packets.
 </summary>
@@ -43159,7 +42976,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="52984">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
 <summary>
 Do not audit attempts to send mxi_client packets.
 </summary>
@@ -43170,7 +42987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53003">
+<interface name="corenet_receive_mxi_client_packets" lineno="53126">
 <summary>
 Receive mxi_client packets.
 </summary>
@@ -43181,7 +42998,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53022">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
 <summary>
 Do not audit attempts to receive mxi_client packets.
 </summary>
@@ -43192,7 +43009,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53041">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
 <summary>
 Send and receive mxi_client packets.
 </summary>
@@ -43203,7 +43020,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53057">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
 <summary>
 Do not audit attempts to send and receive mxi_client packets.
 </summary>
@@ -43214,7 +43031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53072">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
 <summary>
 Relabel packets to mxi_client the packet type.
 </summary>
@@ -43224,7 +43041,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53092">
+<interface name="corenet_send_mxi_server_packets" lineno="53215">
 <summary>
 Send mxi_server packets.
 </summary>
@@ -43235,7 +43052,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53111">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
 <summary>
 Do not audit attempts to send mxi_server packets.
 </summary>
@@ -43246,7 +43063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53130">
+<interface name="corenet_receive_mxi_server_packets" lineno="53253">
 <summary>
 Receive mxi_server packets.
 </summary>
@@ -43257,7 +43074,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53149">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
 <summary>
 Do not audit attempts to receive mxi_server packets.
 </summary>
@@ -43268,7 +43085,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53168">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
 <summary>
 Send and receive mxi_server packets.
 </summary>
@@ -43279,7 +43096,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53184">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
 <summary>
 Do not audit attempts to send and receive mxi_server packets.
 </summary>
@@ -43290,7 +43107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53199">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
 <summary>
 Relabel packets to mxi_server the packet type.
 </summary>
@@ -43300,7 +43117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53221">
+<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
 <summary>
 Send and receive TCP traffic on the mysqld port.
 </summary>
@@ -43311,7 +43128,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53236">
+<interface name="corenet_udp_send_mysqld_port" lineno="53359">
 <summary>
 Send UDP traffic on the mysqld port.
 </summary>
@@ -43322,7 +43139,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53251">
+<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
 <summary>
 Do not audit attempts to send UDP traffic on the mysqld port.
 </summary>
@@ -43333,7 +43150,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53266">
+<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
 <summary>
 Receive UDP traffic on the mysqld port.
 </summary>
@@ -43344,7 +43161,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53281">
+<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
 <summary>
 Do not audit attempts to receive UDP traffic on the mysqld port.
 </summary>
@@ -43355,7 +43172,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53296">
+<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
 <summary>
 Send and receive UDP traffic on the mysqld port.
 </summary>
@@ -43366,7 +43183,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53312">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mysqld port.
@@ -43378,7 +43195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53327">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
 <summary>
 Bind TCP sockets to the mysqld port.
 </summary>
@@ -43389,7 +43206,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53347">
+<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
 <summary>
 Bind UDP sockets to the mysqld port.
 </summary>
@@ -43400,7 +43217,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53366">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
 <summary>
 Make a TCP connection to the mysqld port.
 </summary>
@@ -43410,7 +43227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53386">
+<interface name="corenet_send_mysqld_client_packets" lineno="53509">
 <summary>
 Send mysqld_client packets.
 </summary>
@@ -43421,7 +43238,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53405">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
 <summary>
 Do not audit attempts to send mysqld_client packets.
 </summary>
@@ -43432,7 +43249,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53424">
+<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
 <summary>
 Receive mysqld_client packets.
 </summary>
@@ -43443,7 +43260,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53443">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
 <summary>
 Do not audit attempts to receive mysqld_client packets.
 </summary>
@@ -43454,7 +43271,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53462">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
 <summary>
 Send and receive mysqld_client packets.
 </summary>
@@ -43465,7 +43282,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53478">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
 <summary>
 Do not audit attempts to send and receive mysqld_client packets.
 </summary>
@@ -43476,7 +43293,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53493">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
 <summary>
 Relabel packets to mysqld_client the packet type.
 </summary>
@@ -43486,7 +43303,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53513">
+<interface name="corenet_send_mysqld_server_packets" lineno="53636">
 <summary>
 Send mysqld_server packets.
 </summary>
@@ -43497,7 +43314,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53532">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
 <summary>
 Do not audit attempts to send mysqld_server packets.
 </summary>
@@ -43508,7 +43325,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53551">
+<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
 <summary>
 Receive mysqld_server packets.
 </summary>
@@ -43519,7 +43336,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53570">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
 <summary>
 Do not audit attempts to receive mysqld_server packets.
 </summary>
@@ -43530,7 +43347,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53589">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
 <summary>
 Send and receive mysqld_server packets.
 </summary>
@@ -43541,7 +43358,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53605">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
 <summary>
 Do not audit attempts to send and receive mysqld_server packets.
 </summary>
@@ -43552,7 +43369,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53620">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
 <summary>
 Relabel packets to mysqld_server the packet type.
 </summary>
@@ -43562,7 +43379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53642">
+<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
 <summary>
 Send and receive TCP traffic on the mysqlmanagerd port.
 </summary>
@@ -43573,7 +43390,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53657">
+<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
 <summary>
 Send UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43584,7 +43401,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53672">
+<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
 <summary>
 Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43595,7 +43412,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53687">
+<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
 <summary>
 Receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43606,7 +43423,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53702">
+<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
 <summary>
 Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43617,7 +43434,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53717">
+<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
 <summary>
 Send and receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43628,7 +43445,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53733">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mysqlmanagerd port.
@@ -43640,7 +43457,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53748">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
 <summary>
 Bind TCP sockets to the mysqlmanagerd port.
 </summary>
@@ -43651,7 +43468,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53768">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
 <summary>
 Bind UDP sockets to the mysqlmanagerd port.
 </summary>
@@ -43662,7 +43479,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53787">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
 <summary>
 Make a TCP connection to the mysqlmanagerd port.
 </summary>
@@ -43672,7 +43489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53807">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
 <summary>
 Send mysqlmanagerd_client packets.
 </summary>
@@ -43683,7 +43500,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53826">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
 <summary>
 Do not audit attempts to send mysqlmanagerd_client packets.
 </summary>
@@ -43694,7 +43511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53845">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
 <summary>
 Receive mysqlmanagerd_client packets.
 </summary>
@@ -43705,7 +43522,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53864">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_client packets.
 </summary>
@@ -43716,7 +43533,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53883">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
 <summary>
 Send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43727,7 +43544,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53899">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43738,7 +43555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53914">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
 <summary>
 Relabel packets to mysqlmanagerd_client the packet type.
 </summary>
@@ -43748,7 +43565,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53934">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
 <summary>
 Send mysqlmanagerd_server packets.
 </summary>
@@ -43759,7 +43576,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53953">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
 <summary>
 Do not audit attempts to send mysqlmanagerd_server packets.
 </summary>
@@ -43770,7 +43587,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53972">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
 <summary>
 Receive mysqlmanagerd_server packets.
 </summary>
@@ -43781,7 +43598,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53991">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_server packets.
 </summary>
@@ -43792,7 +43609,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54010">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
 <summary>
 Send and receive mysqlmanagerd_server packets.
 </summary>
@@ -43803,7 +43620,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54026">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_server packets.
 </summary>
@@ -43814,7 +43631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54041">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
 <summary>
 Relabel packets to mysqlmanagerd_server the packet type.
 </summary>
@@ -43824,7 +43641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54063">
+<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
 <summary>
 Send and receive TCP traffic on the nessus port.
 </summary>
@@ -43835,7 +43652,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54078">
+<interface name="corenet_udp_send_nessus_port" lineno="54201">
 <summary>
 Send UDP traffic on the nessus port.
 </summary>
@@ -43846,7 +43663,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54093">
+<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
 <summary>
 Do not audit attempts to send UDP traffic on the nessus port.
 </summary>
@@ -43857,7 +43674,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54108">
+<interface name="corenet_udp_receive_nessus_port" lineno="54231">
 <summary>
 Receive UDP traffic on the nessus port.
 </summary>
@@ -43868,7 +43685,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54123">
+<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
 <summary>
 Do not audit attempts to receive UDP traffic on the nessus port.
 </summary>
@@ -43879,7 +43696,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54138">
+<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
 <summary>
 Send and receive UDP traffic on the nessus port.
 </summary>
@@ -43890,7 +43707,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54154">
+<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nessus port.
@@ -43902,7 +43719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54169">
+<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
 <summary>
 Bind TCP sockets to the nessus port.
 </summary>
@@ -43913,7 +43730,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54189">
+<interface name="corenet_udp_bind_nessus_port" lineno="54312">
 <summary>
 Bind UDP sockets to the nessus port.
 </summary>
@@ -43924,7 +43741,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54208">
+<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
 <summary>
 Make a TCP connection to the nessus port.
 </summary>
@@ -43934,7 +43751,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54228">
+<interface name="corenet_send_nessus_client_packets" lineno="54351">
 <summary>
 Send nessus_client packets.
 </summary>
@@ -43945,7 +43762,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54247">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
 <summary>
 Do not audit attempts to send nessus_client packets.
 </summary>
@@ -43956,7 +43773,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54266">
+<interface name="corenet_receive_nessus_client_packets" lineno="54389">
 <summary>
 Receive nessus_client packets.
 </summary>
@@ -43967,7 +43784,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54285">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
 <summary>
 Do not audit attempts to receive nessus_client packets.
 </summary>
@@ -43978,7 +43795,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54304">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
 <summary>
 Send and receive nessus_client packets.
 </summary>
@@ -43989,7 +43806,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54320">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
 <summary>
 Do not audit attempts to send and receive nessus_client packets.
 </summary>
@@ -44000,7 +43817,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54335">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
 <summary>
 Relabel packets to nessus_client the packet type.
 </summary>
@@ -44010,7 +43827,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54355">
+<interface name="corenet_send_nessus_server_packets" lineno="54478">
 <summary>
 Send nessus_server packets.
 </summary>
@@ -44021,7 +43838,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54374">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
 <summary>
 Do not audit attempts to send nessus_server packets.
 </summary>
@@ -44032,7 +43849,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54393">
+<interface name="corenet_receive_nessus_server_packets" lineno="54516">
 <summary>
 Receive nessus_server packets.
 </summary>
@@ -44043,7 +43860,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54412">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
 <summary>
 Do not audit attempts to receive nessus_server packets.
 </summary>
@@ -44054,7 +43871,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54431">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
 <summary>
 Send and receive nessus_server packets.
 </summary>
@@ -44065,7 +43882,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54447">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
 <summary>
 Do not audit attempts to send and receive nessus_server packets.
 </summary>
@@ -44076,7 +43893,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54462">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
 <summary>
 Relabel packets to nessus_server the packet type.
 </summary>
@@ -44086,7 +43903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54484">
+<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
 <summary>
 Send and receive TCP traffic on the netport port.
 </summary>
@@ -44097,7 +43914,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_netport_port" lineno="54499">
+<interface name="corenet_udp_send_netport_port" lineno="54622">
 <summary>
 Send UDP traffic on the netport port.
 </summary>
@@ -44108,7 +43925,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54514">
+<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
 <summary>
 Do not audit attempts to send UDP traffic on the netport port.
 </summary>
@@ -44119,7 +43936,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54529">
+<interface name="corenet_udp_receive_netport_port" lineno="54652">
 <summary>
 Receive UDP traffic on the netport port.
 </summary>
@@ -44130,7 +43947,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54544">
+<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
 <summary>
 Do not audit attempts to receive UDP traffic on the netport port.
 </summary>
@@ -44141,7 +43958,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54559">
+<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
 <summary>
 Send and receive UDP traffic on the netport port.
 </summary>
@@ -44152,7 +43969,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54575">
+<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the netport port.
@@ -44164,7 +43981,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54590">
+<interface name="corenet_tcp_bind_netport_port" lineno="54713">
 <summary>
 Bind TCP sockets to the netport port.
 </summary>
@@ -44175,7 +43992,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54610">
+<interface name="corenet_udp_bind_netport_port" lineno="54733">
 <summary>
 Bind UDP sockets to the netport port.
 </summary>
@@ -44186,7 +44003,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54629">
+<interface name="corenet_tcp_connect_netport_port" lineno="54752">
 <summary>
 Make a TCP connection to the netport port.
 </summary>
@@ -44196,7 +44013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_client_packets" lineno="54649">
+<interface name="corenet_send_netport_client_packets" lineno="54772">
 <summary>
 Send netport_client packets.
 </summary>
@@ -44207,7 +44024,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54668">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
 <summary>
 Do not audit attempts to send netport_client packets.
 </summary>
@@ -44218,7 +44035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54687">
+<interface name="corenet_receive_netport_client_packets" lineno="54810">
 <summary>
 Receive netport_client packets.
 </summary>
@@ -44229,7 +44046,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54706">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
 <summary>
 Do not audit attempts to receive netport_client packets.
 </summary>
@@ -44240,7 +44057,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54725">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
 <summary>
 Send and receive netport_client packets.
 </summary>
@@ -44251,7 +44068,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54741">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
 <summary>
 Do not audit attempts to send and receive netport_client packets.
 </summary>
@@ -44262,7 +44079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54756">
+<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
 <summary>
 Relabel packets to netport_client the packet type.
 </summary>
@@ -44272,7 +44089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_server_packets" lineno="54776">
+<interface name="corenet_send_netport_server_packets" lineno="54899">
 <summary>
 Send netport_server packets.
 </summary>
@@ -44283,7 +44100,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54795">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
 <summary>
 Do not audit attempts to send netport_server packets.
 </summary>
@@ -44294,7 +44111,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54814">
+<interface name="corenet_receive_netport_server_packets" lineno="54937">
 <summary>
 Receive netport_server packets.
 </summary>
@@ -44305,7 +44122,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54833">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
 <summary>
 Do not audit attempts to receive netport_server packets.
 </summary>
@@ -44316,7 +44133,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54852">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
 <summary>
 Send and receive netport_server packets.
 </summary>
@@ -44327,7 +44144,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54868">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
 <summary>
 Do not audit attempts to send and receive netport_server packets.
 </summary>
@@ -44338,7 +44155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="54883">
+<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
 <summary>
 Relabel packets to netport_server the packet type.
 </summary>
@@ -44348,7 +44165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="54905">
+<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
 <summary>
 Send and receive TCP traffic on the netsupport port.
 </summary>
@@ -44359,7 +44176,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="54920">
+<interface name="corenet_udp_send_netsupport_port" lineno="55043">
 <summary>
 Send UDP traffic on the netsupport port.
 </summary>
@@ -44370,7 +44187,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="54935">
+<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
 <summary>
 Do not audit attempts to send UDP traffic on the netsupport port.
 </summary>
@@ -44381,7 +44198,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="54950">
+<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
 <summary>
 Receive UDP traffic on the netsupport port.
 </summary>
@@ -44392,7 +44209,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="54965">
+<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
 <summary>
 Do not audit attempts to receive UDP traffic on the netsupport port.
 </summary>
@@ -44403,7 +44220,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="54980">
+<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
 <summary>
 Send and receive UDP traffic on the netsupport port.
 </summary>
@@ -44414,7 +44231,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="54996">
+<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the netsupport port.
@@ -44426,7 +44243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55011">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
 <summary>
 Bind TCP sockets to the netsupport port.
 </summary>
@@ -44437,7 +44254,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55031">
+<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
 <summary>
 Bind UDP sockets to the netsupport port.
 </summary>
@@ -44448,7 +44265,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55050">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
 <summary>
 Make a TCP connection to the netsupport port.
 </summary>
@@ -44458,7 +44275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55070">
+<interface name="corenet_send_netsupport_client_packets" lineno="55193">
 <summary>
 Send netsupport_client packets.
 </summary>
@@ -44469,7 +44286,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55089">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
 <summary>
 Do not audit attempts to send netsupport_client packets.
 </summary>
@@ -44480,7 +44297,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55108">
+<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
 <summary>
 Receive netsupport_client packets.
 </summary>
@@ -44491,7 +44308,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55127">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
 <summary>
 Do not audit attempts to receive netsupport_client packets.
 </summary>
@@ -44502,7 +44319,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55146">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
 <summary>
 Send and receive netsupport_client packets.
 </summary>
@@ -44513,7 +44330,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55162">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
 <summary>
 Do not audit attempts to send and receive netsupport_client packets.
 </summary>
@@ -44524,7 +44341,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55177">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
 <summary>
 Relabel packets to netsupport_client the packet type.
 </summary>
@@ -44534,7 +44351,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55197">
+<interface name="corenet_send_netsupport_server_packets" lineno="55320">
 <summary>
 Send netsupport_server packets.
 </summary>
@@ -44545,7 +44362,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55216">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
 <summary>
 Do not audit attempts to send netsupport_server packets.
 </summary>
@@ -44556,7 +44373,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55235">
+<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
 <summary>
 Receive netsupport_server packets.
 </summary>
@@ -44567,7 +44384,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55254">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
 <summary>
 Do not audit attempts to receive netsupport_server packets.
 </summary>
@@ -44578,7 +44395,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55273">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
 <summary>
 Send and receive netsupport_server packets.
 </summary>
@@ -44589,7 +44406,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55289">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
 <summary>
 Do not audit attempts to send and receive netsupport_server packets.
 </summary>
@@ -44600,7 +44417,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55304">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
 <summary>
 Relabel packets to netsupport_server the packet type.
 </summary>
@@ -44610,7 +44427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55326">
+<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
 <summary>
 Send and receive TCP traffic on the nfs port.
 </summary>
@@ -44621,7 +44438,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55341">
+<interface name="corenet_udp_send_nfs_port" lineno="55464">
 <summary>
 Send UDP traffic on the nfs port.
 </summary>
@@ -44632,7 +44449,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55356">
+<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
 <summary>
 Do not audit attempts to send UDP traffic on the nfs port.
 </summary>
@@ -44643,7 +44460,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55371">
+<interface name="corenet_udp_receive_nfs_port" lineno="55494">
 <summary>
 Receive UDP traffic on the nfs port.
 </summary>
@@ -44654,7 +44471,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55386">
+<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
 <summary>
 Do not audit attempts to receive UDP traffic on the nfs port.
 </summary>
@@ -44665,7 +44482,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55401">
+<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
 <summary>
 Send and receive UDP traffic on the nfs port.
 </summary>
@@ -44676,7 +44493,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55417">
+<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nfs port.
@@ -44688,7 +44505,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55432">
+<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
 <summary>
 Bind TCP sockets to the nfs port.
 </summary>
@@ -44699,7 +44516,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55452">
+<interface name="corenet_udp_bind_nfs_port" lineno="55575">
 <summary>
 Bind UDP sockets to the nfs port.
 </summary>
@@ -44710,7 +44527,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55471">
+<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
 <summary>
 Make a TCP connection to the nfs port.
 </summary>
@@ -44720,7 +44537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55491">
+<interface name="corenet_send_nfs_client_packets" lineno="55614">
 <summary>
 Send nfs_client packets.
 </summary>
@@ -44731,7 +44548,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55510">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
 <summary>
 Do not audit attempts to send nfs_client packets.
 </summary>
@@ -44742,7 +44559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55529">
+<interface name="corenet_receive_nfs_client_packets" lineno="55652">
 <summary>
 Receive nfs_client packets.
 </summary>
@@ -44753,7 +44570,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55548">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
 <summary>
 Do not audit attempts to receive nfs_client packets.
 </summary>
@@ -44764,7 +44581,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55567">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
 <summary>
 Send and receive nfs_client packets.
 </summary>
@@ -44775,7 +44592,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55583">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
 <summary>
 Do not audit attempts to send and receive nfs_client packets.
 </summary>
@@ -44786,7 +44603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55598">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
 <summary>
 Relabel packets to nfs_client the packet type.
 </summary>
@@ -44796,7 +44613,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55618">
+<interface name="corenet_send_nfs_server_packets" lineno="55741">
 <summary>
 Send nfs_server packets.
 </summary>
@@ -44807,7 +44624,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55637">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
 <summary>
 Do not audit attempts to send nfs_server packets.
 </summary>
@@ -44818,7 +44635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55656">
+<interface name="corenet_receive_nfs_server_packets" lineno="55779">
 <summary>
 Receive nfs_server packets.
 </summary>
@@ -44829,7 +44646,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55675">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
 <summary>
 Do not audit attempts to receive nfs_server packets.
 </summary>
@@ -44840,7 +44657,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55694">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
 <summary>
 Send and receive nfs_server packets.
 </summary>
@@ -44851,7 +44668,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55710">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
 <summary>
 Do not audit attempts to send and receive nfs_server packets.
 </summary>
@@ -44862,7 +44679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55725">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
 <summary>
 Relabel packets to nfs_server the packet type.
 </summary>
@@ -44872,7 +44689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55747">
+<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
 <summary>
 Send and receive TCP traffic on the nfsrdma port.
 </summary>
@@ -44883,7 +44700,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55762">
+<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
 <summary>
 Send UDP traffic on the nfsrdma port.
 </summary>
@@ -44894,7 +44711,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55777">
+<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
 <summary>
 Do not audit attempts to send UDP traffic on the nfsrdma port.
 </summary>
@@ -44905,7 +44722,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55792">
+<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
 <summary>
 Receive UDP traffic on the nfsrdma port.
 </summary>
@@ -44916,7 +44733,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55807">
+<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
 <summary>
 Do not audit attempts to receive UDP traffic on the nfsrdma port.
 </summary>
@@ -44927,7 +44744,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55822">
+<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
 <summary>
 Send and receive UDP traffic on the nfsrdma port.
 </summary>
@@ -44938,7 +44755,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55838">
+<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nfsrdma port.
@@ -44950,7 +44767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55853">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
 <summary>
 Bind TCP sockets to the nfsrdma port.
 </summary>
@@ -44961,7 +44778,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="55873">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
 <summary>
 Bind UDP sockets to the nfsrdma port.
 </summary>
@@ -44972,7 +44789,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="55892">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
 <summary>
 Make a TCP connection to the nfsrdma port.
 </summary>
@@ -44982,7 +44799,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="55912">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
 <summary>
 Send nfsrdma_client packets.
 </summary>
@@ -44993,7 +44810,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="55931">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
 <summary>
 Do not audit attempts to send nfsrdma_client packets.
 </summary>
@@ -45004,7 +44821,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="55950">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
 <summary>
 Receive nfsrdma_client packets.
 </summary>
@@ -45015,7 +44832,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="55969">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
 <summary>
 Do not audit attempts to receive nfsrdma_client packets.
 </summary>
@@ -45026,7 +44843,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="55988">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
 <summary>
 Send and receive nfsrdma_client packets.
 </summary>
@@ -45037,7 +44854,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56004">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
 <summary>
 Do not audit attempts to send and receive nfsrdma_client packets.
 </summary>
@@ -45048,7 +44865,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56019">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
 <summary>
 Relabel packets to nfsrdma_client the packet type.
 </summary>
@@ -45058,7 +44875,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56039">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
 <summary>
 Send nfsrdma_server packets.
 </summary>
@@ -45069,7 +44886,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56058">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
 <summary>
 Do not audit attempts to send nfsrdma_server packets.
 </summary>
@@ -45080,7 +44897,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56077">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
 <summary>
 Receive nfsrdma_server packets.
 </summary>
@@ -45091,7 +44908,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56096">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
 <summary>
 Do not audit attempts to receive nfsrdma_server packets.
 </summary>
@@ -45102,7 +44919,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56115">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
 <summary>
 Send and receive nfsrdma_server packets.
 </summary>
@@ -45113,7 +44930,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56131">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
 <summary>
 Do not audit attempts to send and receive nfsrdma_server packets.
 </summary>
@@ -45124,7 +44941,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56146">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
 <summary>
 Relabel packets to nfsrdma_server the packet type.
 </summary>
@@ -45134,7 +44951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56168">
+<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
 <summary>
 Send and receive TCP traffic on the nmbd port.
 </summary>
@@ -45145,7 +44962,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56183">
+<interface name="corenet_udp_send_nmbd_port" lineno="56306">
 <summary>
 Send UDP traffic on the nmbd port.
 </summary>
@@ -45156,7 +44973,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56198">
+<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
 <summary>
 Do not audit attempts to send UDP traffic on the nmbd port.
 </summary>
@@ -45167,7 +44984,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56213">
+<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
 <summary>
 Receive UDP traffic on the nmbd port.
 </summary>
@@ -45178,7 +44995,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56228">
+<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
 <summary>
 Do not audit attempts to receive UDP traffic on the nmbd port.
 </summary>
@@ -45189,7 +45006,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56243">
+<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
 <summary>
 Send and receive UDP traffic on the nmbd port.
 </summary>
@@ -45200,7 +45017,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56259">
+<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nmbd port.
@@ -45212,7 +45029,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56274">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
 <summary>
 Bind TCP sockets to the nmbd port.
 </summary>
@@ -45223,7 +45040,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56294">
+<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
 <summary>
 Bind UDP sockets to the nmbd port.
 </summary>
@@ -45234,7 +45051,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56313">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
 <summary>
 Make a TCP connection to the nmbd port.
 </summary>
@@ -45244,7 +45061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56333">
+<interface name="corenet_send_nmbd_client_packets" lineno="56456">
 <summary>
 Send nmbd_client packets.
 </summary>
@@ -45255,7 +45072,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56352">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
 <summary>
 Do not audit attempts to send nmbd_client packets.
 </summary>
@@ -45266,7 +45083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56371">
+<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
 <summary>
 Receive nmbd_client packets.
 </summary>
@@ -45277,7 +45094,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56390">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
 <summary>
 Do not audit attempts to receive nmbd_client packets.
 </summary>
@@ -45288,7 +45105,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56409">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
 <summary>
 Send and receive nmbd_client packets.
 </summary>
@@ -45299,7 +45116,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56425">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
 <summary>
 Do not audit attempts to send and receive nmbd_client packets.
 </summary>
@@ -45310,7 +45127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56440">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
 <summary>
 Relabel packets to nmbd_client the packet type.
 </summary>
@@ -45320,7 +45137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56460">
+<interface name="corenet_send_nmbd_server_packets" lineno="56583">
 <summary>
 Send nmbd_server packets.
 </summary>
@@ -45331,7 +45148,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56479">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
 <summary>
 Do not audit attempts to send nmbd_server packets.
 </summary>
@@ -45342,7 +45159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56498">
+<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
 <summary>
 Receive nmbd_server packets.
 </summary>
@@ -45353,7 +45170,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56517">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
 <summary>
 Do not audit attempts to receive nmbd_server packets.
 </summary>
@@ -45364,7 +45181,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56536">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
 <summary>
 Send and receive nmbd_server packets.
 </summary>
@@ -45375,7 +45192,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56552">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
 <summary>
 Do not audit attempts to send and receive nmbd_server packets.
 </summary>
@@ -45386,7 +45203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56567">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
 <summary>
 Relabel packets to nmbd_server the packet type.
 </summary>
@@ -45396,7 +45213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56589">
+<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
 <summary>
 Send and receive TCP traffic on the ntop port.
 </summary>
@@ -45407,7 +45224,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56604">
+<interface name="corenet_udp_send_ntop_port" lineno="56727">
 <summary>
 Send UDP traffic on the ntop port.
 </summary>
@@ -45418,7 +45235,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56619">
+<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
 <summary>
 Do not audit attempts to send UDP traffic on the ntop port.
 </summary>
@@ -45429,7 +45246,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56634">
+<interface name="corenet_udp_receive_ntop_port" lineno="56757">
 <summary>
 Receive UDP traffic on the ntop port.
 </summary>
@@ -45440,7 +45257,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56649">
+<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
 <summary>
 Do not audit attempts to receive UDP traffic on the ntop port.
 </summary>
@@ -45451,7 +45268,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56664">
+<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
 <summary>
 Send and receive UDP traffic on the ntop port.
 </summary>
@@ -45462,7 +45279,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56680">
+<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ntop port.
@@ -45474,7 +45291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56695">
+<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
 <summary>
 Bind TCP sockets to the ntop port.
 </summary>
@@ -45485,7 +45302,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56715">
+<interface name="corenet_udp_bind_ntop_port" lineno="56838">
 <summary>
 Bind UDP sockets to the ntop port.
 </summary>
@@ -45496,7 +45313,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56734">
+<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
 <summary>
 Make a TCP connection to the ntop port.
 </summary>
@@ -45506,7 +45323,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56754">
+<interface name="corenet_send_ntop_client_packets" lineno="56877">
 <summary>
 Send ntop_client packets.
 </summary>
@@ -45517,7 +45334,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56773">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
 <summary>
 Do not audit attempts to send ntop_client packets.
 </summary>
@@ -45528,7 +45345,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56792">
+<interface name="corenet_receive_ntop_client_packets" lineno="56915">
 <summary>
 Receive ntop_client packets.
 </summary>
@@ -45539,7 +45356,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56811">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
 <summary>
 Do not audit attempts to receive ntop_client packets.
 </summary>
@@ -45550,7 +45367,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56830">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
 <summary>
 Send and receive ntop_client packets.
 </summary>
@@ -45561,7 +45378,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56846">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
 <summary>
 Do not audit attempts to send and receive ntop_client packets.
 </summary>
@@ -45572,7 +45389,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="56861">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
 <summary>
 Relabel packets to ntop_client the packet type.
 </summary>
@@ -45582,7 +45399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_server_packets" lineno="56881">
+<interface name="corenet_send_ntop_server_packets" lineno="57004">
 <summary>
 Send ntop_server packets.
 </summary>
@@ -45593,7 +45410,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="56900">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
 <summary>
 Do not audit attempts to send ntop_server packets.
 </summary>
@@ -45604,7 +45421,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="56919">
+<interface name="corenet_receive_ntop_server_packets" lineno="57042">
 <summary>
 Receive ntop_server packets.
 </summary>
@@ -45615,7 +45432,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="56938">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
 <summary>
 Do not audit attempts to receive ntop_server packets.
 </summary>
@@ -45626,7 +45443,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="56957">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
 <summary>
 Send and receive ntop_server packets.
 </summary>
@@ -45637,7 +45454,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="56973">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
 <summary>
 Do not audit attempts to send and receive ntop_server packets.
 </summary>
@@ -45648,7 +45465,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="56988">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
 <summary>
 Relabel packets to ntop_server the packet type.
 </summary>
@@ -45658,7 +45475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57010">
+<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
 <summary>
 Send and receive TCP traffic on the ntp port.
 </summary>
@@ -45669,7 +45486,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57025">
+<interface name="corenet_udp_send_ntp_port" lineno="57148">
 <summary>
 Send UDP traffic on the ntp port.
 </summary>
@@ -45680,7 +45497,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57040">
+<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
 <summary>
 Do not audit attempts to send UDP traffic on the ntp port.
 </summary>
@@ -45691,7 +45508,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57055">
+<interface name="corenet_udp_receive_ntp_port" lineno="57178">
 <summary>
 Receive UDP traffic on the ntp port.
 </summary>
@@ -45702,7 +45519,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57070">
+<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
 <summary>
 Do not audit attempts to receive UDP traffic on the ntp port.
 </summary>
@@ -45713,7 +45530,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57085">
+<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
 <summary>
 Send and receive UDP traffic on the ntp port.
 </summary>
@@ -45724,7 +45541,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57101">
+<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ntp port.
@@ -45736,7 +45553,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57116">
+<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
 <summary>
 Bind TCP sockets to the ntp port.
 </summary>
@@ -45747,7 +45564,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57136">
+<interface name="corenet_udp_bind_ntp_port" lineno="57259">
 <summary>
 Bind UDP sockets to the ntp port.
 </summary>
@@ -45758,7 +45575,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57155">
+<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
 <summary>
 Make a TCP connection to the ntp port.
 </summary>
@@ -45768,7 +45585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57175">
+<interface name="corenet_send_ntp_client_packets" lineno="57298">
 <summary>
 Send ntp_client packets.
 </summary>
@@ -45779,7 +45596,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57194">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
 <summary>
 Do not audit attempts to send ntp_client packets.
 </summary>
@@ -45790,7 +45607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57213">
+<interface name="corenet_receive_ntp_client_packets" lineno="57336">
 <summary>
 Receive ntp_client packets.
 </summary>
@@ -45801,7 +45618,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57232">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
 <summary>
 Do not audit attempts to receive ntp_client packets.
 </summary>
@@ -45812,7 +45629,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57251">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
 <summary>
 Send and receive ntp_client packets.
 </summary>
@@ -45823,7 +45640,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57267">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
 <summary>
 Do not audit attempts to send and receive ntp_client packets.
 </summary>
@@ -45834,7 +45651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57282">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
 <summary>
 Relabel packets to ntp_client the packet type.
 </summary>
@@ -45844,7 +45661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57302">
+<interface name="corenet_send_ntp_server_packets" lineno="57425">
 <summary>
 Send ntp_server packets.
 </summary>
@@ -45855,7 +45672,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57321">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
 <summary>
 Do not audit attempts to send ntp_server packets.
 </summary>
@@ -45866,7 +45683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57340">
+<interface name="corenet_receive_ntp_server_packets" lineno="57463">
 <summary>
 Receive ntp_server packets.
 </summary>
@@ -45877,7 +45694,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57359">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
 <summary>
 Do not audit attempts to receive ntp_server packets.
 </summary>
@@ -45888,7 +45705,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57378">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
 <summary>
 Send and receive ntp_server packets.
 </summary>
@@ -45899,7 +45716,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57394">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
 <summary>
 Do not audit attempts to send and receive ntp_server packets.
 </summary>
@@ -45910,7 +45727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57409">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
 <summary>
 Relabel packets to ntp_server the packet type.
 </summary>
@@ -45920,7 +45737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57431">
+<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57554">
 <summary>
 Send and receive TCP traffic on the oa_system port.
 </summary>
@@ -45931,7 +45748,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="57446">
+<interface name="corenet_udp_send_oa_system_port" lineno="57569">
 <summary>
 Send UDP traffic on the oa_system port.
 </summary>
@@ -45942,7 +45759,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57461">
+<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57584">
 <summary>
 Do not audit attempts to send UDP traffic on the oa_system port.
 </summary>
@@ -45953,7 +45770,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="57476">
+<interface name="corenet_udp_receive_oa_system_port" lineno="57599">
 <summary>
 Receive UDP traffic on the oa_system port.
 </summary>
@@ -45964,7 +45781,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57491">
+<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57614">
 <summary>
 Do not audit attempts to receive UDP traffic on the oa_system port.
 </summary>
@@ -45975,7 +45792,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57506">
+<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57629">
 <summary>
 Send and receive UDP traffic on the oa_system port.
 </summary>
@@ -45986,7 +45803,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57522">
+<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57645">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the oa_system port.
@@ -45998,7 +45815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="57537">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="57660">
 <summary>
 Bind TCP sockets to the oa_system port.
 </summary>
@@ -46009,7 +45826,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="57557">
+<interface name="corenet_udp_bind_oa_system_port" lineno="57680">
 <summary>
 Bind UDP sockets to the oa_system port.
 </summary>
@@ -46020,7 +45837,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="57576">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="57699">
 <summary>
 Make a TCP connection to the oa_system port.
 </summary>
@@ -46030,7 +45847,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="57596">
+<interface name="corenet_send_oa_system_client_packets" lineno="57719">
 <summary>
 Send oa_system_client packets.
 </summary>
@@ -46041,7 +45858,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57615">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57738">
 <summary>
 Do not audit attempts to send oa_system_client packets.
 </summary>
@@ -46052,7 +45869,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="57634">
+<interface name="corenet_receive_oa_system_client_packets" lineno="57757">
 <summary>
 Receive oa_system_client packets.
 </summary>
@@ -46063,7 +45880,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57653">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57776">
 <summary>
 Do not audit attempts to receive oa_system_client packets.
 </summary>
@@ -46074,7 +45891,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57672">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57795">
 <summary>
 Send and receive oa_system_client packets.
 </summary>
@@ -46085,7 +45902,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57688">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57811">
 <summary>
 Do not audit attempts to send and receive oa_system_client packets.
 </summary>
@@ -46096,7 +45913,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="57703">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="57826">
 <summary>
 Relabel packets to oa_system_client the packet type.
 </summary>
@@ -46106,7 +45923,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="57723">
+<interface name="corenet_send_oa_system_server_packets" lineno="57846">
 <summary>
 Send oa_system_server packets.
 </summary>
@@ -46117,7 +45934,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57742">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57865">
 <summary>
 Do not audit attempts to send oa_system_server packets.
 </summary>
@@ -46128,7 +45945,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="57761">
+<interface name="corenet_receive_oa_system_server_packets" lineno="57884">
 <summary>
 Receive oa_system_server packets.
 </summary>
@@ -46139,7 +45956,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57780">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57903">
 <summary>
 Do not audit attempts to receive oa_system_server packets.
 </summary>
@@ -46150,7 +45967,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57799">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57922">
 <summary>
 Send and receive oa_system_server packets.
 </summary>
@@ -46161,7 +45978,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57815">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57938">
 <summary>
 Do not audit attempts to send and receive oa_system_server packets.
 </summary>
@@ -46172,7 +45989,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="57830">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="57953">
 <summary>
 Relabel packets to oa_system_server the packet type.
 </summary>
@@ -46182,7 +45999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57852">
+<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57975">
 <summary>
 Send and receive TCP traffic on the oracledb port.
 </summary>
@@ -46193,7 +46010,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="57867">
+<interface name="corenet_udp_send_oracledb_port" lineno="57990">
 <summary>
 Send UDP traffic on the oracledb port.
 </summary>
@@ -46204,7 +46021,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="57882">
+<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58005">
 <summary>
 Do not audit attempts to send UDP traffic on the oracledb port.
 </summary>
@@ -46215,7 +46032,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="57897">
+<interface name="corenet_udp_receive_oracledb_port" lineno="58020">
 <summary>
 Receive UDP traffic on the oracledb port.
 </summary>
@@ -46226,7 +46043,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="57912">
+<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58035">
 <summary>
 Do not audit attempts to receive UDP traffic on the oracledb port.
 </summary>
@@ -46237,7 +46054,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="57927">
+<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58050">
 <summary>
 Send and receive UDP traffic on the oracledb port.
 </summary>
@@ -46248,7 +46065,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="57943">
+<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58066">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the oracledb port.
@@ -46260,7 +46077,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="57958">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="58081">
 <summary>
 Bind TCP sockets to the oracledb port.
 </summary>
@@ -46271,7 +46088,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="57978">
+<interface name="corenet_udp_bind_oracledb_port" lineno="58101">
 <summary>
 Bind UDP sockets to the oracledb port.
 </summary>
@@ -46282,7 +46099,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="57997">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="58120">
 <summary>
 Make a TCP connection to the oracledb port.
 </summary>
@@ -46292,7 +46109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58017">
+<interface name="corenet_send_oracledb_client_packets" lineno="58140">
 <summary>
 Send oracledb_client packets.
 </summary>
@@ -46303,7 +46120,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58036">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58159">
 <summary>
 Do not audit attempts to send oracledb_client packets.
 </summary>
@@ -46314,7 +46131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58055">
+<interface name="corenet_receive_oracledb_client_packets" lineno="58178">
 <summary>
 Receive oracledb_client packets.
 </summary>
@@ -46325,7 +46142,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58074">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58197">
 <summary>
 Do not audit attempts to receive oracledb_client packets.
 </summary>
@@ -46336,7 +46153,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58093">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58216">
 <summary>
 Send and receive oracledb_client packets.
 </summary>
@@ -46347,7 +46164,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58109">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58232">
 <summary>
 Do not audit attempts to send and receive oracledb_client packets.
 </summary>
@@ -46358,7 +46175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58124">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="58247">
 <summary>
 Relabel packets to oracledb_client the packet type.
 </summary>
@@ -46368,7 +46185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58144">
+<interface name="corenet_send_oracledb_server_packets" lineno="58267">
 <summary>
 Send oracledb_server packets.
 </summary>
@@ -46379,7 +46196,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58163">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58286">
 <summary>
 Do not audit attempts to send oracledb_server packets.
 </summary>
@@ -46390,7 +46207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58182">
+<interface name="corenet_receive_oracledb_server_packets" lineno="58305">
 <summary>
 Receive oracledb_server packets.
 </summary>
@@ -46401,7 +46218,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58201">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58324">
 <summary>
 Do not audit attempts to receive oracledb_server packets.
 </summary>
@@ -46412,7 +46229,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58220">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58343">
 <summary>
 Send and receive oracledb_server packets.
 </summary>
@@ -46423,7 +46240,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58236">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58359">
 <summary>
 Do not audit attempts to send and receive oracledb_server packets.
 </summary>
@@ -46434,7 +46251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58251">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="58374">
 <summary>
 Relabel packets to oracledb_server the packet type.
 </summary>
@@ -46444,7 +46261,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58273">
+<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58396">
 <summary>
 Send and receive TCP traffic on the ocsp port.
 </summary>
@@ -46455,7 +46272,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58288">
+<interface name="corenet_udp_send_ocsp_port" lineno="58411">
 <summary>
 Send UDP traffic on the ocsp port.
 </summary>
@@ -46466,7 +46283,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58303">
+<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58426">
 <summary>
 Do not audit attempts to send UDP traffic on the ocsp port.
 </summary>
@@ -46477,7 +46294,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58318">
+<interface name="corenet_udp_receive_ocsp_port" lineno="58441">
 <summary>
 Receive UDP traffic on the ocsp port.
 </summary>
@@ -46488,7 +46305,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58333">
+<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58456">
 <summary>
 Do not audit attempts to receive UDP traffic on the ocsp port.
 </summary>
@@ -46499,7 +46316,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58348">
+<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58471">
 <summary>
 Send and receive UDP traffic on the ocsp port.
 </summary>
@@ -46510,7 +46327,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58364">
+<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58487">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ocsp port.
@@ -46522,7 +46339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58379">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="58502">
 <summary>
 Bind TCP sockets to the ocsp port.
 </summary>
@@ -46533,7 +46350,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58399">
+<interface name="corenet_udp_bind_ocsp_port" lineno="58522">
 <summary>
 Bind UDP sockets to the ocsp port.
 </summary>
@@ -46544,7 +46361,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58418">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="58541">
 <summary>
 Make a TCP connection to the ocsp port.
 </summary>
@@ -46554,7 +46371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="58438">
+<interface name="corenet_send_ocsp_client_packets" lineno="58561">
 <summary>
 Send ocsp_client packets.
 </summary>
@@ -46565,7 +46382,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58457">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58580">
 <summary>
 Do not audit attempts to send ocsp_client packets.
 </summary>
@@ -46576,7 +46393,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="58476">
+<interface name="corenet_receive_ocsp_client_packets" lineno="58599">
 <summary>
 Receive ocsp_client packets.
 </summary>
@@ -46587,7 +46404,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58495">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58618">
 <summary>
 Do not audit attempts to receive ocsp_client packets.
 </summary>
@@ -46598,7 +46415,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58514">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58637">
 <summary>
 Send and receive ocsp_client packets.
 </summary>
@@ -46609,7 +46426,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58530">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58653">
 <summary>
 Do not audit attempts to send and receive ocsp_client packets.
 </summary>
@@ -46620,7 +46437,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="58545">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="58668">
 <summary>
 Relabel packets to ocsp_client the packet type.
 </summary>
@@ -46630,7 +46447,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="58565">
+<interface name="corenet_send_ocsp_server_packets" lineno="58688">
 <summary>
 Send ocsp_server packets.
 </summary>
@@ -46641,7 +46458,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58584">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58707">
 <summary>
 Do not audit attempts to send ocsp_server packets.
 </summary>
@@ -46652,7 +46469,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="58603">
+<interface name="corenet_receive_ocsp_server_packets" lineno="58726">
 <summary>
 Receive ocsp_server packets.
 </summary>
@@ -46663,7 +46480,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58622">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58745">
 <summary>
 Do not audit attempts to receive ocsp_server packets.
 </summary>
@@ -46674,7 +46491,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58641">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58764">
 <summary>
 Send and receive ocsp_server packets.
 </summary>
@@ -46685,7 +46502,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58657">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58780">
 <summary>
 Do not audit attempts to send and receive ocsp_server packets.
 </summary>
@@ -46696,7 +46513,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="58672">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="58795">
 <summary>
 Relabel packets to ocsp_server the packet type.
 </summary>
@@ -46706,7 +46523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58694">
+<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58817">
 <summary>
 Send and receive TCP traffic on the openhpid port.
 </summary>
@@ -46717,7 +46534,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="58709">
+<interface name="corenet_udp_send_openhpid_port" lineno="58832">
 <summary>
 Send UDP traffic on the openhpid port.
 </summary>
@@ -46728,7 +46545,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58724">
+<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58847">
 <summary>
 Do not audit attempts to send UDP traffic on the openhpid port.
 </summary>
@@ -46739,7 +46556,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="58739">
+<interface name="corenet_udp_receive_openhpid_port" lineno="58862">
 <summary>
 Receive UDP traffic on the openhpid port.
 </summary>
@@ -46750,7 +46567,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58754">
+<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58877">
 <summary>
 Do not audit attempts to receive UDP traffic on the openhpid port.
 </summary>
@@ -46761,7 +46578,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58769">
+<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58892">
 <summary>
 Send and receive UDP traffic on the openhpid port.
 </summary>
@@ -46772,7 +46589,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58785">
+<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58908">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the openhpid port.
@@ -46784,7 +46601,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="58800">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="58923">
 <summary>
 Bind TCP sockets to the openhpid port.
 </summary>
@@ -46795,7 +46612,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="58820">
+<interface name="corenet_udp_bind_openhpid_port" lineno="58943">
 <summary>
 Bind UDP sockets to the openhpid port.
 </summary>
@@ -46806,7 +46623,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="58839">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="58962">
 <summary>
 Make a TCP connection to the openhpid port.
 </summary>
@@ -46816,7 +46633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="58859">
+<interface name="corenet_send_openhpid_client_packets" lineno="58982">
 <summary>
 Send openhpid_client packets.
 </summary>
@@ -46827,7 +46644,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="58878">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59001">
 <summary>
 Do not audit attempts to send openhpid_client packets.
 </summary>
@@ -46838,7 +46655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="58897">
+<interface name="corenet_receive_openhpid_client_packets" lineno="59020">
 <summary>
 Receive openhpid_client packets.
 </summary>
@@ -46849,7 +46666,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="58916">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59039">
 <summary>
 Do not audit attempts to receive openhpid_client packets.
 </summary>
@@ -46860,7 +46677,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="58935">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59058">
 <summary>
 Send and receive openhpid_client packets.
 </summary>
@@ -46871,7 +46688,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="58951">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59074">
 <summary>
 Do not audit attempts to send and receive openhpid_client packets.
 </summary>
@@ -46882,7 +46699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="58966">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="59089">
 <summary>
 Relabel packets to openhpid_client the packet type.
 </summary>
@@ -46892,7 +46709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="58986">
+<interface name="corenet_send_openhpid_server_packets" lineno="59109">
 <summary>
 Send openhpid_server packets.
 </summary>
@@ -46903,7 +46720,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59005">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59128">
 <summary>
 Do not audit attempts to send openhpid_server packets.
 </summary>
@@ -46914,7 +46731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59024">
+<interface name="corenet_receive_openhpid_server_packets" lineno="59147">
 <summary>
 Receive openhpid_server packets.
 </summary>
@@ -46925,7 +46742,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59043">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59166">
 <summary>
 Do not audit attempts to receive openhpid_server packets.
 </summary>
@@ -46936,7 +46753,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59062">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59185">
 <summary>
 Send and receive openhpid_server packets.
 </summary>
@@ -46947,7 +46764,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59078">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59201">
 <summary>
 Do not audit attempts to send and receive openhpid_server packets.
 </summary>
@@ -46958,7 +46775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59093">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="59216">
 <summary>
 Relabel packets to openhpid_server the packet type.
 </summary>
@@ -46968,7 +46785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59115">
+<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59238">
 <summary>
 Send and receive TCP traffic on the openvpn port.
 </summary>
@@ -46979,7 +46796,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59130">
+<interface name="corenet_udp_send_openvpn_port" lineno="59253">
 <summary>
 Send UDP traffic on the openvpn port.
 </summary>
@@ -46990,7 +46807,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59145">
+<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59268">
 <summary>
 Do not audit attempts to send UDP traffic on the openvpn port.
 </summary>
@@ -47001,7 +46818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59160">
+<interface name="corenet_udp_receive_openvpn_port" lineno="59283">
 <summary>
 Receive UDP traffic on the openvpn port.
 </summary>
@@ -47012,7 +46829,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59175">
+<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59298">
 <summary>
 Do not audit attempts to receive UDP traffic on the openvpn port.
 </summary>
@@ -47023,7 +46840,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59190">
+<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59313">
 <summary>
 Send and receive UDP traffic on the openvpn port.
 </summary>
@@ -47034,7 +46851,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59206">
+<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59329">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the openvpn port.
@@ -47046,7 +46863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59221">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="59344">
 <summary>
 Bind TCP sockets to the openvpn port.
 </summary>
@@ -47057,7 +46874,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59241">
+<interface name="corenet_udp_bind_openvpn_port" lineno="59364">
 <summary>
 Bind UDP sockets to the openvpn port.
 </summary>
@@ -47068,7 +46885,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59260">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="59383">
 <summary>
 Make a TCP connection to the openvpn port.
 </summary>
@@ -47078,7 +46895,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59280">
+<interface name="corenet_send_openvpn_client_packets" lineno="59403">
 <summary>
 Send openvpn_client packets.
 </summary>
@@ -47089,7 +46906,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59299">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59422">
 <summary>
 Do not audit attempts to send openvpn_client packets.
 </summary>
@@ -47100,7 +46917,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59318">
+<interface name="corenet_receive_openvpn_client_packets" lineno="59441">
 <summary>
 Receive openvpn_client packets.
 </summary>
@@ -47111,7 +46928,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59337">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59460">
 <summary>
 Do not audit attempts to receive openvpn_client packets.
 </summary>
@@ -47122,7 +46939,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59356">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59479">
 <summary>
 Send and receive openvpn_client packets.
 </summary>
@@ -47133,7 +46950,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59372">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59495">
 <summary>
 Do not audit attempts to send and receive openvpn_client packets.
 </summary>
@@ -47144,7 +46961,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59387">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="59510">
 <summary>
 Relabel packets to openvpn_client the packet type.
 </summary>
@@ -47154,7 +46971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59407">
+<interface name="corenet_send_openvpn_server_packets" lineno="59530">
 <summary>
 Send openvpn_server packets.
 </summary>
@@ -47165,7 +46982,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59426">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59549">
 <summary>
 Do not audit attempts to send openvpn_server packets.
 </summary>
@@ -47176,7 +46993,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="59445">
+<interface name="corenet_receive_openvpn_server_packets" lineno="59568">
 <summary>
 Receive openvpn_server packets.
 </summary>
@@ -47187,7 +47004,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59464">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59587">
 <summary>
 Do not audit attempts to receive openvpn_server packets.
 </summary>
@@ -47198,7 +47015,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59483">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59606">
 <summary>
 Send and receive openvpn_server packets.
 </summary>
@@ -47209,7 +47026,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59499">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59622">
 <summary>
 Do not audit attempts to send and receive openvpn_server packets.
 </summary>
@@ -47220,7 +47037,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="59514">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="59637">
 <summary>
 Relabel packets to openvpn_server the packet type.
 </summary>
@@ -47230,7 +47047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59536">
+<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59659">
 <summary>
 Send and receive TCP traffic on the pdps port.
 </summary>
@@ -47241,7 +47058,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pdps_port" lineno="59551">
+<interface name="corenet_udp_send_pdps_port" lineno="59674">
 <summary>
 Send UDP traffic on the pdps port.
 </summary>
@@ -47252,7 +47069,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59566">
+<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59689">
 <summary>
 Do not audit attempts to send UDP traffic on the pdps port.
 </summary>
@@ -47263,7 +47080,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="59581">
+<interface name="corenet_udp_receive_pdps_port" lineno="59704">
 <summary>
 Receive UDP traffic on the pdps port.
 </summary>
@@ -47274,7 +47091,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59596">
+<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59719">
 <summary>
 Do not audit attempts to receive UDP traffic on the pdps port.
 </summary>
@@ -47285,7 +47102,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="59611">
+<interface name="corenet_udp_sendrecv_pdps_port" lineno="59734">
 <summary>
 Send and receive UDP traffic on the pdps port.
 </summary>
@@ -47296,7 +47113,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59627">
+<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59750">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pdps port.
@@ -47308,7 +47125,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="59642">
+<interface name="corenet_tcp_bind_pdps_port" lineno="59765">
 <summary>
 Bind TCP sockets to the pdps port.
 </summary>
@@ -47319,7 +47136,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="59662">
+<interface name="corenet_udp_bind_pdps_port" lineno="59785">
 <summary>
 Bind UDP sockets to the pdps port.
 </summary>
@@ -47330,7 +47147,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="59681">
+<interface name="corenet_tcp_connect_pdps_port" lineno="59804">
 <summary>
 Make a TCP connection to the pdps port.
 </summary>
@@ -47340,7 +47157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_client_packets" lineno="59701">
+<interface name="corenet_send_pdps_client_packets" lineno="59824">
 <summary>
 Send pdps_client packets.
 </summary>
@@ -47351,7 +47168,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59720">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59843">
 <summary>
 Do not audit attempts to send pdps_client packets.
 </summary>
@@ -47362,7 +47179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="59739">
+<interface name="corenet_receive_pdps_client_packets" lineno="59862">
 <summary>
 Receive pdps_client packets.
 </summary>
@@ -47373,7 +47190,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59758">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59881">
 <summary>
 Do not audit attempts to receive pdps_client packets.
 </summary>
@@ -47384,7 +47201,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="59777">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="59900">
 <summary>
 Send and receive pdps_client packets.
 </summary>
@@ -47395,7 +47212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59793">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59916">
 <summary>
 Do not audit attempts to send and receive pdps_client packets.
 </summary>
@@ -47406,7 +47223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="59808">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="59931">
 <summary>
 Relabel packets to pdps_client the packet type.
 </summary>
@@ -47416,7 +47233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_server_packets" lineno="59828">
+<interface name="corenet_send_pdps_server_packets" lineno="59951">
 <summary>
 Send pdps_server packets.
 </summary>
@@ -47427,7 +47244,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59847">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59970">
 <summary>
 Do not audit attempts to send pdps_server packets.
 </summary>
@@ -47438,7 +47255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="59866">
+<interface name="corenet_receive_pdps_server_packets" lineno="59989">
 <summary>
 Receive pdps_server packets.
 </summary>
@@ -47449,7 +47266,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="59885">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60008">
 <summary>
 Do not audit attempts to receive pdps_server packets.
 </summary>
@@ -47460,7 +47277,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="59904">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="60027">
 <summary>
 Send and receive pdps_server packets.
 </summary>
@@ -47471,7 +47288,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="59920">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60043">
 <summary>
 Do not audit attempts to send and receive pdps_server packets.
 </summary>
@@ -47482,7 +47299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="59935">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="60058">
 <summary>
 Relabel packets to pdps_server the packet type.
 </summary>
@@ -47492,7 +47309,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="59957">
+<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60080">
 <summary>
 Send and receive TCP traffic on the pegasus_http port.
 </summary>
@@ -47503,7 +47320,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="59972">
+<interface name="corenet_udp_send_pegasus_http_port" lineno="60095">
 <summary>
 Send UDP traffic on the pegasus_http port.
 </summary>
@@ -47514,7 +47331,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="59987">
+<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60110">
 <summary>
 Do not audit attempts to send UDP traffic on the pegasus_http port.
 </summary>
@@ -47525,7 +47342,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60002">
+<interface name="corenet_udp_receive_pegasus_http_port" lineno="60125">
 <summary>
 Receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47536,7 +47353,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60017">
+<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60140">
 <summary>
 Do not audit attempts to receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47547,7 +47364,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60032">
+<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60155">
 <summary>
 Send and receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47558,7 +47375,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60048">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60171">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pegasus_http port.
@@ -47570,7 +47387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60063">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60186">
 <summary>
 Bind TCP sockets to the pegasus_http port.
 </summary>
@@ -47581,7 +47398,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60083">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="60206">
 <summary>
 Bind UDP sockets to the pegasus_http port.
 </summary>
@@ -47592,7 +47409,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60102">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60225">
 <summary>
 Make a TCP connection to the pegasus_http port.
 </summary>
@@ -47602,7 +47419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60122">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="60245">
 <summary>
 Send pegasus_http_client packets.
 </summary>
@@ -47613,7 +47430,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60141">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60264">
 <summary>
 Do not audit attempts to send pegasus_http_client packets.
 </summary>
@@ -47624,7 +47441,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60160">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="60283">
 <summary>
 Receive pegasus_http_client packets.
 </summary>
@@ -47635,7 +47452,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60179">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60302">
 <summary>
 Do not audit attempts to receive pegasus_http_client packets.
 </summary>
@@ -47646,7 +47463,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60198">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60321">
 <summary>
 Send and receive pegasus_http_client packets.
 </summary>
@@ -47657,7 +47474,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60214">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60337">
 <summary>
 Do not audit attempts to send and receive pegasus_http_client packets.
 </summary>
@@ -47668,7 +47485,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60229">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60352">
 <summary>
 Relabel packets to pegasus_http_client the packet type.
 </summary>
@@ -47678,7 +47495,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60249">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="60372">
 <summary>
 Send pegasus_http_server packets.
 </summary>
@@ -47689,7 +47506,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60268">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60391">
 <summary>
 Do not audit attempts to send pegasus_http_server packets.
 </summary>
@@ -47700,7 +47517,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60287">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="60410">
 <summary>
 Receive pegasus_http_server packets.
 </summary>
@@ -47711,7 +47528,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60306">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60429">
 <summary>
 Do not audit attempts to receive pegasus_http_server packets.
 </summary>
@@ -47722,7 +47539,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60325">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60448">
 <summary>
 Send and receive pegasus_http_server packets.
 </summary>
@@ -47733,7 +47550,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60341">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60464">
 <summary>
 Do not audit attempts to send and receive pegasus_http_server packets.
 </summary>
@@ -47744,7 +47561,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60356">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60479">
 <summary>
 Relabel packets to pegasus_http_server the packet type.
 </summary>
@@ -47754,7 +47571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60378">
+<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60501">
 <summary>
 Send and receive TCP traffic on the pegasus_https port.
 </summary>
@@ -47765,7 +47582,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60393">
+<interface name="corenet_udp_send_pegasus_https_port" lineno="60516">
 <summary>
 Send UDP traffic on the pegasus_https port.
 </summary>
@@ -47776,7 +47593,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60408">
+<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60531">
 <summary>
 Do not audit attempts to send UDP traffic on the pegasus_https port.
 </summary>
@@ -47787,7 +47604,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60423">
+<interface name="corenet_udp_receive_pegasus_https_port" lineno="60546">
 <summary>
 Receive UDP traffic on the pegasus_https port.
 </summary>
@@ -47798,7 +47615,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60438">
+<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60561">
 <summary>
 Do not audit attempts to receive UDP traffic on the pegasus_https port.
 </summary>
@@ -47809,7 +47626,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60453">
+<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60576">
 <summary>
 Send and receive UDP traffic on the pegasus_https port.
 </summary>
@@ -47820,7 +47637,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60469">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60592">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pegasus_https port.
@@ -47832,7 +47649,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60484">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60607">
 <summary>
 Bind TCP sockets to the pegasus_https port.
 </summary>
@@ -47843,7 +47660,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="60504">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="60627">
 <summary>
 Bind UDP sockets to the pegasus_https port.
 </summary>
@@ -47854,7 +47671,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60523">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60646">
 <summary>
 Make a TCP connection to the pegasus_https port.
 </summary>
@@ -47864,7 +47681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="60543">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="60666">
 <summary>
 Send pegasus_https_client packets.
 </summary>
@@ -47875,7 +47692,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60562">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60685">
 <summary>
 Do not audit attempts to send pegasus_https_client packets.
 </summary>
@@ -47886,7 +47703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="60581">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="60704">
 <summary>
 Receive pegasus_https_client packets.
 </summary>
@@ -47897,7 +47714,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60600">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60723">
 <summary>
 Do not audit attempts to receive pegasus_https_client packets.
 </summary>
@@ -47908,7 +47725,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60619">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60742">
 <summary>
 Send and receive pegasus_https_client packets.
 </summary>
@@ -47919,7 +47736,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60635">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60758">
 <summary>
 Do not audit attempts to send and receive pegasus_https_client packets.
 </summary>
@@ -47930,7 +47747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60650">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60773">
 <summary>
 Relabel packets to pegasus_https_client the packet type.
 </summary>
@@ -47940,7 +47757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="60670">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="60793">
 <summary>
 Send pegasus_https_server packets.
 </summary>
@@ -47951,7 +47768,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60689">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60812">
 <summary>
 Do not audit attempts to send pegasus_https_server packets.
 </summary>
@@ -47962,7 +47779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="60708">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="60831">
 <summary>
 Receive pegasus_https_server packets.
 </summary>
@@ -47973,7 +47790,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60727">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60850">
 <summary>
 Do not audit attempts to receive pegasus_https_server packets.
 </summary>
@@ -47984,7 +47801,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60746">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60869">
 <summary>
 Send and receive pegasus_https_server packets.
 </summary>
@@ -47995,7 +47812,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60762">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60885">
 <summary>
 Do not audit attempts to send and receive pegasus_https_server packets.
 </summary>
@@ -48006,7 +47823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60777">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60900">
 <summary>
 Relabel packets to pegasus_https_server the packet type.
 </summary>
@@ -48016,7 +47833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60799">
+<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60922">
 <summary>
 Send and receive TCP traffic on the pgpkeyserver port.
 </summary>
@@ -48027,7 +47844,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60814">
+<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60937">
 <summary>
 Send UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48038,7 +47855,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60829">
+<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60952">
 <summary>
 Do not audit attempts to send UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48049,7 +47866,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60844">
+<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60967">
 <summary>
 Receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48060,7 +47877,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60859">
+<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60982">
 <summary>
 Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48071,7 +47888,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60874">
+<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60997">
 <summary>
 Send and receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48082,7 +47899,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="60890">
+<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61013">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pgpkeyserver port.
@@ -48094,7 +47911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="60905">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61028">
 <summary>
 Bind TCP sockets to the pgpkeyserver port.
 </summary>
@@ -48105,7 +47922,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="60925">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61048">
 <summary>
 Bind UDP sockets to the pgpkeyserver port.
 </summary>
@@ -48116,7 +47933,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="60944">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61067">
 <summary>
 Make a TCP connection to the pgpkeyserver port.
 </summary>
@@ -48126,7 +47943,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="60964">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61087">
 <summary>
 Send pgpkeyserver_client packets.
 </summary>
@@ -48137,7 +47954,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="60983">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61106">
 <summary>
 Do not audit attempts to send pgpkeyserver_client packets.
 </summary>
@@ -48148,7 +47965,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61002">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61125">
 <summary>
 Receive pgpkeyserver_client packets.
 </summary>
@@ -48159,7 +47976,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61021">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61144">
 <summary>
 Do not audit attempts to receive pgpkeyserver_client packets.
 </summary>
@@ -48170,7 +47987,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61040">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61163">
 <summary>
 Send and receive pgpkeyserver_client packets.
 </summary>
@@ -48181,7 +47998,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61056">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61179">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_client packets.
 </summary>
@@ -48192,7 +48009,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61071">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61194">
 <summary>
 Relabel packets to pgpkeyserver_client the packet type.
 </summary>
@@ -48202,7 +48019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61091">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61214">
 <summary>
 Send pgpkeyserver_server packets.
 </summary>
@@ -48213,7 +48030,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61110">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61233">
 <summary>
 Do not audit attempts to send pgpkeyserver_server packets.
 </summary>
@@ -48224,7 +48041,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61129">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61252">
 <summary>
 Receive pgpkeyserver_server packets.
 </summary>
@@ -48235,7 +48052,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61148">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61271">
 <summary>
 Do not audit attempts to receive pgpkeyserver_server packets.
 </summary>
@@ -48246,7 +48063,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61167">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61290">
 <summary>
 Send and receive pgpkeyserver_server packets.
 </summary>
@@ -48257,7 +48074,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61183">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61306">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_server packets.
 </summary>
@@ -48268,7 +48085,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61198">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61321">
 <summary>
 Relabel packets to pgpkeyserver_server the packet type.
 </summary>
@@ -48278,7 +48095,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61220">
+<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61343">
 <summary>
 Send and receive TCP traffic on the pingd port.
 </summary>
@@ -48289,7 +48106,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61235">
+<interface name="corenet_udp_send_pingd_port" lineno="61358">
 <summary>
 Send UDP traffic on the pingd port.
 </summary>
@@ -48300,7 +48117,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61250">
+<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61373">
 <summary>
 Do not audit attempts to send UDP traffic on the pingd port.
 </summary>
@@ -48311,7 +48128,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61265">
+<interface name="corenet_udp_receive_pingd_port" lineno="61388">
 <summary>
 Receive UDP traffic on the pingd port.
 </summary>
@@ -48322,7 +48139,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61280">
+<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61403">
 <summary>
 Do not audit attempts to receive UDP traffic on the pingd port.
 </summary>
@@ -48333,7 +48150,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61295">
+<interface name="corenet_udp_sendrecv_pingd_port" lineno="61418">
 <summary>
 Send and receive UDP traffic on the pingd port.
 </summary>
@@ -48344,7 +48161,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61311">
+<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61434">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pingd port.
@@ -48356,7 +48173,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61326">
+<interface name="corenet_tcp_bind_pingd_port" lineno="61449">
 <summary>
 Bind TCP sockets to the pingd port.
 </summary>
@@ -48367,7 +48184,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61346">
+<interface name="corenet_udp_bind_pingd_port" lineno="61469">
 <summary>
 Bind UDP sockets to the pingd port.
 </summary>
@@ -48378,7 +48195,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61365">
+<interface name="corenet_tcp_connect_pingd_port" lineno="61488">
 <summary>
 Make a TCP connection to the pingd port.
 </summary>
@@ -48388,7 +48205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61385">
+<interface name="corenet_send_pingd_client_packets" lineno="61508">
 <summary>
 Send pingd_client packets.
 </summary>
@@ -48399,7 +48216,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61404">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61527">
 <summary>
 Do not audit attempts to send pingd_client packets.
 </summary>
@@ -48410,7 +48227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61423">
+<interface name="corenet_receive_pingd_client_packets" lineno="61546">
 <summary>
 Receive pingd_client packets.
 </summary>
@@ -48421,7 +48238,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61442">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61565">
 <summary>
 Do not audit attempts to receive pingd_client packets.
 </summary>
@@ -48432,7 +48249,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="61461">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="61584">
 <summary>
 Send and receive pingd_client packets.
 </summary>
@@ -48443,7 +48260,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61477">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61600">
 <summary>
 Do not audit attempts to send and receive pingd_client packets.
 </summary>
@@ -48454,7 +48271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="61492">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="61615">
 <summary>
 Relabel packets to pingd_client the packet type.
 </summary>
@@ -48464,7 +48281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_server_packets" lineno="61512">
+<interface name="corenet_send_pingd_server_packets" lineno="61635">
 <summary>
 Send pingd_server packets.
 </summary>
@@ -48475,7 +48292,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61531">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61654">
 <summary>
 Do not audit attempts to send pingd_server packets.
 </summary>
@@ -48486,7 +48303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="61550">
+<interface name="corenet_receive_pingd_server_packets" lineno="61673">
 <summary>
 Receive pingd_server packets.
 </summary>
@@ -48497,7 +48314,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61569">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61692">
 <summary>
 Do not audit attempts to receive pingd_server packets.
 </summary>
@@ -48508,7 +48325,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="61588">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="61711">
 <summary>
 Send and receive pingd_server packets.
 </summary>
@@ -48519,7 +48336,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61604">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61727">
 <summary>
 Do not audit attempts to send and receive pingd_server packets.
 </summary>
@@ -48530,7 +48347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="61619">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="61742">
 <summary>
 Relabel packets to pingd_server the packet type.
 </summary>
@@ -48540,7 +48357,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61641">
+<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61764">
 <summary>
 Send and receive TCP traffic on the pktcable_cops port.
 </summary>
@@ -48551,7 +48368,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="61656">
+<interface name="corenet_udp_send_pktcable_cops_port" lineno="61779">
 <summary>
 Send UDP traffic on the pktcable_cops port.
 </summary>
@@ -48562,7 +48379,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61671">
+<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61794">
 <summary>
 Do not audit attempts to send UDP traffic on the pktcable_cops port.
 </summary>
@@ -48573,7 +48390,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61686">
+<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61809">
 <summary>
 Receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -48584,7 +48401,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61701">
+<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61824">
 <summary>
 Do not audit attempts to receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -48595,7 +48412,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61716">
+<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61839">
 <summary>
 Send and receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -48606,7 +48423,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61732">
+<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61855">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pktcable_cops port.
@@ -48618,7 +48435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61747">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61870">
 <summary>
 Bind TCP sockets to the pktcable_cops port.
 </summary>
@@ -48629,7 +48446,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61767">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61890">
 <summary>
 Bind UDP sockets to the pktcable_cops port.
 </summary>
@@ -48640,7 +48457,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61786">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61909">
 <summary>
 Make a TCP connection to the pktcable_cops port.
 </summary>
@@ -48650,7 +48467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="61806">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="61929">
 <summary>
 Send pktcable_cops_client packets.
 </summary>
@@ -48661,7 +48478,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61825">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61948">
 <summary>
 Do not audit attempts to send pktcable_cops_client packets.
 </summary>
@@ -48672,7 +48489,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61844">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61967">
 <summary>
 Receive pktcable_cops_client packets.
 </summary>
@@ -48683,7 +48500,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61863">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61986">
 <summary>
 Do not audit attempts to receive pktcable_cops_client packets.
 </summary>
@@ -48694,7 +48511,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="61882">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62005">
 <summary>
 Send and receive pktcable_cops_client packets.
 </summary>
@@ -48705,7 +48522,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="61898">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62021">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_client packets.
 </summary>
@@ -48716,7 +48533,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="61913">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62036">
 <summary>
 Relabel packets to pktcable_cops_client the packet type.
 </summary>
@@ -48726,7 +48543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="61933">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="62056">
 <summary>
 Send pktcable_cops_server packets.
 </summary>
@@ -48737,7 +48554,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="61952">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62075">
 <summary>
 Do not audit attempts to send pktcable_cops_server packets.
 </summary>
@@ -48748,7 +48565,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="61971">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62094">
 <summary>
 Receive pktcable_cops_server packets.
 </summary>
@@ -48759,7 +48576,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="61990">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62113">
 <summary>
 Do not audit attempts to receive pktcable_cops_server packets.
 </summary>
@@ -48770,7 +48587,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62009">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62132">
 <summary>
 Send and receive pktcable_cops_server packets.
 </summary>
@@ -48781,7 +48598,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62025">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62148">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_server packets.
 </summary>
@@ -48792,7 +48609,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62040">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62163">
 <summary>
 Relabel packets to pktcable_cops_server the packet type.
 </summary>
@@ -48802,7 +48619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62062">
+<interface name="corenet_tcp_sendrecv_pop_port" lineno="62185">
 <summary>
 Send and receive TCP traffic on the pop port.
 </summary>
@@ -48813,7 +48630,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pop_port" lineno="62077">
+<interface name="corenet_udp_send_pop_port" lineno="62200">
 <summary>
 Send UDP traffic on the pop port.
 </summary>
@@ -48824,7 +48641,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62092">
+<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62215">
 <summary>
 Do not audit attempts to send UDP traffic on the pop port.
 </summary>
@@ -48835,7 +48652,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62107">
+<interface name="corenet_udp_receive_pop_port" lineno="62230">
 <summary>
 Receive UDP traffic on the pop port.
 </summary>
@@ -48846,7 +48663,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62122">
+<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62245">
 <summary>
 Do not audit attempts to receive UDP traffic on the pop port.
 </summary>
@@ -48857,7 +48674,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62137">
+<interface name="corenet_udp_sendrecv_pop_port" lineno="62260">
 <summary>
 Send and receive UDP traffic on the pop port.
 </summary>
@@ -48868,7 +48685,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62153">
+<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62276">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pop port.
@@ -48880,7 +48697,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62168">
+<interface name="corenet_tcp_bind_pop_port" lineno="62291">
 <summary>
 Bind TCP sockets to the pop port.
 </summary>
@@ -48891,7 +48708,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62188">
+<interface name="corenet_udp_bind_pop_port" lineno="62311">
 <summary>
 Bind UDP sockets to the pop port.
 </summary>
@@ -48902,7 +48719,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62207">
+<interface name="corenet_tcp_connect_pop_port" lineno="62330">
 <summary>
 Make a TCP connection to the pop port.
 </summary>
@@ -48912,7 +48729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_client_packets" lineno="62227">
+<interface name="corenet_send_pop_client_packets" lineno="62350">
 <summary>
 Send pop_client packets.
 </summary>
@@ -48923,7 +48740,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62246">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62369">
 <summary>
 Do not audit attempts to send pop_client packets.
 </summary>
@@ -48934,7 +48751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62265">
+<interface name="corenet_receive_pop_client_packets" lineno="62388">
 <summary>
 Receive pop_client packets.
 </summary>
@@ -48945,7 +48762,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62284">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62407">
 <summary>
 Do not audit attempts to receive pop_client packets.
 </summary>
@@ -48956,7 +48773,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62303">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="62426">
 <summary>
 Send and receive pop_client packets.
 </summary>
@@ -48967,7 +48784,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62319">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62442">
 <summary>
 Do not audit attempts to send and receive pop_client packets.
 </summary>
@@ -48978,7 +48795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62334">
+<interface name="corenet_relabelto_pop_client_packets" lineno="62457">
 <summary>
 Relabel packets to pop_client the packet type.
 </summary>
@@ -48988,7 +48805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_server_packets" lineno="62354">
+<interface name="corenet_send_pop_server_packets" lineno="62477">
 <summary>
 Send pop_server packets.
 </summary>
@@ -48999,7 +48816,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62373">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62496">
 <summary>
 Do not audit attempts to send pop_server packets.
 </summary>
@@ -49010,7 +48827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62392">
+<interface name="corenet_receive_pop_server_packets" lineno="62515">
 <summary>
 Receive pop_server packets.
 </summary>
@@ -49021,7 +48838,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62411">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62534">
 <summary>
 Do not audit attempts to receive pop_server packets.
 </summary>
@@ -49032,7 +48849,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62430">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="62553">
 <summary>
 Send and receive pop_server packets.
 </summary>
@@ -49043,7 +48860,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62446">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62569">
 <summary>
 Do not audit attempts to send and receive pop_server packets.
 </summary>
@@ -49054,7 +48871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="62461">
+<interface name="corenet_relabelto_pop_server_packets" lineno="62584">
 <summary>
 Relabel packets to pop_server the packet type.
 </summary>
@@ -49064,7 +48881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62483">
+<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62606">
 <summary>
 Send and receive TCP traffic on the portmap port.
 </summary>
@@ -49075,7 +48892,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_portmap_port" lineno="62498">
+<interface name="corenet_udp_send_portmap_port" lineno="62621">
 <summary>
 Send UDP traffic on the portmap port.
 </summary>
@@ -49086,7 +48903,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62513">
+<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62636">
 <summary>
 Do not audit attempts to send UDP traffic on the portmap port.
 </summary>
@@ -49097,7 +48914,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="62528">
+<interface name="corenet_udp_receive_portmap_port" lineno="62651">
 <summary>
 Receive UDP traffic on the portmap port.
 </summary>
@@ -49108,7 +48925,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62543">
+<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62666">
 <summary>
 Do not audit attempts to receive UDP traffic on the portmap port.
 </summary>
@@ -49119,7 +48936,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="62558">
+<interface name="corenet_udp_sendrecv_portmap_port" lineno="62681">
 <summary>
 Send and receive UDP traffic on the portmap port.
 </summary>
@@ -49130,7 +48947,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62574">
+<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62697">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the portmap port.
@@ -49142,7 +48959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="62589">
+<interface name="corenet_tcp_bind_portmap_port" lineno="62712">
 <summary>
 Bind TCP sockets to the portmap port.
 </summary>
@@ -49153,7 +48970,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="62609">
+<interface name="corenet_udp_bind_portmap_port" lineno="62732">
 <summary>
 Bind UDP sockets to the portmap port.
 </summary>
@@ -49164,7 +48981,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="62628">
+<interface name="corenet_tcp_connect_portmap_port" lineno="62751">
 <summary>
 Make a TCP connection to the portmap port.
 </summary>
@@ -49174,7 +48991,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_client_packets" lineno="62648">
+<interface name="corenet_send_portmap_client_packets" lineno="62771">
 <summary>
 Send portmap_client packets.
 </summary>
@@ -49185,7 +49002,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62667">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62790">
 <summary>
 Do not audit attempts to send portmap_client packets.
 </summary>
@@ -49196,7 +49013,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="62686">
+<interface name="corenet_receive_portmap_client_packets" lineno="62809">
 <summary>
 Receive portmap_client packets.
 </summary>
@@ -49207,7 +49024,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62705">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62828">
 <summary>
 Do not audit attempts to receive portmap_client packets.
 </summary>
@@ -49218,7 +49035,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="62724">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="62847">
 <summary>
 Send and receive portmap_client packets.
 </summary>
@@ -49229,7 +49046,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62740">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62863">
 <summary>
 Do not audit attempts to send and receive portmap_client packets.
 </summary>
@@ -49240,7 +49057,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="62755">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="62878">
 <summary>
 Relabel packets to portmap_client the packet type.
 </summary>
@@ -49250,7 +49067,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_server_packets" lineno="62775">
+<interface name="corenet_send_portmap_server_packets" lineno="62898">
 <summary>
 Send portmap_server packets.
 </summary>
@@ -49261,7 +49078,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62794">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62917">
 <summary>
 Do not audit attempts to send portmap_server packets.
 </summary>
@@ -49272,7 +49089,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="62813">
+<interface name="corenet_receive_portmap_server_packets" lineno="62936">
 <summary>
 Receive portmap_server packets.
 </summary>
@@ -49283,7 +49100,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62832">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62955">
 <summary>
 Do not audit attempts to receive portmap_server packets.
 </summary>
@@ -49294,7 +49111,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="62851">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="62974">
 <summary>
 Send and receive portmap_server packets.
 </summary>
@@ -49305,7 +49122,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62867">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62990">
 <summary>
 Do not audit attempts to send and receive portmap_server packets.
 </summary>
@@ -49316,7 +49133,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="62882">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="63005">
 <summary>
 Relabel packets to portmap_server the packet type.
 </summary>
@@ -49326,7 +49143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="62904">
+<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63027">
 <summary>
 Send and receive TCP traffic on the postfix_policyd port.
 </summary>
@@ -49337,7 +49154,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="62919">
+<interface name="corenet_udp_send_postfix_policyd_port" lineno="63042">
 <summary>
 Send UDP traffic on the postfix_policyd port.
 </summary>
@@ -49348,7 +49165,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="62934">
+<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63057">
 <summary>
 Do not audit attempts to send UDP traffic on the postfix_policyd port.
 </summary>
@@ -49359,7 +49176,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="62949">
+<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63072">
 <summary>
 Receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49370,7 +49187,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="62964">
+<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63087">
 <summary>
 Do not audit attempts to receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49381,7 +49198,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="62979">
+<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63102">
 <summary>
 Send and receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49392,7 +49209,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="62995">
+<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63118">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postfix_policyd port.
@@ -49404,7 +49221,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63010">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63133">
 <summary>
 Bind TCP sockets to the postfix_policyd port.
 </summary>
@@ -49415,7 +49232,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63030">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63153">
 <summary>
 Bind UDP sockets to the postfix_policyd port.
 </summary>
@@ -49426,7 +49243,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63049">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63172">
 <summary>
 Make a TCP connection to the postfix_policyd port.
 </summary>
@@ -49436,7 +49253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63069">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="63192">
 <summary>
 Send postfix_policyd_client packets.
 </summary>
@@ -49447,7 +49264,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63088">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63211">
 <summary>
 Do not audit attempts to send postfix_policyd_client packets.
 </summary>
@@ -49458,7 +49275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63107">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63230">
 <summary>
 Receive postfix_policyd_client packets.
 </summary>
@@ -49469,7 +49286,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63126">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63249">
 <summary>
 Do not audit attempts to receive postfix_policyd_client packets.
 </summary>
@@ -49480,7 +49297,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63145">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63268">
 <summary>
 Send and receive postfix_policyd_client packets.
 </summary>
@@ -49491,7 +49308,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63161">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63284">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_client packets.
 </summary>
@@ -49502,7 +49319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63176">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63299">
 <summary>
 Relabel packets to postfix_policyd_client the packet type.
 </summary>
@@ -49512,7 +49329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63196">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="63319">
 <summary>
 Send postfix_policyd_server packets.
 </summary>
@@ -49523,7 +49340,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63215">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63338">
 <summary>
 Do not audit attempts to send postfix_policyd_server packets.
 </summary>
@@ -49534,7 +49351,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63234">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63357">
 <summary>
 Receive postfix_policyd_server packets.
 </summary>
@@ -49545,7 +49362,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63253">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63376">
 <summary>
 Do not audit attempts to receive postfix_policyd_server packets.
 </summary>
@@ -49556,7 +49373,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63272">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63395">
 <summary>
 Send and receive postfix_policyd_server packets.
 </summary>
@@ -49567,7 +49384,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63288">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63411">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_server packets.
 </summary>
@@ -49578,7 +49395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63303">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63426">
 <summary>
 Relabel packets to postfix_policyd_server the packet type.
 </summary>
@@ -49588,7 +49405,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63325">
+<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63448">
 <summary>
 Send and receive TCP traffic on the postgresql port.
 </summary>
@@ -49599,7 +49416,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63340">
+<interface name="corenet_udp_send_postgresql_port" lineno="63463">
 <summary>
 Send UDP traffic on the postgresql port.
 </summary>
@@ -49610,7 +49427,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63355">
+<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63478">
 <summary>
 Do not audit attempts to send UDP traffic on the postgresql port.
 </summary>
@@ -49621,7 +49438,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63370">
+<interface name="corenet_udp_receive_postgresql_port" lineno="63493">
 <summary>
 Receive UDP traffic on the postgresql port.
 </summary>
@@ -49632,7 +49449,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63385">
+<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63508">
 <summary>
 Do not audit attempts to receive UDP traffic on the postgresql port.
 </summary>
@@ -49643,7 +49460,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63400">
+<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63523">
 <summary>
 Send and receive UDP traffic on the postgresql port.
 </summary>
@@ -49654,7 +49471,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63416">
+<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63539">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postgresql port.
@@ -49666,7 +49483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63431">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="63554">
 <summary>
 Bind TCP sockets to the postgresql port.
 </summary>
@@ -49677,7 +49494,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="63451">
+<interface name="corenet_udp_bind_postgresql_port" lineno="63574">
 <summary>
 Bind UDP sockets to the postgresql port.
 </summary>
@@ -49688,7 +49505,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="63470">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="63593">
 <summary>
 Make a TCP connection to the postgresql port.
 </summary>
@@ -49698,7 +49515,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="63490">
+<interface name="corenet_send_postgresql_client_packets" lineno="63613">
 <summary>
 Send postgresql_client packets.
 </summary>
@@ -49709,7 +49526,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63509">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63632">
 <summary>
 Do not audit attempts to send postgresql_client packets.
 </summary>
@@ -49720,7 +49537,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="63528">
+<interface name="corenet_receive_postgresql_client_packets" lineno="63651">
 <summary>
 Receive postgresql_client packets.
 </summary>
@@ -49731,7 +49548,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63547">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63670">
 <summary>
 Do not audit attempts to receive postgresql_client packets.
 </summary>
@@ -49742,7 +49559,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63566">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63689">
 <summary>
 Send and receive postgresql_client packets.
 </summary>
@@ -49753,7 +49570,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63582">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63705">
 <summary>
 Do not audit attempts to send and receive postgresql_client packets.
 </summary>
@@ -49764,7 +49581,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="63597">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="63720">
 <summary>
 Relabel packets to postgresql_client the packet type.
 </summary>
@@ -49774,7 +49591,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="63617">
+<interface name="corenet_send_postgresql_server_packets" lineno="63740">
 <summary>
 Send postgresql_server packets.
 </summary>
@@ -49785,7 +49602,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63636">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63759">
 <summary>
 Do not audit attempts to send postgresql_server packets.
 </summary>
@@ -49796,7 +49613,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="63655">
+<interface name="corenet_receive_postgresql_server_packets" lineno="63778">
 <summary>
 Receive postgresql_server packets.
 </summary>
@@ -49807,7 +49624,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63674">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63797">
 <summary>
 Do not audit attempts to receive postgresql_server packets.
 </summary>
@@ -49818,7 +49635,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63693">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63816">
 <summary>
 Send and receive postgresql_server packets.
 </summary>
@@ -49829,7 +49646,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63709">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63832">
 <summary>
 Do not audit attempts to send and receive postgresql_server packets.
 </summary>
@@ -49840,7 +49657,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="63724">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="63847">
 <summary>
 Relabel packets to postgresql_server the packet type.
 </summary>
@@ -49850,7 +49667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63746">
+<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63869">
 <summary>
 Send and receive TCP traffic on the postgrey port.
 </summary>
@@ -49861,7 +49678,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="63761">
+<interface name="corenet_udp_send_postgrey_port" lineno="63884">
 <summary>
 Send UDP traffic on the postgrey port.
 </summary>
@@ -49872,7 +49689,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63776">
+<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63899">
 <summary>
 Do not audit attempts to send UDP traffic on the postgrey port.
 </summary>
@@ -49883,7 +49700,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="63791">
+<interface name="corenet_udp_receive_postgrey_port" lineno="63914">
 <summary>
 Receive UDP traffic on the postgrey port.
 </summary>
@@ -49894,7 +49711,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63806">
+<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63929">
 <summary>
 Do not audit attempts to receive UDP traffic on the postgrey port.
 </summary>
@@ -49905,7 +49722,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63821">
+<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63944">
 <summary>
 Send and receive UDP traffic on the postgrey port.
 </summary>
@@ -49916,7 +49733,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63837">
+<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63960">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postgrey port.
@@ -49928,7 +49745,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="63852">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="63975">
 <summary>
 Bind TCP sockets to the postgrey port.
 </summary>
@@ -49939,7 +49756,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="63872">
+<interface name="corenet_udp_bind_postgrey_port" lineno="63995">
 <summary>
 Bind UDP sockets to the postgrey port.
 </summary>
@@ -49950,7 +49767,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="63891">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="64014">
 <summary>
 Make a TCP connection to the postgrey port.
 </summary>
@@ -49960,7 +49777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="63911">
+<interface name="corenet_send_postgrey_client_packets" lineno="64034">
 <summary>
 Send postgrey_client packets.
 </summary>
@@ -49971,7 +49788,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="63930">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64053">
 <summary>
 Do not audit attempts to send postgrey_client packets.
 </summary>
@@ -49982,7 +49799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="63949">
+<interface name="corenet_receive_postgrey_client_packets" lineno="64072">
 <summary>
 Receive postgrey_client packets.
 </summary>
@@ -49993,7 +49810,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="63968">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64091">
 <summary>
 Do not audit attempts to receive postgrey_client packets.
 </summary>
@@ -50004,7 +49821,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="63987">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64110">
 <summary>
 Send and receive postgrey_client packets.
 </summary>
@@ -50015,7 +49832,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64003">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64126">
 <summary>
 Do not audit attempts to send and receive postgrey_client packets.
 </summary>
@@ -50026,7 +49843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64018">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="64141">
 <summary>
 Relabel packets to postgrey_client the packet type.
 </summary>
@@ -50036,7 +49853,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64038">
+<interface name="corenet_send_postgrey_server_packets" lineno="64161">
 <summary>
 Send postgrey_server packets.
 </summary>
@@ -50047,7 +49864,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64057">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64180">
 <summary>
 Do not audit attempts to send postgrey_server packets.
 </summary>
@@ -50058,7 +49875,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64076">
+<interface name="corenet_receive_postgrey_server_packets" lineno="64199">
 <summary>
 Receive postgrey_server packets.
 </summary>
@@ -50069,7 +49886,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64095">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64218">
 <summary>
 Do not audit attempts to receive postgrey_server packets.
 </summary>
@@ -50080,7 +49897,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64114">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64237">
 <summary>
 Send and receive postgrey_server packets.
 </summary>
@@ -50091,7 +49908,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64130">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64253">
 <summary>
 Do not audit attempts to send and receive postgrey_server packets.
 </summary>
@@ -50102,7 +49919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64145">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="64268">
 <summary>
 Relabel packets to postgrey_server the packet type.
 </summary>
@@ -50112,7 +49929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64167">
+<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64290">
 <summary>
 Send and receive TCP traffic on the pptp port.
 </summary>
@@ -50123,7 +49940,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64182">
+<interface name="corenet_udp_send_pptp_port" lineno="64305">
 <summary>
 Send UDP traffic on the pptp port.
 </summary>
@@ -50134,7 +49951,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64197">
+<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64320">
 <summary>
 Do not audit attempts to send UDP traffic on the pptp port.
 </summary>
@@ -50145,7 +49962,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64212">
+<interface name="corenet_udp_receive_pptp_port" lineno="64335">
 <summary>
 Receive UDP traffic on the pptp port.
 </summary>
@@ -50156,7 +49973,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64227">
+<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64350">
 <summary>
 Do not audit attempts to receive UDP traffic on the pptp port.
 </summary>
@@ -50167,7 +49984,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64242">
+<interface name="corenet_udp_sendrecv_pptp_port" lineno="64365">
 <summary>
 Send and receive UDP traffic on the pptp port.
 </summary>
@@ -50178,7 +49995,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64258">
+<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64381">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pptp port.
@@ -50190,7 +50007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64273">
+<interface name="corenet_tcp_bind_pptp_port" lineno="64396">
 <summary>
 Bind TCP sockets to the pptp port.
 </summary>
@@ -50201,7 +50018,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64293">
+<interface name="corenet_udp_bind_pptp_port" lineno="64416">
 <summary>
 Bind UDP sockets to the pptp port.
 </summary>
@@ -50212,7 +50029,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64312">
+<interface name="corenet_tcp_connect_pptp_port" lineno="64435">
 <summary>
 Make a TCP connection to the pptp port.
 </summary>
@@ -50222,7 +50039,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64332">
+<interface name="corenet_send_pptp_client_packets" lineno="64455">
 <summary>
 Send pptp_client packets.
 </summary>
@@ -50233,7 +50050,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64351">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64474">
 <summary>
 Do not audit attempts to send pptp_client packets.
 </summary>
@@ -50244,7 +50061,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64370">
+<interface name="corenet_receive_pptp_client_packets" lineno="64493">
 <summary>
 Receive pptp_client packets.
 </summary>
@@ -50255,7 +50072,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64389">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64512">
 <summary>
 Do not audit attempts to receive pptp_client packets.
 </summary>
@@ -50266,7 +50083,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64408">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="64531">
 <summary>
 Send and receive pptp_client packets.
 </summary>
@@ -50277,7 +50094,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64424">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64547">
 <summary>
 Do not audit attempts to send and receive pptp_client packets.
 </summary>
@@ -50288,7 +50105,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="64439">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="64562">
 <summary>
 Relabel packets to pptp_client the packet type.
 </summary>
@@ -50298,7 +50115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_server_packets" lineno="64459">
+<interface name="corenet_send_pptp_server_packets" lineno="64582">
 <summary>
 Send pptp_server packets.
 </summary>
@@ -50309,7 +50126,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64478">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64601">
 <summary>
 Do not audit attempts to send pptp_server packets.
 </summary>
@@ -50320,7 +50137,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="64497">
+<interface name="corenet_receive_pptp_server_packets" lineno="64620">
 <summary>
 Receive pptp_server packets.
 </summary>
@@ -50331,7 +50148,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64516">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64639">
 <summary>
 Do not audit attempts to receive pptp_server packets.
 </summary>
@@ -50342,7 +50159,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="64535">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="64658">
 <summary>
 Send and receive pptp_server packets.
 </summary>
@@ -50353,7 +50170,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64551">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64674">
 <summary>
 Do not audit attempts to send and receive pptp_server packets.
 </summary>
@@ -50364,7 +50181,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="64566">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="64689">
 <summary>
 Relabel packets to pptp_server the packet type.
 </summary>
@@ -50374,7 +50191,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64588">
+<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64711">
 <summary>
 Send and receive TCP traffic on the prelude port.
 </summary>
@@ -50385,7 +50202,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_prelude_port" lineno="64603">
+<interface name="corenet_udp_send_prelude_port" lineno="64726">
 <summary>
 Send UDP traffic on the prelude port.
 </summary>
@@ -50396,7 +50213,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64618">
+<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64741">
 <summary>
 Do not audit attempts to send UDP traffic on the prelude port.
 </summary>
@@ -50407,7 +50224,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="64633">
+<interface name="corenet_udp_receive_prelude_port" lineno="64756">
 <summary>
 Receive UDP traffic on the prelude port.
 </summary>
@@ -50418,7 +50235,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64648">
+<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64771">
 <summary>
 Do not audit attempts to receive UDP traffic on the prelude port.
 </summary>
@@ -50429,7 +50246,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="64663">
+<interface name="corenet_udp_sendrecv_prelude_port" lineno="64786">
 <summary>
 Send and receive UDP traffic on the prelude port.
 </summary>
@@ -50440,7 +50257,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64679">
+<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64802">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the prelude port.
@@ -50452,7 +50269,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="64694">
+<interface name="corenet_tcp_bind_prelude_port" lineno="64817">
 <summary>
 Bind TCP sockets to the prelude port.
 </summary>
@@ -50463,7 +50280,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="64714">
+<interface name="corenet_udp_bind_prelude_port" lineno="64837">
 <summary>
 Bind UDP sockets to the prelude port.
 </summary>
@@ -50474,7 +50291,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="64733">
+<interface name="corenet_tcp_connect_prelude_port" lineno="64856">
 <summary>
 Make a TCP connection to the prelude port.
 </summary>
@@ -50484,7 +50301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_client_packets" lineno="64753">
+<interface name="corenet_send_prelude_client_packets" lineno="64876">
 <summary>
 Send prelude_client packets.
 </summary>
@@ -50495,7 +50312,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64772">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64895">
 <summary>
 Do not audit attempts to send prelude_client packets.
 </summary>
@@ -50506,7 +50323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="64791">
+<interface name="corenet_receive_prelude_client_packets" lineno="64914">
 <summary>
 Receive prelude_client packets.
 </summary>
@@ -50517,7 +50334,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64810">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64933">
 <summary>
 Do not audit attempts to receive prelude_client packets.
 </summary>
@@ -50528,7 +50345,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="64829">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="64952">
 <summary>
 Send and receive prelude_client packets.
 </summary>
@@ -50539,7 +50356,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64845">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64968">
 <summary>
 Do not audit attempts to send and receive prelude_client packets.
 </summary>
@@ -50550,7 +50367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="64860">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="64983">
 <summary>
 Relabel packets to prelude_client the packet type.
 </summary>
@@ -50560,7 +50377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_server_packets" lineno="64880">
+<interface name="corenet_send_prelude_server_packets" lineno="65003">
 <summary>
 Send prelude_server packets.
 </summary>
@@ -50571,7 +50388,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="64899">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65022">
 <summary>
 Do not audit attempts to send prelude_server packets.
 </summary>
@@ -50582,7 +50399,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="64918">
+<interface name="corenet_receive_prelude_server_packets" lineno="65041">
 <summary>
 Receive prelude_server packets.
 </summary>
@@ -50593,7 +50410,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="64937">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65060">
 <summary>
 Do not audit attempts to receive prelude_server packets.
 </summary>
@@ -50604,7 +50421,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="64956">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="65079">
 <summary>
 Send and receive prelude_server packets.
 </summary>
@@ -50615,7 +50432,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="64972">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65095">
 <summary>
 Do not audit attempts to send and receive prelude_server packets.
 </summary>
@@ -50626,7 +50443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="64987">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="65110">
 <summary>
 Relabel packets to prelude_server the packet type.
 </summary>
@@ -50636,7 +50453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65009">
+<interface name="corenet_tcp_sendrecv_presence_port" lineno="65132">
 <summary>
 Send and receive TCP traffic on the presence port.
 </summary>
@@ -50647,7 +50464,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_presence_port" lineno="65024">
+<interface name="corenet_udp_send_presence_port" lineno="65147">
 <summary>
 Send UDP traffic on the presence port.
 </summary>
@@ -50658,7 +50475,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65039">
+<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65162">
 <summary>
 Do not audit attempts to send UDP traffic on the presence port.
 </summary>
@@ -50669,7 +50486,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65054">
+<interface name="corenet_udp_receive_presence_port" lineno="65177">
 <summary>
 Receive UDP traffic on the presence port.
 </summary>
@@ -50680,7 +50497,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65069">
+<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65192">
 <summary>
 Do not audit attempts to receive UDP traffic on the presence port.
 </summary>
@@ -50691,7 +50508,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65084">
+<interface name="corenet_udp_sendrecv_presence_port" lineno="65207">
 <summary>
 Send and receive UDP traffic on the presence port.
 </summary>
@@ -50702,7 +50519,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65100">
+<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65223">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the presence port.
@@ -50714,7 +50531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65115">
+<interface name="corenet_tcp_bind_presence_port" lineno="65238">
 <summary>
 Bind TCP sockets to the presence port.
 </summary>
@@ -50725,7 +50542,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65135">
+<interface name="corenet_udp_bind_presence_port" lineno="65258">
 <summary>
 Bind UDP sockets to the presence port.
 </summary>
@@ -50736,7 +50553,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65154">
+<interface name="corenet_tcp_connect_presence_port" lineno="65277">
 <summary>
 Make a TCP connection to the presence port.
 </summary>
@@ -50746,7 +50563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_client_packets" lineno="65174">
+<interface name="corenet_send_presence_client_packets" lineno="65297">
 <summary>
 Send presence_client packets.
 </summary>
@@ -50757,7 +50574,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65193">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65316">
 <summary>
 Do not audit attempts to send presence_client packets.
 </summary>
@@ -50768,7 +50585,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65212">
+<interface name="corenet_receive_presence_client_packets" lineno="65335">
 <summary>
 Receive presence_client packets.
 </summary>
@@ -50779,7 +50596,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65231">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65354">
 <summary>
 Do not audit attempts to receive presence_client packets.
 </summary>
@@ -50790,7 +50607,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65250">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="65373">
 <summary>
 Send and receive presence_client packets.
 </summary>
@@ -50801,7 +50618,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65266">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65389">
 <summary>
 Do not audit attempts to send and receive presence_client packets.
 </summary>
@@ -50812,7 +50629,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65281">
+<interface name="corenet_relabelto_presence_client_packets" lineno="65404">
 <summary>
 Relabel packets to presence_client the packet type.
 </summary>
@@ -50822,7 +50639,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_server_packets" lineno="65301">
+<interface name="corenet_send_presence_server_packets" lineno="65424">
 <summary>
 Send presence_server packets.
 </summary>
@@ -50833,7 +50650,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65320">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65443">
 <summary>
 Do not audit attempts to send presence_server packets.
 </summary>
@@ -50844,7 +50661,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65339">
+<interface name="corenet_receive_presence_server_packets" lineno="65462">
 <summary>
 Receive presence_server packets.
 </summary>
@@ -50855,7 +50672,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65358">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65481">
 <summary>
 Do not audit attempts to receive presence_server packets.
 </summary>
@@ -50866,7 +50683,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65377">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="65500">
 <summary>
 Send and receive presence_server packets.
 </summary>
@@ -50877,7 +50694,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65393">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65516">
 <summary>
 Do not audit attempts to send and receive presence_server packets.
 </summary>
@@ -50888,7 +50705,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65408">
+<interface name="corenet_relabelto_presence_server_packets" lineno="65531">
 <summary>
 Relabel packets to presence_server the packet type.
 </summary>
@@ -50898,7 +50715,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65430">
+<interface name="corenet_tcp_sendrecv_printer_port" lineno="65553">
 <summary>
 Send and receive TCP traffic on the printer port.
 </summary>
@@ -50909,7 +50726,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_printer_port" lineno="65445">
+<interface name="corenet_udp_send_printer_port" lineno="65568">
 <summary>
 Send UDP traffic on the printer port.
 </summary>
@@ -50920,7 +50737,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65460">
+<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65583">
 <summary>
 Do not audit attempts to send UDP traffic on the printer port.
 </summary>
@@ -50931,7 +50748,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_printer_port" lineno="65475">
+<interface name="corenet_udp_receive_printer_port" lineno="65598">
 <summary>
 Receive UDP traffic on the printer port.
 </summary>
@@ -50942,7 +50759,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65490">
+<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65613">
 <summary>
 Do not audit attempts to receive UDP traffic on the printer port.
 </summary>
@@ -50953,7 +50770,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="65505">
+<interface name="corenet_udp_sendrecv_printer_port" lineno="65628">
 <summary>
 Send and receive UDP traffic on the printer port.
 </summary>
@@ -50964,7 +50781,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65521">
+<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65644">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the printer port.
@@ -50976,7 +50793,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="65536">
+<interface name="corenet_tcp_bind_printer_port" lineno="65659">
 <summary>
 Bind TCP sockets to the printer port.
 </summary>
@@ -50987,7 +50804,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_printer_port" lineno="65556">
+<interface name="corenet_udp_bind_printer_port" lineno="65679">
 <summary>
 Bind UDP sockets to the printer port.
 </summary>
@@ -50998,7 +50815,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="65575">
+<interface name="corenet_tcp_connect_printer_port" lineno="65698">
 <summary>
 Make a TCP connection to the printer port.
 </summary>
@@ -51008,7 +50825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_client_packets" lineno="65595">
+<interface name="corenet_send_printer_client_packets" lineno="65718">
 <summary>
 Send printer_client packets.
 </summary>
@@ -51019,7 +50836,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65614">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65737">
 <summary>
 Do not audit attempts to send printer_client packets.
 </summary>
@@ -51030,7 +50847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_client_packets" lineno="65633">
+<interface name="corenet_receive_printer_client_packets" lineno="65756">
 <summary>
 Receive printer_client packets.
 </summary>
@@ -51041,7 +50858,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65652">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65775">
 <summary>
 Do not audit attempts to receive printer_client packets.
 </summary>
@@ -51052,7 +50869,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="65671">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="65794">
 <summary>
 Send and receive printer_client packets.
 </summary>
@@ -51063,7 +50880,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65687">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65810">
 <summary>
 Do not audit attempts to send and receive printer_client packets.
 </summary>
@@ -51074,7 +50891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="65702">
+<interface name="corenet_relabelto_printer_client_packets" lineno="65825">
 <summary>
 Relabel packets to printer_client the packet type.
 </summary>
@@ -51084,7 +50901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_server_packets" lineno="65722">
+<interface name="corenet_send_printer_server_packets" lineno="65845">
 <summary>
 Send printer_server packets.
 </summary>
@@ -51095,7 +50912,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65741">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65864">
 <summary>
 Do not audit attempts to send printer_server packets.
 </summary>
@@ -51106,7 +50923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_server_packets" lineno="65760">
+<interface name="corenet_receive_printer_server_packets" lineno="65883">
 <summary>
 Receive printer_server packets.
 </summary>
@@ -51117,7 +50934,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65779">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65902">
 <summary>
 Do not audit attempts to receive printer_server packets.
 </summary>
@@ -51128,7 +50945,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="65798">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="65921">
 <summary>
 Send and receive printer_server packets.
 </summary>
@@ -51139,7 +50956,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65814">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65937">
 <summary>
 Do not audit attempts to send and receive printer_server packets.
 </summary>
@@ -51150,7 +50967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="65829">
+<interface name="corenet_relabelto_printer_server_packets" lineno="65952">
 <summary>
 Relabel packets to printer_server the packet type.
 </summary>
@@ -51160,7 +50977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65851">
+<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65974">
 <summary>
 Send and receive TCP traffic on the ptal port.
 </summary>
@@ -51171,7 +50988,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ptal_port" lineno="65866">
+<interface name="corenet_udp_send_ptal_port" lineno="65989">
 <summary>
 Send UDP traffic on the ptal port.
 </summary>
@@ -51182,7 +50999,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="65881">
+<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66004">
 <summary>
 Do not audit attempts to send UDP traffic on the ptal port.
 </summary>
@@ -51193,7 +51010,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="65896">
+<interface name="corenet_udp_receive_ptal_port" lineno="66019">
 <summary>
 Receive UDP traffic on the ptal port.
 </summary>
@@ -51204,7 +51021,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="65911">
+<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66034">
 <summary>
 Do not audit attempts to receive UDP traffic on the ptal port.
 </summary>
@@ -51215,7 +51032,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="65926">
+<interface name="corenet_udp_sendrecv_ptal_port" lineno="66049">
 <summary>
 Send and receive UDP traffic on the ptal port.
 </summary>
@@ -51226,7 +51043,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="65942">
+<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66065">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ptal port.
@@ -51238,7 +51055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="65957">
+<interface name="corenet_tcp_bind_ptal_port" lineno="66080">
 <summary>
 Bind TCP sockets to the ptal port.
 </summary>
@@ -51249,7 +51066,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="65977">
+<interface name="corenet_udp_bind_ptal_port" lineno="66100">
 <summary>
 Bind UDP sockets to the ptal port.
 </summary>
@@ -51260,7 +51077,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="65996">
+<interface name="corenet_tcp_connect_ptal_port" lineno="66119">
 <summary>
 Make a TCP connection to the ptal port.
 </summary>
@@ -51270,7 +51087,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66016">
+<interface name="corenet_send_ptal_client_packets" lineno="66139">
 <summary>
 Send ptal_client packets.
 </summary>
@@ -51281,7 +51098,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66035">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66158">
 <summary>
 Do not audit attempts to send ptal_client packets.
 </summary>
@@ -51292,7 +51109,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66054">
+<interface name="corenet_receive_ptal_client_packets" lineno="66177">
 <summary>
 Receive ptal_client packets.
 </summary>
@@ -51303,7 +51120,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66073">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66196">
 <summary>
 Do not audit attempts to receive ptal_client packets.
 </summary>
@@ -51314,7 +51131,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66092">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="66215">
 <summary>
 Send and receive ptal_client packets.
 </summary>
@@ -51325,7 +51142,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66108">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66231">
 <summary>
 Do not audit attempts to send and receive ptal_client packets.
 </summary>
@@ -51336,7 +51153,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66123">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="66246">
 <summary>
 Relabel packets to ptal_client the packet type.
 </summary>
@@ -51346,7 +51163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66143">
+<interface name="corenet_send_ptal_server_packets" lineno="66266">
 <summary>
 Send ptal_server packets.
 </summary>
@@ -51357,7 +51174,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66162">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66285">
 <summary>
 Do not audit attempts to send ptal_server packets.
 </summary>
@@ -51368,7 +51185,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66181">
+<interface name="corenet_receive_ptal_server_packets" lineno="66304">
 <summary>
 Receive ptal_server packets.
 </summary>
@@ -51379,7 +51196,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66200">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66323">
 <summary>
 Do not audit attempts to receive ptal_server packets.
 </summary>
@@ -51390,7 +51207,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66219">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="66342">
 <summary>
 Send and receive ptal_server packets.
 </summary>
@@ -51401,7 +51218,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66235">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66358">
 <summary>
 Do not audit attempts to send and receive ptal_server packets.
 </summary>
@@ -51412,7 +51229,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66250">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="66373">
 <summary>
 Relabel packets to ptal_server the packet type.
 </summary>
@@ -51422,7 +51239,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66272">
+<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66395">
 <summary>
 Send and receive TCP traffic on the pulseaudio port.
 </summary>
@@ -51433,7 +51250,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66287">
+<interface name="corenet_udp_send_pulseaudio_port" lineno="66410">
 <summary>
 Send UDP traffic on the pulseaudio port.
 </summary>
@@ -51444,7 +51261,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66302">
+<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66425">
 <summary>
 Do not audit attempts to send UDP traffic on the pulseaudio port.
 </summary>
@@ -51455,7 +51272,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66317">
+<interface name="corenet_udp_receive_pulseaudio_port" lineno="66440">
 <summary>
 Receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51466,7 +51283,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66332">
+<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66455">
 <summary>
 Do not audit attempts to receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51477,7 +51294,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66347">
+<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66470">
 <summary>
 Send and receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51488,7 +51305,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66363">
+<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66486">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pulseaudio port.
@@ -51500,7 +51317,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66378">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66501">
 <summary>
 Bind TCP sockets to the pulseaudio port.
 </summary>
@@ -51511,7 +51328,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66398">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="66521">
 <summary>
 Bind UDP sockets to the pulseaudio port.
 </summary>
@@ -51522,7 +51339,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66417">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66540">
 <summary>
 Make a TCP connection to the pulseaudio port.
 </summary>
@@ -51532,7 +51349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66437">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="66560">
 <summary>
 Send pulseaudio_client packets.
 </summary>
@@ -51543,7 +51360,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66456">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66579">
 <summary>
 Do not audit attempts to send pulseaudio_client packets.
 </summary>
@@ -51554,7 +51371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="66475">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="66598">
 <summary>
 Receive pulseaudio_client packets.
 </summary>
@@ -51565,7 +51382,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66494">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66617">
 <summary>
 Do not audit attempts to receive pulseaudio_client packets.
 </summary>
@@ -51576,7 +51393,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66513">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66636">
 <summary>
 Send and receive pulseaudio_client packets.
 </summary>
@@ -51587,7 +51404,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66529">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66652">
 <summary>
 Do not audit attempts to send and receive pulseaudio_client packets.
 </summary>
@@ -51598,7 +51415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66544">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66667">
 <summary>
 Relabel packets to pulseaudio_client the packet type.
 </summary>
@@ -51608,7 +51425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="66564">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="66687">
 <summary>
 Send pulseaudio_server packets.
 </summary>
@@ -51619,7 +51436,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66583">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66706">
 <summary>
 Do not audit attempts to send pulseaudio_server packets.
 </summary>
@@ -51630,7 +51447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="66602">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="66725">
 <summary>
 Receive pulseaudio_server packets.
 </summary>
@@ -51641,7 +51458,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66621">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66744">
 <summary>
 Do not audit attempts to receive pulseaudio_server packets.
 </summary>
@@ -51652,7 +51469,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66640">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66763">
 <summary>
 Send and receive pulseaudio_server packets.
 </summary>
@@ -51663,7 +51480,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66656">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66779">
 <summary>
 Do not audit attempts to send and receive pulseaudio_server packets.
 </summary>
@@ -51674,7 +51491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66671">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66794">
 <summary>
 Relabel packets to pulseaudio_server the packet type.
 </summary>
@@ -51684,7 +51501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66693">
+<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66816">
 <summary>
 Send and receive TCP traffic on the puppet port.
 </summary>
@@ -51695,7 +51512,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_puppet_port" lineno="66708">
+<interface name="corenet_udp_send_puppet_port" lineno="66831">
 <summary>
 Send UDP traffic on the puppet port.
 </summary>
@@ -51706,7 +51523,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66723">
+<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66846">
 <summary>
 Do not audit attempts to send UDP traffic on the puppet port.
 </summary>
@@ -51717,7 +51534,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="66738">
+<interface name="corenet_udp_receive_puppet_port" lineno="66861">
 <summary>
 Receive UDP traffic on the puppet port.
 </summary>
@@ -51728,7 +51545,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66753">
+<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66876">
 <summary>
 Do not audit attempts to receive UDP traffic on the puppet port.
 </summary>
@@ -51739,7 +51556,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="66768">
+<interface name="corenet_udp_sendrecv_puppet_port" lineno="66891">
 <summary>
 Send and receive UDP traffic on the puppet port.
 </summary>
@@ -51750,7 +51567,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66784">
+<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66907">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the puppet port.
@@ -51762,7 +51579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="66799">
+<interface name="corenet_tcp_bind_puppet_port" lineno="66922">
 <summary>
 Bind TCP sockets to the puppet port.
 </summary>
@@ -51773,7 +51590,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="66819">
+<interface name="corenet_udp_bind_puppet_port" lineno="66942">
 <summary>
 Bind UDP sockets to the puppet port.
 </summary>
@@ -51784,7 +51601,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="66838">
+<interface name="corenet_tcp_connect_puppet_port" lineno="66961">
 <summary>
 Make a TCP connection to the puppet port.
 </summary>
@@ -51794,7 +51611,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_client_packets" lineno="66858">
+<interface name="corenet_send_puppet_client_packets" lineno="66981">
 <summary>
 Send puppet_client packets.
 </summary>
@@ -51805,7 +51622,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="66877">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67000">
 <summary>
 Do not audit attempts to send puppet_client packets.
 </summary>
@@ -51816,7 +51633,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="66896">
+<interface name="corenet_receive_puppet_client_packets" lineno="67019">
 <summary>
 Receive puppet_client packets.
 </summary>
@@ -51827,7 +51644,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="66915">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67038">
 <summary>
 Do not audit attempts to receive puppet_client packets.
 </summary>
@@ -51838,7 +51655,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="66934">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="67057">
 <summary>
 Send and receive puppet_client packets.
 </summary>
@@ -51849,7 +51666,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="66950">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67073">
 <summary>
 Do not audit attempts to send and receive puppet_client packets.
 </summary>
@@ -51860,7 +51677,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="66965">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="67088">
 <summary>
 Relabel packets to puppet_client the packet type.
 </summary>
@@ -51870,7 +51687,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_server_packets" lineno="66985">
+<interface name="corenet_send_puppet_server_packets" lineno="67108">
 <summary>
 Send puppet_server packets.
 </summary>
@@ -51881,7 +51698,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67004">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67127">
 <summary>
 Do not audit attempts to send puppet_server packets.
 </summary>
@@ -51892,7 +51709,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67023">
+<interface name="corenet_receive_puppet_server_packets" lineno="67146">
 <summary>
 Receive puppet_server packets.
 </summary>
@@ -51903,7 +51720,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67042">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67165">
 <summary>
 Do not audit attempts to receive puppet_server packets.
 </summary>
@@ -51914,7 +51731,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67061">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="67184">
 <summary>
 Send and receive puppet_server packets.
 </summary>
@@ -51925,7 +51742,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67077">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67200">
 <summary>
 Do not audit attempts to send and receive puppet_server packets.
 </summary>
@@ -51936,7 +51753,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67092">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="67215">
 <summary>
 Relabel packets to puppet_server the packet type.
 </summary>
@@ -51946,7 +51763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67114">
+<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67237">
 <summary>
 Send and receive TCP traffic on the puppetclient port.
 </summary>
@@ -51957,7 +51774,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67129">
+<interface name="corenet_udp_send_puppetclient_port" lineno="67252">
 <summary>
 Send UDP traffic on the puppetclient port.
 </summary>
@@ -51968,7 +51785,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67144">
+<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67267">
 <summary>
 Do not audit attempts to send UDP traffic on the puppetclient port.
 </summary>
@@ -51979,7 +51796,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67159">
+<interface name="corenet_udp_receive_puppetclient_port" lineno="67282">
 <summary>
 Receive UDP traffic on the puppetclient port.
 </summary>
@@ -51990,7 +51807,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67174">
+<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67297">
 <summary>
 Do not audit attempts to receive UDP traffic on the puppetclient port.
 </summary>
@@ -52001,7 +51818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67189">
+<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67312">
 <summary>
 Send and receive UDP traffic on the puppetclient port.
 </summary>
@@ -52012,7 +51829,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67205">
+<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67328">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the puppetclient port.
@@ -52024,7 +51841,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67220">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="67343">
 <summary>
 Bind TCP sockets to the puppetclient port.
 </summary>
@@ -52035,7 +51852,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67240">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="67363">
 <summary>
 Bind UDP sockets to the puppetclient port.
 </summary>
@@ -52046,7 +51863,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67259">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="67382">
 <summary>
 Make a TCP connection to the puppetclient port.
 </summary>
@@ -52056,7 +51873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67279">
+<interface name="corenet_send_puppetclient_client_packets" lineno="67402">
 <summary>
 Send puppetclient_client packets.
 </summary>
@@ -52067,7 +51884,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67298">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67421">
 <summary>
 Do not audit attempts to send puppetclient_client packets.
 </summary>
@@ -52078,7 +51895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67317">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="67440">
 <summary>
 Receive puppetclient_client packets.
 </summary>
@@ -52089,7 +51906,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67336">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67459">
 <summary>
 Do not audit attempts to receive puppetclient_client packets.
 </summary>
@@ -52100,7 +51917,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67355">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67478">
 <summary>
 Send and receive puppetclient_client packets.
 </summary>
@@ -52111,7 +51928,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67371">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67494">
 <summary>
 Do not audit attempts to send and receive puppetclient_client packets.
 </summary>
@@ -52122,7 +51939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67386">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67509">
 <summary>
 Relabel packets to puppetclient_client the packet type.
 </summary>
@@ -52132,7 +51949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67406">
+<interface name="corenet_send_puppetclient_server_packets" lineno="67529">
 <summary>
 Send puppetclient_server packets.
 </summary>
@@ -52143,7 +51960,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67425">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67548">
 <summary>
 Do not audit attempts to send puppetclient_server packets.
 </summary>
@@ -52154,7 +51971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="67444">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="67567">
 <summary>
 Receive puppetclient_server packets.
 </summary>
@@ -52165,7 +51982,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67463">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67586">
 <summary>
 Do not audit attempts to receive puppetclient_server packets.
 </summary>
@@ -52176,7 +51993,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67482">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67605">
 <summary>
 Send and receive puppetclient_server packets.
 </summary>
@@ -52187,7 +52004,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67498">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67621">
 <summary>
 Do not audit attempts to send and receive puppetclient_server packets.
 </summary>
@@ -52198,7 +52015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67513">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67636">
 <summary>
 Relabel packets to puppetclient_server the packet type.
 </summary>
@@ -52208,7 +52025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67535">
+<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67658">
 <summary>
 Send and receive TCP traffic on the pxe port.
 </summary>
@@ -52219,7 +52036,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pxe_port" lineno="67550">
+<interface name="corenet_udp_send_pxe_port" lineno="67673">
 <summary>
 Send UDP traffic on the pxe port.
 </summary>
@@ -52230,7 +52047,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67565">
+<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67688">
 <summary>
 Do not audit attempts to send UDP traffic on the pxe port.
 </summary>
@@ -52241,7 +52058,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="67580">
+<interface name="corenet_udp_receive_pxe_port" lineno="67703">
 <summary>
 Receive UDP traffic on the pxe port.
 </summary>
@@ -52252,7 +52069,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67595">
+<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67718">
 <summary>
 Do not audit attempts to receive UDP traffic on the pxe port.
 </summary>
@@ -52263,7 +52080,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="67610">
+<interface name="corenet_udp_sendrecv_pxe_port" lineno="67733">
 <summary>
 Send and receive UDP traffic on the pxe port.
 </summary>
@@ -52274,7 +52091,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67626">
+<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67749">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pxe port.
@@ -52286,7 +52103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="67641">
+<interface name="corenet_tcp_bind_pxe_port" lineno="67764">
 <summary>
 Bind TCP sockets to the pxe port.
 </summary>
@@ -52297,7 +52114,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="67661">
+<interface name="corenet_udp_bind_pxe_port" lineno="67784">
 <summary>
 Bind UDP sockets to the pxe port.
 </summary>
@@ -52308,7 +52125,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="67680">
+<interface name="corenet_tcp_connect_pxe_port" lineno="67803">
 <summary>
 Make a TCP connection to the pxe port.
 </summary>
@@ -52318,7 +52135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_client_packets" lineno="67700">
+<interface name="corenet_send_pxe_client_packets" lineno="67823">
 <summary>
 Send pxe_client packets.
 </summary>
@@ -52329,7 +52146,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67719">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67842">
 <summary>
 Do not audit attempts to send pxe_client packets.
 </summary>
@@ -52340,7 +52157,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="67738">
+<interface name="corenet_receive_pxe_client_packets" lineno="67861">
 <summary>
 Receive pxe_client packets.
 </summary>
@@ -52351,7 +52168,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67757">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67880">
 <summary>
 Do not audit attempts to receive pxe_client packets.
 </summary>
@@ -52362,7 +52179,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="67776">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="67899">
 <summary>
 Send and receive pxe_client packets.
 </summary>
@@ -52373,7 +52190,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67792">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67915">
 <summary>
 Do not audit attempts to send and receive pxe_client packets.
 </summary>
@@ -52384,7 +52201,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="67807">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="67930">
 <summary>
 Relabel packets to pxe_client the packet type.
 </summary>
@@ -52394,7 +52211,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_server_packets" lineno="67827">
+<interface name="corenet_send_pxe_server_packets" lineno="67950">
 <summary>
 Send pxe_server packets.
 </summary>
@@ -52405,7 +52222,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67846">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67969">
 <summary>
 Do not audit attempts to send pxe_server packets.
 </summary>
@@ -52416,7 +52233,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="67865">
+<interface name="corenet_receive_pxe_server_packets" lineno="67988">
 <summary>
 Receive pxe_server packets.
 </summary>
@@ -52427,7 +52244,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="67884">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68007">
 <summary>
 Do not audit attempts to receive pxe_server packets.
 </summary>
@@ -52438,7 +52255,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="67903">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="68026">
 <summary>
 Send and receive pxe_server packets.
 </summary>
@@ -52449,7 +52266,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="67919">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68042">
 <summary>
 Do not audit attempts to send and receive pxe_server packets.
 </summary>
@@ -52460,7 +52277,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="67934">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="68057">
 <summary>
 Relabel packets to pxe_server the packet type.
 </summary>
@@ -52470,7 +52287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="67956">
+<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68079">
 <summary>
 Send and receive TCP traffic on the pyzor port.
 </summary>
@@ -52481,7 +52298,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="67971">
+<interface name="corenet_udp_send_pyzor_port" lineno="68094">
 <summary>
 Send UDP traffic on the pyzor port.
 </summary>
@@ -52492,7 +52309,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="67986">
+<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68109">
 <summary>
 Do not audit attempts to send UDP traffic on the pyzor port.
 </summary>
@@ -52503,7 +52320,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68001">
+<interface name="corenet_udp_receive_pyzor_port" lineno="68124">
 <summary>
 Receive UDP traffic on the pyzor port.
 </summary>
@@ -52514,7 +52331,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68016">
+<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68139">
 <summary>
 Do not audit attempts to receive UDP traffic on the pyzor port.
 </summary>
@@ -52525,7 +52342,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68031">
+<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68154">
 <summary>
 Send and receive UDP traffic on the pyzor port.
 </summary>
@@ -52536,7 +52353,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68047">
+<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68170">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pyzor port.
@@ -52548,7 +52365,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68062">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="68185">
 <summary>
 Bind TCP sockets to the pyzor port.
 </summary>
@@ -52559,7 +52376,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68082">
+<interface name="corenet_udp_bind_pyzor_port" lineno="68205">
 <summary>
 Bind UDP sockets to the pyzor port.
 </summary>
@@ -52570,7 +52387,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68101">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="68224">
 <summary>
 Make a TCP connection to the pyzor port.
 </summary>
@@ -52580,7 +52397,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68121">
+<interface name="corenet_send_pyzor_client_packets" lineno="68244">
 <summary>
 Send pyzor_client packets.
 </summary>
@@ -52591,7 +52408,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68140">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68263">
 <summary>
 Do not audit attempts to send pyzor_client packets.
 </summary>
@@ -52602,7 +52419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68159">
+<interface name="corenet_receive_pyzor_client_packets" lineno="68282">
 <summary>
 Receive pyzor_client packets.
 </summary>
@@ -52613,7 +52430,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68178">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68301">
 <summary>
 Do not audit attempts to receive pyzor_client packets.
 </summary>
@@ -52624,7 +52441,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68197">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68320">
 <summary>
 Send and receive pyzor_client packets.
 </summary>
@@ -52635,7 +52452,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68213">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68336">
 <summary>
 Do not audit attempts to send and receive pyzor_client packets.
 </summary>
@@ -52646,7 +52463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68228">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="68351">
 <summary>
 Relabel packets to pyzor_client the packet type.
 </summary>
@@ -52656,7 +52473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68248">
+<interface name="corenet_send_pyzor_server_packets" lineno="68371">
 <summary>
 Send pyzor_server packets.
 </summary>
@@ -52667,7 +52484,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68267">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68390">
 <summary>
 Do not audit attempts to send pyzor_server packets.
 </summary>
@@ -52678,7 +52495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68286">
+<interface name="corenet_receive_pyzor_server_packets" lineno="68409">
 <summary>
 Receive pyzor_server packets.
 </summary>
@@ -52689,7 +52506,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68305">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68428">
 <summary>
 Do not audit attempts to receive pyzor_server packets.
 </summary>
@@ -52700,7 +52517,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68324">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68447">
 <summary>
 Send and receive pyzor_server packets.
 </summary>
@@ -52711,7 +52528,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68340">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68463">
 <summary>
 Do not audit attempts to send and receive pyzor_server packets.
 </summary>
@@ -52722,7 +52539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68355">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="68478">
 <summary>
 Relabel packets to pyzor_server the packet type.
 </summary>
@@ -52732,7 +52549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68377">
+<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68500">
 <summary>
 Send and receive TCP traffic on the radacct port.
 </summary>
@@ -52743,7 +52560,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68392">
+<interface name="corenet_udp_send_radacct_port" lineno="68515">
 <summary>
 Send UDP traffic on the radacct port.
 </summary>
@@ -52754,7 +52571,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68407">
+<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68530">
 <summary>
 Do not audit attempts to send UDP traffic on the radacct port.
 </summary>
@@ -52765,7 +52582,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68422">
+<interface name="corenet_udp_receive_radacct_port" lineno="68545">
 <summary>
 Receive UDP traffic on the radacct port.
 </summary>
@@ -52776,7 +52593,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68437">
+<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68560">
 <summary>
 Do not audit attempts to receive UDP traffic on the radacct port.
 </summary>
@@ -52787,7 +52604,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="68452">
+<interface name="corenet_udp_sendrecv_radacct_port" lineno="68575">
 <summary>
 Send and receive UDP traffic on the radacct port.
 </summary>
@@ -52798,7 +52615,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68468">
+<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68591">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radacct port.
@@ -52810,7 +52627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="68483">
+<interface name="corenet_tcp_bind_radacct_port" lineno="68606">
 <summary>
 Bind TCP sockets to the radacct port.
 </summary>
@@ -52821,7 +52638,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="68503">
+<interface name="corenet_udp_bind_radacct_port" lineno="68626">
 <summary>
 Bind UDP sockets to the radacct port.
 </summary>
@@ -52832,7 +52649,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="68522">
+<interface name="corenet_tcp_connect_radacct_port" lineno="68645">
 <summary>
 Make a TCP connection to the radacct port.
 </summary>
@@ -52842,7 +52659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_client_packets" lineno="68542">
+<interface name="corenet_send_radacct_client_packets" lineno="68665">
 <summary>
 Send radacct_client packets.
 </summary>
@@ -52853,7 +52670,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68561">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68684">
 <summary>
 Do not audit attempts to send radacct_client packets.
 </summary>
@@ -52864,7 +52681,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="68580">
+<interface name="corenet_receive_radacct_client_packets" lineno="68703">
 <summary>
 Receive radacct_client packets.
 </summary>
@@ -52875,7 +52692,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68599">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68722">
 <summary>
 Do not audit attempts to receive radacct_client packets.
 </summary>
@@ -52886,7 +52703,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="68618">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="68741">
 <summary>
 Send and receive radacct_client packets.
 </summary>
@@ -52897,7 +52714,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68634">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68757">
 <summary>
 Do not audit attempts to send and receive radacct_client packets.
 </summary>
@@ -52908,7 +52725,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="68649">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="68772">
 <summary>
 Relabel packets to radacct_client the packet type.
 </summary>
@@ -52918,7 +52735,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_server_packets" lineno="68669">
+<interface name="corenet_send_radacct_server_packets" lineno="68792">
 <summary>
 Send radacct_server packets.
 </summary>
@@ -52929,7 +52746,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68688">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68811">
 <summary>
 Do not audit attempts to send radacct_server packets.
 </summary>
@@ -52940,7 +52757,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="68707">
+<interface name="corenet_receive_radacct_server_packets" lineno="68830">
 <summary>
 Receive radacct_server packets.
 </summary>
@@ -52951,7 +52768,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68726">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68849">
 <summary>
 Do not audit attempts to receive radacct_server packets.
 </summary>
@@ -52962,7 +52779,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="68745">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="68868">
 <summary>
 Send and receive radacct_server packets.
 </summary>
@@ -52973,7 +52790,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68761">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68884">
 <summary>
 Do not audit attempts to send and receive radacct_server packets.
 </summary>
@@ -52984,7 +52801,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="68776">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="68899">
 <summary>
 Relabel packets to radacct_server the packet type.
 </summary>
@@ -52994,7 +52811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="68798">
+<interface name="corenet_tcp_sendrecv_radius_port" lineno="68921">
 <summary>
 Send and receive TCP traffic on the radius port.
 </summary>
@@ -53005,7 +52822,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radius_port" lineno="68813">
+<interface name="corenet_udp_send_radius_port" lineno="68936">
 <summary>
 Send UDP traffic on the radius port.
 </summary>
@@ -53016,7 +52833,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68828">
+<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68951">
 <summary>
 Do not audit attempts to send UDP traffic on the radius port.
 </summary>
@@ -53027,7 +52844,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radius_port" lineno="68843">
+<interface name="corenet_udp_receive_radius_port" lineno="68966">
 <summary>
 Receive UDP traffic on the radius port.
 </summary>
@@ -53038,7 +52855,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68858">
+<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68981">
 <summary>
 Do not audit attempts to receive UDP traffic on the radius port.
 </summary>
@@ -53049,7 +52866,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="68873">
+<interface name="corenet_udp_sendrecv_radius_port" lineno="68996">
 <summary>
 Send and receive UDP traffic on the radius port.
 </summary>
@@ -53060,7 +52877,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="68889">
+<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69012">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radius port.
@@ -53072,7 +52889,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="68904">
+<interface name="corenet_tcp_bind_radius_port" lineno="69027">
 <summary>
 Bind TCP sockets to the radius port.
 </summary>
@@ -53083,7 +52900,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radius_port" lineno="68924">
+<interface name="corenet_udp_bind_radius_port" lineno="69047">
 <summary>
 Bind UDP sockets to the radius port.
 </summary>
@@ -53094,7 +52911,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="68943">
+<interface name="corenet_tcp_connect_radius_port" lineno="69066">
 <summary>
 Make a TCP connection to the radius port.
 </summary>
@@ -53104,7 +52921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_client_packets" lineno="68963">
+<interface name="corenet_send_radius_client_packets" lineno="69086">
 <summary>
 Send radius_client packets.
 </summary>
@@ -53115,7 +52932,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="68982">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69105">
 <summary>
 Do not audit attempts to send radius_client packets.
 </summary>
@@ -53126,7 +52943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69001">
+<interface name="corenet_receive_radius_client_packets" lineno="69124">
 <summary>
 Receive radius_client packets.
 </summary>
@@ -53137,7 +52954,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69020">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69143">
 <summary>
 Do not audit attempts to receive radius_client packets.
 </summary>
@@ -53148,7 +52965,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69039">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="69162">
 <summary>
 Send and receive radius_client packets.
 </summary>
@@ -53159,7 +52976,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69055">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69178">
 <summary>
 Do not audit attempts to send and receive radius_client packets.
 </summary>
@@ -53170,7 +52987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69070">
+<interface name="corenet_relabelto_radius_client_packets" lineno="69193">
 <summary>
 Relabel packets to radius_client the packet type.
 </summary>
@@ -53180,7 +52997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_server_packets" lineno="69090">
+<interface name="corenet_send_radius_server_packets" lineno="69213">
 <summary>
 Send radius_server packets.
 </summary>
@@ -53191,7 +53008,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69109">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69232">
 <summary>
 Do not audit attempts to send radius_server packets.
 </summary>
@@ -53202,7 +53019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69128">
+<interface name="corenet_receive_radius_server_packets" lineno="69251">
 <summary>
 Receive radius_server packets.
 </summary>
@@ -53213,7 +53030,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69147">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69270">
 <summary>
 Do not audit attempts to receive radius_server packets.
 </summary>
@@ -53224,7 +53041,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69166">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="69289">
 <summary>
 Send and receive radius_server packets.
 </summary>
@@ -53235,7 +53052,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69182">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69305">
 <summary>
 Do not audit attempts to send and receive radius_server packets.
 </summary>
@@ -53246,7 +53063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69197">
+<interface name="corenet_relabelto_radius_server_packets" lineno="69320">
 <summary>
 Relabel packets to radius_server the packet type.
 </summary>
@@ -53256,7 +53073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69219">
+<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69342">
 <summary>
 Send and receive TCP traffic on the radsec port.
 </summary>
@@ -53267,7 +53084,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69234">
+<interface name="corenet_udp_send_radsec_port" lineno="69357">
 <summary>
 Send UDP traffic on the radsec port.
 </summary>
@@ -53278,7 +53095,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69249">
+<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69372">
 <summary>
 Do not audit attempts to send UDP traffic on the radsec port.
 </summary>
@@ -53289,7 +53106,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69264">
+<interface name="corenet_udp_receive_radsec_port" lineno="69387">
 <summary>
 Receive UDP traffic on the radsec port.
 </summary>
@@ -53300,7 +53117,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69279">
+<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69402">
 <summary>
 Do not audit attempts to receive UDP traffic on the radsec port.
 </summary>
@@ -53311,7 +53128,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69294">
+<interface name="corenet_udp_sendrecv_radsec_port" lineno="69417">
 <summary>
 Send and receive UDP traffic on the radsec port.
 </summary>
@@ -53322,7 +53139,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69310">
+<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69433">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radsec port.
@@ -53334,7 +53151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69325">
+<interface name="corenet_tcp_bind_radsec_port" lineno="69448">
 <summary>
 Bind TCP sockets to the radsec port.
 </summary>
@@ -53345,7 +53162,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69345">
+<interface name="corenet_udp_bind_radsec_port" lineno="69468">
 <summary>
 Bind UDP sockets to the radsec port.
 </summary>
@@ -53356,7 +53173,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69364">
+<interface name="corenet_tcp_connect_radsec_port" lineno="69487">
 <summary>
 Make a TCP connection to the radsec port.
 </summary>
@@ -53366,7 +53183,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69384">
+<interface name="corenet_send_radsec_client_packets" lineno="69507">
 <summary>
 Send radsec_client packets.
 </summary>
@@ -53377,7 +53194,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69403">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69526">
 <summary>
 Do not audit attempts to send radsec_client packets.
 </summary>
@@ -53388,7 +53205,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69422">
+<interface name="corenet_receive_radsec_client_packets" lineno="69545">
 <summary>
 Receive radsec_client packets.
 </summary>
@@ -53399,7 +53216,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69441">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69564">
 <summary>
 Do not audit attempts to receive radsec_client packets.
 </summary>
@@ -53410,7 +53227,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="69460">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="69583">
 <summary>
 Send and receive radsec_client packets.
 </summary>
@@ -53421,7 +53238,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69476">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69599">
 <summary>
 Do not audit attempts to send and receive radsec_client packets.
 </summary>
@@ -53432,7 +53249,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="69491">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="69614">
 <summary>
 Relabel packets to radsec_client the packet type.
 </summary>
@@ -53442,7 +53259,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_server_packets" lineno="69511">
+<interface name="corenet_send_radsec_server_packets" lineno="69634">
 <summary>
 Send radsec_server packets.
 </summary>
@@ -53453,7 +53270,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69530">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69653">
 <summary>
 Do not audit attempts to send radsec_server packets.
 </summary>
@@ -53464,7 +53281,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="69549">
+<interface name="corenet_receive_radsec_server_packets" lineno="69672">
 <summary>
 Receive radsec_server packets.
 </summary>
@@ -53475,7 +53292,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69568">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69691">
 <summary>
 Do not audit attempts to receive radsec_server packets.
 </summary>
@@ -53486,7 +53303,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="69587">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="69710">
 <summary>
 Send and receive radsec_server packets.
 </summary>
@@ -53497,7 +53314,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69603">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69726">
 <summary>
 Do not audit attempts to send and receive radsec_server packets.
 </summary>
@@ -53508,7 +53325,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="69618">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="69741">
 <summary>
 Relabel packets to radsec_server the packet type.
 </summary>
@@ -53518,7 +53335,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="69640">
+<interface name="corenet_tcp_sendrecv_razor_port" lineno="69763">
 <summary>
 Send and receive TCP traffic on the razor port.
 </summary>
@@ -53529,7 +53346,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_razor_port" lineno="69655">
+<interface name="corenet_udp_send_razor_port" lineno="69778">
 <summary>
 Send UDP traffic on the razor port.
 </summary>
@@ -53540,7 +53357,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69670">
+<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69793">
 <summary>
 Do not audit attempts to send UDP traffic on the razor port.
 </summary>
@@ -53551,7 +53368,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_razor_port" lineno="69685">
+<interface name="corenet_udp_receive_razor_port" lineno="69808">
 <summary>
 Receive UDP traffic on the razor port.
 </summary>
@@ -53562,7 +53379,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69700">
+<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69823">
 <summary>
 Do not audit attempts to receive UDP traffic on the razor port.
 </summary>
@@ -53573,7 +53390,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="69715">
+<interface name="corenet_udp_sendrecv_razor_port" lineno="69838">
 <summary>
 Send and receive UDP traffic on the razor port.
 </summary>
@@ -53584,7 +53401,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69731">
+<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69854">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the razor port.
@@ -53596,7 +53413,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="69746">
+<interface name="corenet_tcp_bind_razor_port" lineno="69869">
 <summary>
 Bind TCP sockets to the razor port.
 </summary>
@@ -53607,7 +53424,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_razor_port" lineno="69766">
+<interface name="corenet_udp_bind_razor_port" lineno="69889">
 <summary>
 Bind UDP sockets to the razor port.
 </summary>
@@ -53618,7 +53435,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="69785">
+<interface name="corenet_tcp_connect_razor_port" lineno="69908">
 <summary>
 Make a TCP connection to the razor port.
 </summary>
@@ -53628,7 +53445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_client_packets" lineno="69805">
+<interface name="corenet_send_razor_client_packets" lineno="69928">
 <summary>
 Send razor_client packets.
 </summary>
@@ -53639,7 +53456,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69824">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69947">
 <summary>
 Do not audit attempts to send razor_client packets.
 </summary>
@@ -53650,7 +53467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_client_packets" lineno="69843">
+<interface name="corenet_receive_razor_client_packets" lineno="69966">
 <summary>
 Receive razor_client packets.
 </summary>
@@ -53661,7 +53478,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69862">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69985">
 <summary>
 Do not audit attempts to receive razor_client packets.
 </summary>
@@ -53672,7 +53489,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="69881">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="70004">
 <summary>
 Send and receive razor_client packets.
 </summary>
@@ -53683,7 +53500,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="69897">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70020">
 <summary>
 Do not audit attempts to send and receive razor_client packets.
 </summary>
@@ -53694,7 +53511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="69912">
+<interface name="corenet_relabelto_razor_client_packets" lineno="70035">
 <summary>
 Relabel packets to razor_client the packet type.
 </summary>
@@ -53704,7 +53521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_server_packets" lineno="69932">
+<interface name="corenet_send_razor_server_packets" lineno="70055">
 <summary>
 Send razor_server packets.
 </summary>
@@ -53715,7 +53532,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="69951">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70074">
 <summary>
 Do not audit attempts to send razor_server packets.
 </summary>
@@ -53726,7 +53543,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_server_packets" lineno="69970">
+<interface name="corenet_receive_razor_server_packets" lineno="70093">
 <summary>
 Receive razor_server packets.
 </summary>
@@ -53737,7 +53554,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="69989">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70112">
 <summary>
 Do not audit attempts to receive razor_server packets.
 </summary>
@@ -53748,7 +53565,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70008">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="70131">
 <summary>
 Send and receive razor_server packets.
 </summary>
@@ -53759,7 +53576,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70024">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70147">
 <summary>
 Do not audit attempts to send and receive razor_server packets.
 </summary>
@@ -53770,7 +53587,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70039">
+<interface name="corenet_relabelto_razor_server_packets" lineno="70162">
 <summary>
 Relabel packets to razor_server the packet type.
 </summary>
@@ -53780,7 +53597,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70061">
+<interface name="corenet_tcp_sendrecv_redis_port" lineno="70184">
 <summary>
 Send and receive TCP traffic on the redis port.
 </summary>
@@ -53791,7 +53608,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_redis_port" lineno="70076">
+<interface name="corenet_udp_send_redis_port" lineno="70199">
 <summary>
 Send UDP traffic on the redis port.
 </summary>
@@ -53802,7 +53619,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70091">
+<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70214">
 <summary>
 Do not audit attempts to send UDP traffic on the redis port.
 </summary>
@@ -53813,7 +53630,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70106">
+<interface name="corenet_udp_receive_redis_port" lineno="70229">
 <summary>
 Receive UDP traffic on the redis port.
 </summary>
@@ -53824,7 +53641,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70121">
+<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70244">
 <summary>
 Do not audit attempts to receive UDP traffic on the redis port.
 </summary>
@@ -53835,7 +53652,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70136">
+<interface name="corenet_udp_sendrecv_redis_port" lineno="70259">
 <summary>
 Send and receive UDP traffic on the redis port.
 </summary>
@@ -53846,7 +53663,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70152">
+<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70275">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the redis port.
@@ -53858,7 +53675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70167">
+<interface name="corenet_tcp_bind_redis_port" lineno="70290">
 <summary>
 Bind TCP sockets to the redis port.
 </summary>
@@ -53869,7 +53686,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70187">
+<interface name="corenet_udp_bind_redis_port" lineno="70310">
 <summary>
 Bind UDP sockets to the redis port.
 </summary>
@@ -53880,7 +53697,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70206">
+<interface name="corenet_tcp_connect_redis_port" lineno="70329">
 <summary>
 Make a TCP connection to the redis port.
 </summary>
@@ -53890,7 +53707,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_client_packets" lineno="70226">
+<interface name="corenet_send_redis_client_packets" lineno="70349">
 <summary>
 Send redis_client packets.
 </summary>
@@ -53901,7 +53718,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70245">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70368">
 <summary>
 Do not audit attempts to send redis_client packets.
 </summary>
@@ -53912,7 +53729,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70264">
+<interface name="corenet_receive_redis_client_packets" lineno="70387">
 <summary>
 Receive redis_client packets.
 </summary>
@@ -53923,7 +53740,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70283">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70406">
 <summary>
 Do not audit attempts to receive redis_client packets.
 </summary>
@@ -53934,7 +53751,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70302">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="70425">
 <summary>
 Send and receive redis_client packets.
 </summary>
@@ -53945,7 +53762,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70318">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70441">
 <summary>
 Do not audit attempts to send and receive redis_client packets.
 </summary>
@@ -53956,7 +53773,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70333">
+<interface name="corenet_relabelto_redis_client_packets" lineno="70456">
 <summary>
 Relabel packets to redis_client the packet type.
 </summary>
@@ -53966,7 +53783,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_server_packets" lineno="70353">
+<interface name="corenet_send_redis_server_packets" lineno="70476">
 <summary>
 Send redis_server packets.
 </summary>
@@ -53977,7 +53794,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70372">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70495">
 <summary>
 Do not audit attempts to send redis_server packets.
 </summary>
@@ -53988,7 +53805,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70391">
+<interface name="corenet_receive_redis_server_packets" lineno="70514">
 <summary>
 Receive redis_server packets.
 </summary>
@@ -53999,7 +53816,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70410">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70533">
 <summary>
 Do not audit attempts to receive redis_server packets.
 </summary>
@@ -54010,7 +53827,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70429">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="70552">
 <summary>
 Send and receive redis_server packets.
 </summary>
@@ -54021,7 +53838,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70445">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70568">
 <summary>
 Do not audit attempts to send and receive redis_server packets.
 </summary>
@@ -54032,7 +53849,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="70460">
+<interface name="corenet_relabelto_redis_server_packets" lineno="70583">
 <summary>
 Relabel packets to redis_server the packet type.
 </summary>
@@ -54042,7 +53859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="70482">
+<interface name="corenet_tcp_sendrecv_repository_port" lineno="70605">
 <summary>
 Send and receive TCP traffic on the repository port.
 </summary>
@@ -54053,7 +53870,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_repository_port" lineno="70497">
+<interface name="corenet_udp_send_repository_port" lineno="70620">
 <summary>
 Send UDP traffic on the repository port.
 </summary>
@@ -54064,7 +53881,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70512">
+<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70635">
 <summary>
 Do not audit attempts to send UDP traffic on the repository port.
 </summary>
@@ -54075,7 +53892,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_repository_port" lineno="70527">
+<interface name="corenet_udp_receive_repository_port" lineno="70650">
 <summary>
 Receive UDP traffic on the repository port.
 </summary>
@@ -54086,7 +53903,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70542">
+<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70665">
 <summary>
 Do not audit attempts to receive UDP traffic on the repository port.
 </summary>
@@ -54097,7 +53914,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="70557">
+<interface name="corenet_udp_sendrecv_repository_port" lineno="70680">
 <summary>
 Send and receive UDP traffic on the repository port.
 </summary>
@@ -54108,7 +53925,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70573">
+<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70696">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the repository port.
@@ -54120,7 +53937,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="70588">
+<interface name="corenet_tcp_bind_repository_port" lineno="70711">
 <summary>
 Bind TCP sockets to the repository port.
 </summary>
@@ -54131,7 +53948,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_repository_port" lineno="70608">
+<interface name="corenet_udp_bind_repository_port" lineno="70731">
 <summary>
 Bind UDP sockets to the repository port.
 </summary>
@@ -54142,7 +53959,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="70627">
+<interface name="corenet_tcp_connect_repository_port" lineno="70750">
 <summary>
 Make a TCP connection to the repository port.
 </summary>
@@ -54152,7 +53969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_client_packets" lineno="70647">
+<interface name="corenet_send_repository_client_packets" lineno="70770">
 <summary>
 Send repository_client packets.
 </summary>
@@ -54163,7 +53980,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70666">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70789">
 <summary>
 Do not audit attempts to send repository_client packets.
 </summary>
@@ -54174,7 +53991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_client_packets" lineno="70685">
+<interface name="corenet_receive_repository_client_packets" lineno="70808">
 <summary>
 Receive repository_client packets.
 </summary>
@@ -54185,7 +54002,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70704">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70827">
 <summary>
 Do not audit attempts to receive repository_client packets.
 </summary>
@@ -54196,7 +54013,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="70723">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="70846">
 <summary>
 Send and receive repository_client packets.
 </summary>
@@ -54207,7 +54024,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70739">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70862">
 <summary>
 Do not audit attempts to send and receive repository_client packets.
 </summary>
@@ -54218,7 +54035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="70754">
+<interface name="corenet_relabelto_repository_client_packets" lineno="70877">
 <summary>
 Relabel packets to repository_client the packet type.
 </summary>
@@ -54228,7 +54045,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_server_packets" lineno="70774">
+<interface name="corenet_send_repository_server_packets" lineno="70897">
 <summary>
 Send repository_server packets.
 </summary>
@@ -54239,7 +54056,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70793">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70916">
 <summary>
 Do not audit attempts to send repository_server packets.
 </summary>
@@ -54250,7 +54067,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_server_packets" lineno="70812">
+<interface name="corenet_receive_repository_server_packets" lineno="70935">
 <summary>
 Receive repository_server packets.
 </summary>
@@ -54261,7 +54078,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70831">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70954">
 <summary>
 Do not audit attempts to receive repository_server packets.
 </summary>
@@ -54272,7 +54089,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="70850">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="70973">
 <summary>
 Send and receive repository_server packets.
 </summary>
@@ -54283,7 +54100,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70866">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70989">
 <summary>
 Do not audit attempts to send and receive repository_server packets.
 </summary>
@@ -54294,7 +54111,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="70881">
+<interface name="corenet_relabelto_repository_server_packets" lineno="71004">
 <summary>
 Relabel packets to repository_server the packet type.
 </summary>
@@ -54304,7 +54121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="70903">
+<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71026">
 <summary>
 Send and receive TCP traffic on the ricci port.
 </summary>
@@ -54315,7 +54132,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ricci_port" lineno="70918">
+<interface name="corenet_udp_send_ricci_port" lineno="71041">
 <summary>
 Send UDP traffic on the ricci port.
 </summary>
@@ -54326,7 +54143,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="70933">
+<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71056">
 <summary>
 Do not audit attempts to send UDP traffic on the ricci port.
 </summary>
@@ -54337,7 +54154,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="70948">
+<interface name="corenet_udp_receive_ricci_port" lineno="71071">
 <summary>
 Receive UDP traffic on the ricci port.
 </summary>
@@ -54348,7 +54165,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="70963">
+<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71086">
 <summary>
 Do not audit attempts to receive UDP traffic on the ricci port.
 </summary>
@@ -54359,7 +54176,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="70978">
+<interface name="corenet_udp_sendrecv_ricci_port" lineno="71101">
 <summary>
 Send and receive UDP traffic on the ricci port.
 </summary>
@@ -54370,7 +54187,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="70994">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71117">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ricci port.
@@ -54382,7 +54199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71009">
+<interface name="corenet_tcp_bind_ricci_port" lineno="71132">
 <summary>
 Bind TCP sockets to the ricci port.
 </summary>
@@ -54393,7 +54210,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71029">
+<interface name="corenet_udp_bind_ricci_port" lineno="71152">
 <summary>
 Bind UDP sockets to the ricci port.
 </summary>
@@ -54404,7 +54221,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71048">
+<interface name="corenet_tcp_connect_ricci_port" lineno="71171">
 <summary>
 Make a TCP connection to the ricci port.
 </summary>
@@ -54414,7 +54231,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71068">
+<interface name="corenet_send_ricci_client_packets" lineno="71191">
 <summary>
 Send ricci_client packets.
 </summary>
@@ -54425,7 +54242,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71087">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71210">
 <summary>
 Do not audit attempts to send ricci_client packets.
 </summary>
@@ -54436,7 +54253,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71106">
+<interface name="corenet_receive_ricci_client_packets" lineno="71229">
 <summary>
 Receive ricci_client packets.
 </summary>
@@ -54447,7 +54264,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71125">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71248">
 <summary>
 Do not audit attempts to receive ricci_client packets.
 </summary>
@@ -54458,7 +54275,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71144">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="71267">
 <summary>
 Send and receive ricci_client packets.
 </summary>
@@ -54469,7 +54286,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71160">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71283">
 <summary>
 Do not audit attempts to send and receive ricci_client packets.
 </summary>
@@ -54480,7 +54297,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71175">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="71298">
 <summary>
 Relabel packets to ricci_client the packet type.
 </summary>
@@ -54490,7 +54307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71195">
+<interface name="corenet_send_ricci_server_packets" lineno="71318">
 <summary>
 Send ricci_server packets.
 </summary>
@@ -54501,7 +54318,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71214">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71337">
 <summary>
 Do not audit attempts to send ricci_server packets.
 </summary>
@@ -54512,7 +54329,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71233">
+<interface name="corenet_receive_ricci_server_packets" lineno="71356">
 <summary>
 Receive ricci_server packets.
 </summary>
@@ -54523,7 +54340,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71252">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71375">
 <summary>
 Do not audit attempts to receive ricci_server packets.
 </summary>
@@ -54534,7 +54351,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71271">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="71394">
 <summary>
 Send and receive ricci_server packets.
 </summary>
@@ -54545,7 +54362,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71287">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71410">
 <summary>
 Do not audit attempts to send and receive ricci_server packets.
 </summary>
@@ -54556,7 +54373,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71302">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="71425">
 <summary>
 Relabel packets to ricci_server the packet type.
 </summary>
@@ -54566,7 +54383,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71324">
+<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71447">
 <summary>
 Send and receive TCP traffic on the ricci_modcluster port.
 </summary>
@@ -54577,7 +54394,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71339">
+<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71462">
 <summary>
 Send UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54588,7 +54405,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71354">
+<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71477">
 <summary>
 Do not audit attempts to send UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54599,7 +54416,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71369">
+<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71492">
 <summary>
 Receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54610,7 +54427,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71384">
+<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71507">
 <summary>
 Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54621,7 +54438,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71399">
+<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71522">
 <summary>
 Send and receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54632,7 +54449,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71415">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71538">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ricci_modcluster port.
@@ -54644,7 +54461,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71430">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71553">
 <summary>
 Bind TCP sockets to the ricci_modcluster port.
 </summary>
@@ -54655,7 +54472,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71450">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71573">
 <summary>
 Bind UDP sockets to the ricci_modcluster port.
 </summary>
@@ -54666,7 +54483,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71469">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71592">
 <summary>
 Make a TCP connection to the ricci_modcluster port.
 </summary>
@@ -54676,7 +54493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71489">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71612">
 <summary>
 Send ricci_modcluster_client packets.
 </summary>
@@ -54687,7 +54504,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71508">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71631">
 <summary>
 Do not audit attempts to send ricci_modcluster_client packets.
 </summary>
@@ -54698,7 +54515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71527">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71650">
 <summary>
 Receive ricci_modcluster_client packets.
 </summary>
@@ -54709,7 +54526,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71546">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71669">
 <summary>
 Do not audit attempts to receive ricci_modcluster_client packets.
 </summary>
@@ -54720,7 +54537,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71565">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71688">
 <summary>
 Send and receive ricci_modcluster_client packets.
 </summary>
@@ -54731,7 +54548,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71581">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71704">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_client packets.
 </summary>
@@ -54742,7 +54559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71596">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71719">
 <summary>
 Relabel packets to ricci_modcluster_client the packet type.
 </summary>
@@ -54752,7 +54569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71616">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71739">
 <summary>
 Send ricci_modcluster_server packets.
 </summary>
@@ -54763,7 +54580,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71635">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71758">
 <summary>
 Do not audit attempts to send ricci_modcluster_server packets.
 </summary>
@@ -54774,7 +54591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71654">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71777">
 <summary>
 Receive ricci_modcluster_server packets.
 </summary>
@@ -54785,7 +54602,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71673">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71796">
 <summary>
 Do not audit attempts to receive ricci_modcluster_server packets.
 </summary>
@@ -54796,7 +54613,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71692">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71815">
 <summary>
 Send and receive ricci_modcluster_server packets.
 </summary>
@@ -54807,7 +54624,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71708">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71831">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_server packets.
 </summary>
@@ -54818,7 +54635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71723">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71846">
 <summary>
 Relabel packets to ricci_modcluster_server the packet type.
 </summary>
@@ -54828,7 +54645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71745">
+<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71868">
 <summary>
 Send and receive TCP traffic on the rlogind port.
 </summary>
@@ -54839,7 +54656,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="71760">
+<interface name="corenet_udp_send_rlogind_port" lineno="71883">
 <summary>
 Send UDP traffic on the rlogind port.
 </summary>
@@ -54850,7 +54667,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71775">
+<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71898">
 <summary>
 Do not audit attempts to send UDP traffic on the rlogind port.
 </summary>
@@ -54861,7 +54678,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="71790">
+<interface name="corenet_udp_receive_rlogind_port" lineno="71913">
 <summary>
 Receive UDP traffic on the rlogind port.
 </summary>
@@ -54872,7 +54689,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71805">
+<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71928">
 <summary>
 Do not audit attempts to receive UDP traffic on the rlogind port.
 </summary>
@@ -54883,7 +54700,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71820">
+<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71943">
 <summary>
 Send and receive UDP traffic on the rlogind port.
 </summary>
@@ -54894,7 +54711,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71836">
+<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71959">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rlogind port.
@@ -54906,7 +54723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="71851">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="71974">
 <summary>
 Bind TCP sockets to the rlogind port.
 </summary>
@@ -54917,7 +54734,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="71871">
+<interface name="corenet_udp_bind_rlogind_port" lineno="71994">
 <summary>
 Bind UDP sockets to the rlogind port.
 </summary>
@@ -54928,7 +54745,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="71890">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="72013">
 <summary>
 Make a TCP connection to the rlogind port.
 </summary>
@@ -54938,7 +54755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="71910">
+<interface name="corenet_send_rlogind_client_packets" lineno="72033">
 <summary>
 Send rlogind_client packets.
 </summary>
@@ -54949,7 +54766,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="71929">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72052">
 <summary>
 Do not audit attempts to send rlogind_client packets.
 </summary>
@@ -54960,7 +54777,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="71948">
+<interface name="corenet_receive_rlogind_client_packets" lineno="72071">
 <summary>
 Receive rlogind_client packets.
 </summary>
@@ -54971,7 +54788,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="71967">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72090">
 <summary>
 Do not audit attempts to receive rlogind_client packets.
 </summary>
@@ -54982,7 +54799,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="71986">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72109">
 <summary>
 Send and receive rlogind_client packets.
 </summary>
@@ -54993,7 +54810,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72002">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72125">
 <summary>
 Do not audit attempts to send and receive rlogind_client packets.
 </summary>
@@ -55004,7 +54821,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72017">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="72140">
 <summary>
 Relabel packets to rlogind_client the packet type.
 </summary>
@@ -55014,7 +54831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72037">
+<interface name="corenet_send_rlogind_server_packets" lineno="72160">
 <summary>
 Send rlogind_server packets.
 </summary>
@@ -55025,7 +54842,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72056">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72179">
 <summary>
 Do not audit attempts to send rlogind_server packets.
 </summary>
@@ -55036,7 +54853,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72075">
+<interface name="corenet_receive_rlogind_server_packets" lineno="72198">
 <summary>
 Receive rlogind_server packets.
 </summary>
@@ -55047,7 +54864,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72094">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72217">
 <summary>
 Do not audit attempts to receive rlogind_server packets.
 </summary>
@@ -55058,7 +54875,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72113">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72236">
 <summary>
 Send and receive rlogind_server packets.
 </summary>
@@ -55069,7 +54886,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72129">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72252">
 <summary>
 Do not audit attempts to send and receive rlogind_server packets.
 </summary>
@@ -55080,7 +54897,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72144">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="72267">
 <summary>
 Relabel packets to rlogind_server the packet type.
 </summary>
@@ -55090,7 +54907,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72166">
+<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72289">
 <summary>
 Send and receive TCP traffic on the rndc port.
 </summary>
@@ -55101,7 +54918,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72181">
+<interface name="corenet_udp_send_rndc_port" lineno="72304">
 <summary>
 Send UDP traffic on the rndc port.
 </summary>
@@ -55112,7 +54929,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72196">
+<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72319">
 <summary>
 Do not audit attempts to send UDP traffic on the rndc port.
 </summary>
@@ -55123,7 +54940,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72211">
+<interface name="corenet_udp_receive_rndc_port" lineno="72334">
 <summary>
 Receive UDP traffic on the rndc port.
 </summary>
@@ -55134,7 +54951,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72226">
+<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72349">
 <summary>
 Do not audit attempts to receive UDP traffic on the rndc port.
 </summary>
@@ -55145,7 +54962,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72241">
+<interface name="corenet_udp_sendrecv_rndc_port" lineno="72364">
 <summary>
 Send and receive UDP traffic on the rndc port.
 </summary>
@@ -55156,7 +54973,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72257">
+<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72380">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rndc port.
@@ -55168,7 +54985,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72272">
+<interface name="corenet_tcp_bind_rndc_port" lineno="72395">
 <summary>
 Bind TCP sockets to the rndc port.
 </summary>
@@ -55179,7 +54996,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72292">
+<interface name="corenet_udp_bind_rndc_port" lineno="72415">
 <summary>
 Bind UDP sockets to the rndc port.
 </summary>
@@ -55190,7 +55007,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72311">
+<interface name="corenet_tcp_connect_rndc_port" lineno="72434">
 <summary>
 Make a TCP connection to the rndc port.
 </summary>
@@ -55200,7 +55017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72331">
+<interface name="corenet_send_rndc_client_packets" lineno="72454">
 <summary>
 Send rndc_client packets.
 </summary>
@@ -55211,7 +55028,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72350">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72473">
 <summary>
 Do not audit attempts to send rndc_client packets.
 </summary>
@@ -55222,7 +55039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72369">
+<interface name="corenet_receive_rndc_client_packets" lineno="72492">
 <summary>
 Receive rndc_client packets.
 </summary>
@@ -55233,7 +55050,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72388">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72511">
 <summary>
 Do not audit attempts to receive rndc_client packets.
 </summary>
@@ -55244,7 +55061,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72407">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="72530">
 <summary>
 Send and receive rndc_client packets.
 </summary>
@@ -55255,7 +55072,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72423">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72546">
 <summary>
 Do not audit attempts to send and receive rndc_client packets.
 </summary>
@@ -55266,7 +55083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="72438">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="72561">
 <summary>
 Relabel packets to rndc_client the packet type.
 </summary>
@@ -55276,7 +55093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_server_packets" lineno="72458">
+<interface name="corenet_send_rndc_server_packets" lineno="72581">
 <summary>
 Send rndc_server packets.
 </summary>
@@ -55287,7 +55104,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72477">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72600">
 <summary>
 Do not audit attempts to send rndc_server packets.
 </summary>
@@ -55298,7 +55115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="72496">
+<interface name="corenet_receive_rndc_server_packets" lineno="72619">
 <summary>
 Receive rndc_server packets.
 </summary>
@@ -55309,7 +55126,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72515">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72638">
 <summary>
 Do not audit attempts to receive rndc_server packets.
 </summary>
@@ -55320,7 +55137,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="72534">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="72657">
 <summary>
 Send and receive rndc_server packets.
 </summary>
@@ -55331,7 +55148,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72550">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72673">
 <summary>
 Do not audit attempts to send and receive rndc_server packets.
 </summary>
@@ -55342,7 +55159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="72565">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="72688">
 <summary>
 Relabel packets to rndc_server the packet type.
 </summary>
@@ -55352,7 +55169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="72587">
+<interface name="corenet_tcp_sendrecv_router_port" lineno="72710">
 <summary>
 Send and receive TCP traffic on the router port.
 </summary>
@@ -55363,7 +55180,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_router_port" lineno="72602">
+<interface name="corenet_udp_send_router_port" lineno="72725">
 <summary>
 Send UDP traffic on the router port.
 </summary>
@@ -55374,7 +55191,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="72617">
+<interface name="corenet_dontaudit_udp_send_router_port" lineno="72740">
 <summary>
 Do not audit attempts to send UDP traffic on the router port.
 </summary>
@@ -55385,7 +55202,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_router_port" lineno="72632">
+<interface name="corenet_udp_receive_router_port" lineno="72755">
 <summary>
 Receive UDP traffic on the router port.
 </summary>
@@ -55396,7 +55213,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72647">
+<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72770">
 <summary>
 Do not audit attempts to receive UDP traffic on the router port.
 </summary>
@@ -55407,7 +55224,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="72662">
+<interface name="corenet_udp_sendrecv_router_port" lineno="72785">
 <summary>
 Send and receive UDP traffic on the router port.
 </summary>
@@ -55418,7 +55235,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72678">
+<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72801">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the router port.
@@ -55430,7 +55247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_router_port" lineno="72693">
+<interface name="corenet_tcp_bind_router_port" lineno="72816">
 <summary>
 Bind TCP sockets to the router port.
 </summary>
@@ -55441,7 +55258,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_router_port" lineno="72713">
+<interface name="corenet_udp_bind_router_port" lineno="72836">
 <summary>
 Bind UDP sockets to the router port.
 </summary>
@@ -55452,7 +55269,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_router_port" lineno="72732">
+<interface name="corenet_tcp_connect_router_port" lineno="72855">
 <summary>
 Make a TCP connection to the router port.
 </summary>
@@ -55462,7 +55279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_client_packets" lineno="72752">
+<interface name="corenet_send_router_client_packets" lineno="72875">
 <summary>
 Send router_client packets.
 </summary>
@@ -55473,7 +55290,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="72771">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="72894">
 <summary>
 Do not audit attempts to send router_client packets.
 </summary>
@@ -55484,7 +55301,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_client_packets" lineno="72790">
+<interface name="corenet_receive_router_client_packets" lineno="72913">
 <summary>
 Receive router_client packets.
 </summary>
@@ -55495,7 +55312,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72809">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72932">
 <summary>
 Do not audit attempts to receive router_client packets.
 </summary>
@@ -55506,7 +55323,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="72828">
+<interface name="corenet_sendrecv_router_client_packets" lineno="72951">
 <summary>
 Send and receive router_client packets.
 </summary>
@@ -55517,7 +55334,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72844">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72967">
 <summary>
 Do not audit attempts to send and receive router_client packets.
 </summary>
@@ -55528,7 +55345,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="72859">
+<interface name="corenet_relabelto_router_client_packets" lineno="72982">
 <summary>
 Relabel packets to router_client the packet type.
 </summary>
@@ -55538,7 +55355,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_server_packets" lineno="72879">
+<interface name="corenet_send_router_server_packets" lineno="73002">
 <summary>
 Send router_server packets.
 </summary>
@@ -55549,7 +55366,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="72898">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="73021">
 <summary>
 Do not audit attempts to send router_server packets.
 </summary>
@@ -55560,7 +55377,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_server_packets" lineno="72917">
+<interface name="corenet_receive_router_server_packets" lineno="73040">
 <summary>
 Receive router_server packets.
 </summary>
@@ -55571,7 +55388,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="72936">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73059">
 <summary>
 Do not audit attempts to receive router_server packets.
 </summary>
@@ -55582,7 +55399,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="72955">
+<interface name="corenet_sendrecv_router_server_packets" lineno="73078">
 <summary>
 Send and receive router_server packets.
 </summary>
@@ -55593,7 +55410,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="72971">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73094">
 <summary>
 Do not audit attempts to send and receive router_server packets.
 </summary>
@@ -55604,7 +55421,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="72986">
+<interface name="corenet_relabelto_router_server_packets" lineno="73109">
 <summary>
 Relabel packets to router_server the packet type.
 </summary>
@@ -55614,7 +55431,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73008">
+<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73131">
 <summary>
 Send and receive TCP traffic on the rsh port.
 </summary>
@@ -55625,7 +55442,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73023">
+<interface name="corenet_udp_send_rsh_port" lineno="73146">
 <summary>
 Send UDP traffic on the rsh port.
 </summary>
@@ -55636,7 +55453,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73038">
+<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73161">
 <summary>
 Do not audit attempts to send UDP traffic on the rsh port.
 </summary>
@@ -55647,7 +55464,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73053">
+<interface name="corenet_udp_receive_rsh_port" lineno="73176">
 <summary>
 Receive UDP traffic on the rsh port.
 </summary>
@@ -55658,7 +55475,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73068">
+<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73191">
 <summary>
 Do not audit attempts to receive UDP traffic on the rsh port.
 </summary>
@@ -55669,7 +55486,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73083">
+<interface name="corenet_udp_sendrecv_rsh_port" lineno="73206">
 <summary>
 Send and receive UDP traffic on the rsh port.
 </summary>
@@ -55680,7 +55497,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73099">
+<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73222">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rsh port.
@@ -55692,7 +55509,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73114">
+<interface name="corenet_tcp_bind_rsh_port" lineno="73237">
 <summary>
 Bind TCP sockets to the rsh port.
 </summary>
@@ -55703,7 +55520,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73134">
+<interface name="corenet_udp_bind_rsh_port" lineno="73257">
 <summary>
 Bind UDP sockets to the rsh port.
 </summary>
@@ -55714,7 +55531,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73153">
+<interface name="corenet_tcp_connect_rsh_port" lineno="73276">
 <summary>
 Make a TCP connection to the rsh port.
 </summary>
@@ -55724,7 +55541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73173">
+<interface name="corenet_send_rsh_client_packets" lineno="73296">
 <summary>
 Send rsh_client packets.
 </summary>
@@ -55735,7 +55552,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73192">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73315">
 <summary>
 Do not audit attempts to send rsh_client packets.
 </summary>
@@ -55746,7 +55563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73211">
+<interface name="corenet_receive_rsh_client_packets" lineno="73334">
 <summary>
 Receive rsh_client packets.
 </summary>
@@ -55757,7 +55574,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73230">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73353">
 <summary>
 Do not audit attempts to receive rsh_client packets.
 </summary>
@@ -55768,7 +55585,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73249">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="73372">
 <summary>
 Send and receive rsh_client packets.
 </summary>
@@ -55779,7 +55596,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73265">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73388">
 <summary>
 Do not audit attempts to send and receive rsh_client packets.
 </summary>
@@ -55790,7 +55607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73280">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="73403">
 <summary>
 Relabel packets to rsh_client the packet type.
 </summary>
@@ -55800,7 +55617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73300">
+<interface name="corenet_send_rsh_server_packets" lineno="73423">
 <summary>
 Send rsh_server packets.
 </summary>
@@ -55811,7 +55628,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73319">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73442">
 <summary>
 Do not audit attempts to send rsh_server packets.
 </summary>
@@ -55822,7 +55639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73338">
+<interface name="corenet_receive_rsh_server_packets" lineno="73461">
 <summary>
 Receive rsh_server packets.
 </summary>
@@ -55833,7 +55650,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73357">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73480">
 <summary>
 Do not audit attempts to receive rsh_server packets.
 </summary>
@@ -55844,7 +55661,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73376">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="73499">
 <summary>
 Send and receive rsh_server packets.
 </summary>
@@ -55855,7 +55672,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73392">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73515">
 <summary>
 Do not audit attempts to send and receive rsh_server packets.
 </summary>
@@ -55866,7 +55683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73407">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="73530">
 <summary>
 Relabel packets to rsh_server the packet type.
 </summary>
@@ -55876,7 +55693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73429">
+<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73552">
 <summary>
 Send and receive TCP traffic on the rsync port.
 </summary>
@@ -55887,7 +55704,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rsync_port" lineno="73444">
+<interface name="corenet_udp_send_rsync_port" lineno="73567">
 <summary>
 Send UDP traffic on the rsync port.
 </summary>
@@ -55898,7 +55715,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73459">
+<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73582">
 <summary>
 Do not audit attempts to send UDP traffic on the rsync port.
 </summary>
@@ -55909,7 +55726,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="73474">
+<interface name="corenet_udp_receive_rsync_port" lineno="73597">
 <summary>
 Receive UDP traffic on the rsync port.
 </summary>
@@ -55920,7 +55737,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73489">
+<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73612">
 <summary>
 Do not audit attempts to receive UDP traffic on the rsync port.
 </summary>
@@ -55931,7 +55748,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="73504">
+<interface name="corenet_udp_sendrecv_rsync_port" lineno="73627">
 <summary>
 Send and receive UDP traffic on the rsync port.
 </summary>
@@ -55942,7 +55759,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73520">
+<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73643">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rsync port.
@@ -55954,7 +55771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="73535">
+<interface name="corenet_tcp_bind_rsync_port" lineno="73658">
 <summary>
 Bind TCP sockets to the rsync port.
 </summary>
@@ -55965,7 +55782,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="73555">
+<interface name="corenet_udp_bind_rsync_port" lineno="73678">
 <summary>
 Bind UDP sockets to the rsync port.
 </summary>
@@ -55976,7 +55793,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="73574">
+<interface name="corenet_tcp_connect_rsync_port" lineno="73697">
 <summary>
 Make a TCP connection to the rsync port.
 </summary>
@@ -55986,7 +55803,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_client_packets" lineno="73594">
+<interface name="corenet_send_rsync_client_packets" lineno="73717">
 <summary>
 Send rsync_client packets.
 </summary>
@@ -55997,7 +55814,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73613">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73736">
 <summary>
 Do not audit attempts to send rsync_client packets.
 </summary>
@@ -56008,7 +55825,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="73632">
+<interface name="corenet_receive_rsync_client_packets" lineno="73755">
 <summary>
 Receive rsync_client packets.
 </summary>
@@ -56019,7 +55836,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73651">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73774">
 <summary>
 Do not audit attempts to receive rsync_client packets.
 </summary>
@@ -56030,7 +55847,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="73670">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="73793">
 <summary>
 Send and receive rsync_client packets.
 </summary>
@@ -56041,7 +55858,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73686">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73809">
 <summary>
 Do not audit attempts to send and receive rsync_client packets.
 </summary>
@@ -56052,7 +55869,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="73701">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="73824">
 <summary>
 Relabel packets to rsync_client the packet type.
 </summary>
@@ -56062,7 +55879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_server_packets" lineno="73721">
+<interface name="corenet_send_rsync_server_packets" lineno="73844">
 <summary>
 Send rsync_server packets.
 </summary>
@@ -56073,7 +55890,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73740">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73863">
 <summary>
 Do not audit attempts to send rsync_server packets.
 </summary>
@@ -56084,7 +55901,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="73759">
+<interface name="corenet_receive_rsync_server_packets" lineno="73882">
 <summary>
 Receive rsync_server packets.
 </summary>
@@ -56095,7 +55912,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73778">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73901">
 <summary>
 Do not audit attempts to receive rsync_server packets.
 </summary>
@@ -56106,7 +55923,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="73797">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="73920">
 <summary>
 Send and receive rsync_server packets.
 </summary>
@@ -56117,7 +55934,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73813">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73936">
 <summary>
 Do not audit attempts to send and receive rsync_server packets.
 </summary>
@@ -56128,7 +55945,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="73828">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="73951">
 <summary>
 Relabel packets to rsync_server the packet type.
 </summary>
@@ -56138,7 +55955,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73850">
+<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73973">
 <summary>
 Send and receive TCP traffic on the rtorrent port.
 </summary>
@@ -56149,7 +55966,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="73865">
+<interface name="corenet_udp_send_rtorrent_port" lineno="73988">
 <summary>
 Send UDP traffic on the rtorrent port.
 </summary>
@@ -56160,7 +55977,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="73880">
+<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74003">
 <summary>
 Do not audit attempts to send UDP traffic on the rtorrent port.
 </summary>
@@ -56171,7 +55988,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="73895">
+<interface name="corenet_udp_receive_rtorrent_port" lineno="74018">
 <summary>
 Receive UDP traffic on the rtorrent port.
 </summary>
@@ -56182,7 +55999,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="73910">
+<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74033">
 <summary>
 Do not audit attempts to receive UDP traffic on the rtorrent port.
 </summary>
@@ -56193,7 +56010,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="73925">
+<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74048">
 <summary>
 Send and receive UDP traffic on the rtorrent port.
 </summary>
@@ -56204,7 +56021,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="73941">
+<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74064">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rtorrent port.
@@ -56216,7 +56033,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="73956">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="74079">
 <summary>
 Bind TCP sockets to the rtorrent port.
 </summary>
@@ -56227,7 +56044,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="73976">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="74099">
 <summary>
 Bind UDP sockets to the rtorrent port.
 </summary>
@@ -56238,7 +56055,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="73995">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="74118">
 <summary>
 Make a TCP connection to the rtorrent port.
 </summary>
@@ -56248,7 +56065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74015">
+<interface name="corenet_send_rtorrent_client_packets" lineno="74138">
 <summary>
 Send rtorrent_client packets.
 </summary>
@@ -56259,7 +56076,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74034">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74157">
 <summary>
 Do not audit attempts to send rtorrent_client packets.
 </summary>
@@ -56270,7 +56087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74053">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="74176">
 <summary>
 Receive rtorrent_client packets.
 </summary>
@@ -56281,7 +56098,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74072">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74195">
 <summary>
 Do not audit attempts to receive rtorrent_client packets.
 </summary>
@@ -56292,7 +56109,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74091">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74214">
 <summary>
 Send and receive rtorrent_client packets.
 </summary>
@@ -56303,7 +56120,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74107">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74230">
 <summary>
 Do not audit attempts to send and receive rtorrent_client packets.
 </summary>
@@ -56314,7 +56131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74122">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74245">
 <summary>
 Relabel packets to rtorrent_client the packet type.
 </summary>
@@ -56324,7 +56141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74142">
+<interface name="corenet_send_rtorrent_server_packets" lineno="74265">
 <summary>
 Send rtorrent_server packets.
 </summary>
@@ -56335,7 +56152,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74161">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74284">
 <summary>
 Do not audit attempts to send rtorrent_server packets.
 </summary>
@@ -56346,7 +56163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74180">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="74303">
 <summary>
 Receive rtorrent_server packets.
 </summary>
@@ -56357,7 +56174,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74199">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74322">
 <summary>
 Do not audit attempts to receive rtorrent_server packets.
 </summary>
@@ -56368,7 +56185,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74218">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74341">
 <summary>
 Send and receive rtorrent_server packets.
 </summary>
@@ -56379,7 +56196,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74234">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74357">
 <summary>
 Do not audit attempts to send and receive rtorrent_server packets.
 </summary>
@@ -56390,7 +56207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74249">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74372">
 <summary>
 Relabel packets to rtorrent_server the packet type.
 </summary>
@@ -56400,7 +56217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74271">
+<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74394">
 <summary>
 Send and receive TCP traffic on the rtsp port.
 </summary>
@@ -56411,7 +56228,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74286">
+<interface name="corenet_udp_send_rtsp_port" lineno="74409">
 <summary>
 Send UDP traffic on the rtsp port.
 </summary>
@@ -56422,7 +56239,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74301">
+<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74424">
 <summary>
 Do not audit attempts to send UDP traffic on the rtsp port.
 </summary>
@@ -56433,7 +56250,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74316">
+<interface name="corenet_udp_receive_rtsp_port" lineno="74439">
 <summary>
 Receive UDP traffic on the rtsp port.
 </summary>
@@ -56444,7 +56261,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74331">
+<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74454">
 <summary>
 Do not audit attempts to receive UDP traffic on the rtsp port.
 </summary>
@@ -56455,7 +56272,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74346">
+<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74469">
 <summary>
 Send and receive UDP traffic on the rtsp port.
 </summary>
@@ -56466,7 +56283,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74362">
+<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74485">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rtsp port.
@@ -56478,7 +56295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74377">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="74500">
 <summary>
 Bind TCP sockets to the rtsp port.
 </summary>
@@ -56489,7 +56306,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74397">
+<interface name="corenet_udp_bind_rtsp_port" lineno="74520">
 <summary>
 Bind UDP sockets to the rtsp port.
 </summary>
@@ -56500,7 +56317,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74416">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="74539">
 <summary>
 Make a TCP connection to the rtsp port.
 </summary>
@@ -56510,7 +56327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74436">
+<interface name="corenet_send_rtsp_client_packets" lineno="74559">
 <summary>
 Send rtsp_client packets.
 </summary>
@@ -56521,7 +56338,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74455">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74578">
 <summary>
 Do not audit attempts to send rtsp_client packets.
 </summary>
@@ -56532,7 +56349,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="74474">
+<interface name="corenet_receive_rtsp_client_packets" lineno="74597">
 <summary>
 Receive rtsp_client packets.
 </summary>
@@ -56543,7 +56360,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74493">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74616">
 <summary>
 Do not audit attempts to receive rtsp_client packets.
 </summary>
@@ -56554,7 +56371,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74512">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74635">
 <summary>
 Send and receive rtsp_client packets.
 </summary>
@@ -56565,7 +56382,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74528">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74651">
 <summary>
 Do not audit attempts to send and receive rtsp_client packets.
 </summary>
@@ -56576,7 +56393,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="74543">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="74666">
 <summary>
 Relabel packets to rtsp_client the packet type.
 </summary>
@@ -56586,7 +56403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="74563">
+<interface name="corenet_send_rtsp_server_packets" lineno="74686">
 <summary>
 Send rtsp_server packets.
 </summary>
@@ -56597,7 +56414,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74582">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74705">
 <summary>
 Do not audit attempts to send rtsp_server packets.
 </summary>
@@ -56608,7 +56425,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="74601">
+<interface name="corenet_receive_rtsp_server_packets" lineno="74724">
 <summary>
 Receive rtsp_server packets.
 </summary>
@@ -56619,7 +56436,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74620">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74743">
 <summary>
 Do not audit attempts to receive rtsp_server packets.
 </summary>
@@ -56630,7 +56447,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74639">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74762">
 <summary>
 Send and receive rtsp_server packets.
 </summary>
@@ -56641,7 +56458,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74655">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74778">
 <summary>
 Do not audit attempts to send and receive rtsp_server packets.
 </summary>
@@ -56652,7 +56469,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="74670">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="74793">
 <summary>
 Relabel packets to rtsp_server the packet type.
 </summary>
@@ -56662,7 +56479,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74692">
+<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74815">
 <summary>
 Send and receive TCP traffic on the rwho port.
 </summary>
@@ -56673,7 +56490,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rwho_port" lineno="74707">
+<interface name="corenet_udp_send_rwho_port" lineno="74830">
 <summary>
 Send UDP traffic on the rwho port.
 </summary>
@@ -56684,7 +56501,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74722">
+<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74845">
 <summary>
 Do not audit attempts to send UDP traffic on the rwho port.
 </summary>
@@ -56695,7 +56512,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="74737">
+<interface name="corenet_udp_receive_rwho_port" lineno="74860">
 <summary>
 Receive UDP traffic on the rwho port.
 </summary>
@@ -56706,7 +56523,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74752">
+<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74875">
 <summary>
 Do not audit attempts to receive UDP traffic on the rwho port.
 </summary>
@@ -56717,7 +56534,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="74767">
+<interface name="corenet_udp_sendrecv_rwho_port" lineno="74890">
 <summary>
 Send and receive UDP traffic on the rwho port.
 </summary>
@@ -56728,7 +56545,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74783">
+<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74906">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rwho port.
@@ -56740,7 +56557,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="74798">
+<interface name="corenet_tcp_bind_rwho_port" lineno="74921">
 <summary>
 Bind TCP sockets to the rwho port.
 </summary>
@@ -56751,7 +56568,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="74818">
+<interface name="corenet_udp_bind_rwho_port" lineno="74941">
 <summary>
 Bind UDP sockets to the rwho port.
 </summary>
@@ -56762,7 +56579,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="74837">
+<interface name="corenet_tcp_connect_rwho_port" lineno="74960">
 <summary>
 Make a TCP connection to the rwho port.
 </summary>
@@ -56772,7 +56589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_client_packets" lineno="74857">
+<interface name="corenet_send_rwho_client_packets" lineno="74980">
 <summary>
 Send rwho_client packets.
 </summary>
@@ -56783,7 +56600,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74876">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74999">
 <summary>
 Do not audit attempts to send rwho_client packets.
 </summary>
@@ -56794,7 +56611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="74895">
+<interface name="corenet_receive_rwho_client_packets" lineno="75018">
 <summary>
 Receive rwho_client packets.
 </summary>
@@ -56805,7 +56622,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="74914">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75037">
 <summary>
 Do not audit attempts to receive rwho_client packets.
 </summary>
@@ -56816,7 +56633,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="74933">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="75056">
 <summary>
 Send and receive rwho_client packets.
 </summary>
@@ -56827,7 +56644,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="74949">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75072">
 <summary>
 Do not audit attempts to send and receive rwho_client packets.
 </summary>
@@ -56838,7 +56655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="74964">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="75087">
 <summary>
 Relabel packets to rwho_client the packet type.
 </summary>
@@ -56848,7 +56665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_server_packets" lineno="74984">
+<interface name="corenet_send_rwho_server_packets" lineno="75107">
 <summary>
 Send rwho_server packets.
 </summary>
@@ -56859,7 +56676,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75003">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75126">
 <summary>
 Do not audit attempts to send rwho_server packets.
 </summary>
@@ -56870,7 +56687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75022">
+<interface name="corenet_receive_rwho_server_packets" lineno="75145">
 <summary>
 Receive rwho_server packets.
 </summary>
@@ -56881,7 +56698,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75041">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75164">
 <summary>
 Do not audit attempts to receive rwho_server packets.
 </summary>
@@ -56892,7 +56709,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75060">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="75183">
 <summary>
 Send and receive rwho_server packets.
 </summary>
@@ -56903,7 +56720,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75076">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75199">
 <summary>
 Do not audit attempts to send and receive rwho_server packets.
 </summary>
@@ -56914,7 +56731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75091">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="75214">
 <summary>
 Relabel packets to rwho_server the packet type.
 </summary>
@@ -56924,7 +56741,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75113">
+<interface name="corenet_tcp_sendrecv_salt_port" lineno="75236">
 <summary>
 Send and receive TCP traffic on the salt port.
 </summary>
@@ -56935,7 +56752,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_salt_port" lineno="75128">
+<interface name="corenet_udp_send_salt_port" lineno="75251">
 <summary>
 Send UDP traffic on the salt port.
 </summary>
@@ -56946,7 +56763,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75143">
+<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75266">
 <summary>
 Do not audit attempts to send UDP traffic on the salt port.
 </summary>
@@ -56957,7 +56774,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75158">
+<interface name="corenet_udp_receive_salt_port" lineno="75281">
 <summary>
 Receive UDP traffic on the salt port.
 </summary>
@@ -56968,7 +56785,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75173">
+<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75296">
 <summary>
 Do not audit attempts to receive UDP traffic on the salt port.
 </summary>
@@ -56979,7 +56796,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75188">
+<interface name="corenet_udp_sendrecv_salt_port" lineno="75311">
 <summary>
 Send and receive UDP traffic on the salt port.
 </summary>
@@ -56990,7 +56807,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75204">
+<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75327">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the salt port.
@@ -57002,7 +56819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75219">
+<interface name="corenet_tcp_bind_salt_port" lineno="75342">
 <summary>
 Bind TCP sockets to the salt port.
 </summary>
@@ -57013,7 +56830,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75239">
+<interface name="corenet_udp_bind_salt_port" lineno="75362">
 <summary>
 Bind UDP sockets to the salt port.
 </summary>
@@ -57024,7 +56841,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75258">
+<interface name="corenet_tcp_connect_salt_port" lineno="75381">
 <summary>
 Make a TCP connection to the salt port.
 </summary>
@@ -57034,7 +56851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_client_packets" lineno="75278">
+<interface name="corenet_send_salt_client_packets" lineno="75401">
 <summary>
 Send salt_client packets.
 </summary>
@@ -57045,7 +56862,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75297">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75420">
 <summary>
 Do not audit attempts to send salt_client packets.
 </summary>
@@ -57056,7 +56873,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75316">
+<interface name="corenet_receive_salt_client_packets" lineno="75439">
 <summary>
 Receive salt_client packets.
 </summary>
@@ -57067,7 +56884,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75335">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75458">
 <summary>
 Do not audit attempts to receive salt_client packets.
 </summary>
@@ -57078,7 +56895,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75354">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="75477">
 <summary>
 Send and receive salt_client packets.
 </summary>
@@ -57089,7 +56906,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75370">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75493">
 <summary>
 Do not audit attempts to send and receive salt_client packets.
 </summary>
@@ -57100,7 +56917,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75385">
+<interface name="corenet_relabelto_salt_client_packets" lineno="75508">
 <summary>
 Relabel packets to salt_client the packet type.
 </summary>
@@ -57110,7 +56927,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_server_packets" lineno="75405">
+<interface name="corenet_send_salt_server_packets" lineno="75528">
 <summary>
 Send salt_server packets.
 </summary>
@@ -57121,7 +56938,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75424">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75547">
 <summary>
 Do not audit attempts to send salt_server packets.
 </summary>
@@ -57132,7 +56949,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_server_packets" lineno="75443">
+<interface name="corenet_receive_salt_server_packets" lineno="75566">
 <summary>
 Receive salt_server packets.
 </summary>
@@ -57143,7 +56960,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75462">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75585">
 <summary>
 Do not audit attempts to receive salt_server packets.
 </summary>
@@ -57154,7 +56971,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="75481">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="75604">
 <summary>
 Send and receive salt_server packets.
 </summary>
@@ -57165,7 +56982,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75497">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75620">
 <summary>
 Do not audit attempts to send and receive salt_server packets.
 </summary>
@@ -57176,7 +56993,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="75512">
+<interface name="corenet_relabelto_salt_server_packets" lineno="75635">
 <summary>
 Relabel packets to salt_server the packet type.
 </summary>
@@ -57186,7 +57003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="75534">
+<interface name="corenet_tcp_sendrecv_sap_port" lineno="75657">
 <summary>
 Send and receive TCP traffic on the sap port.
 </summary>
@@ -57197,7 +57014,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sap_port" lineno="75549">
+<interface name="corenet_udp_send_sap_port" lineno="75672">
 <summary>
 Send UDP traffic on the sap port.
 </summary>
@@ -57208,7 +57025,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75564">
+<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75687">
 <summary>
 Do not audit attempts to send UDP traffic on the sap port.
 </summary>
@@ -57219,7 +57036,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sap_port" lineno="75579">
+<interface name="corenet_udp_receive_sap_port" lineno="75702">
 <summary>
 Receive UDP traffic on the sap port.
 </summary>
@@ -57230,7 +57047,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75594">
+<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75717">
 <summary>
 Do not audit attempts to receive UDP traffic on the sap port.
 </summary>
@@ -57241,7 +57058,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="75609">
+<interface name="corenet_udp_sendrecv_sap_port" lineno="75732">
 <summary>
 Send and receive UDP traffic on the sap port.
 </summary>
@@ -57252,7 +57069,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75625">
+<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75748">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sap port.
@@ -57264,7 +57081,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="75640">
+<interface name="corenet_tcp_bind_sap_port" lineno="75763">
 <summary>
 Bind TCP sockets to the sap port.
 </summary>
@@ -57275,7 +57092,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sap_port" lineno="75660">
+<interface name="corenet_udp_bind_sap_port" lineno="75783">
 <summary>
 Bind UDP sockets to the sap port.
 </summary>
@@ -57286,7 +57103,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="75679">
+<interface name="corenet_tcp_connect_sap_port" lineno="75802">
 <summary>
 Make a TCP connection to the sap port.
 </summary>
@@ -57296,7 +57113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_client_packets" lineno="75699">
+<interface name="corenet_send_sap_client_packets" lineno="75822">
 <summary>
 Send sap_client packets.
 </summary>
@@ -57307,7 +57124,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75718">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75841">
 <summary>
 Do not audit attempts to send sap_client packets.
 </summary>
@@ -57318,7 +57135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_client_packets" lineno="75737">
+<interface name="corenet_receive_sap_client_packets" lineno="75860">
 <summary>
 Receive sap_client packets.
 </summary>
@@ -57329,7 +57146,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75756">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75879">
 <summary>
 Do not audit attempts to receive sap_client packets.
 </summary>
@@ -57340,7 +57157,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="75775">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="75898">
 <summary>
 Send and receive sap_client packets.
 </summary>
@@ -57351,7 +57168,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75791">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75914">
 <summary>
 Do not audit attempts to send and receive sap_client packets.
 </summary>
@@ -57362,7 +57179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="75806">
+<interface name="corenet_relabelto_sap_client_packets" lineno="75929">
 <summary>
 Relabel packets to sap_client the packet type.
 </summary>
@@ -57372,7 +57189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_server_packets" lineno="75826">
+<interface name="corenet_send_sap_server_packets" lineno="75949">
 <summary>
 Send sap_server packets.
 </summary>
@@ -57383,7 +57200,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75845">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75968">
 <summary>
 Do not audit attempts to send sap_server packets.
 </summary>
@@ -57394,7 +57211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_server_packets" lineno="75864">
+<interface name="corenet_receive_sap_server_packets" lineno="75987">
 <summary>
 Receive sap_server packets.
 </summary>
@@ -57405,7 +57222,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="75883">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76006">
 <summary>
 Do not audit attempts to receive sap_server packets.
 </summary>
@@ -57416,7 +57233,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="75902">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="76025">
 <summary>
 Send and receive sap_server packets.
 </summary>
@@ -57427,7 +57244,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="75918">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76041">
 <summary>
 Do not audit attempts to send and receive sap_server packets.
 </summary>
@@ -57438,7 +57255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="75933">
+<interface name="corenet_relabelto_sap_server_packets" lineno="76056">
 <summary>
 Relabel packets to sap_server the packet type.
 </summary>
@@ -57448,7 +57265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="75955">
+<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76078">
 <summary>
 Send and receive TCP traffic on the servistaitsm port.
 </summary>
@@ -57459,7 +57276,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="75970">
+<interface name="corenet_udp_send_servistaitsm_port" lineno="76093">
 <summary>
 Send UDP traffic on the servistaitsm port.
 </summary>
@@ -57470,7 +57287,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="75985">
+<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76108">
 <summary>
 Do not audit attempts to send UDP traffic on the servistaitsm port.
 </summary>
@@ -57481,7 +57298,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76000">
+<interface name="corenet_udp_receive_servistaitsm_port" lineno="76123">
 <summary>
 Receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57492,7 +57309,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76015">
+<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76138">
 <summary>
 Do not audit attempts to receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57503,7 +57320,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76030">
+<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76153">
 <summary>
 Send and receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57514,7 +57331,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76046">
+<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76169">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the servistaitsm port.
@@ -57526,7 +57343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76061">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76184">
 <summary>
 Bind TCP sockets to the servistaitsm port.
 </summary>
@@ -57537,7 +57354,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76081">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="76204">
 <summary>
 Bind UDP sockets to the servistaitsm port.
 </summary>
@@ -57548,7 +57365,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76100">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76223">
 <summary>
 Make a TCP connection to the servistaitsm port.
 </summary>
@@ -57558,7 +57375,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76120">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="76243">
 <summary>
 Send servistaitsm_client packets.
 </summary>
@@ -57569,7 +57386,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76139">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76262">
 <summary>
 Do not audit attempts to send servistaitsm_client packets.
 </summary>
@@ -57580,7 +57397,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76158">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="76281">
 <summary>
 Receive servistaitsm_client packets.
 </summary>
@@ -57591,7 +57408,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76177">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76300">
 <summary>
 Do not audit attempts to receive servistaitsm_client packets.
 </summary>
@@ -57602,7 +57419,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76196">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76319">
 <summary>
 Send and receive servistaitsm_client packets.
 </summary>
@@ -57613,7 +57430,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76212">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76335">
 <summary>
 Do not audit attempts to send and receive servistaitsm_client packets.
 </summary>
@@ -57624,7 +57441,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76227">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76350">
 <summary>
 Relabel packets to servistaitsm_client the packet type.
 </summary>
@@ -57634,7 +57451,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76247">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="76370">
 <summary>
 Send servistaitsm_server packets.
 </summary>
@@ -57645,7 +57462,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76266">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76389">
 <summary>
 Do not audit attempts to send servistaitsm_server packets.
 </summary>
@@ -57656,7 +57473,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76285">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="76408">
 <summary>
 Receive servistaitsm_server packets.
 </summary>
@@ -57667,7 +57484,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76304">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76427">
 <summary>
 Do not audit attempts to receive servistaitsm_server packets.
 </summary>
@@ -57678,7 +57495,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76323">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76446">
 <summary>
 Send and receive servistaitsm_server packets.
 </summary>
@@ -57689,7 +57506,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76339">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76462">
 <summary>
 Do not audit attempts to send and receive servistaitsm_server packets.
 </summary>
@@ -57700,7 +57517,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76354">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76477">
 <summary>
 Relabel packets to servistaitsm_server the packet type.
 </summary>
@@ -57710,7 +57527,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76376">
+<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76499">
 <summary>
 Send and receive TCP traffic on the sieve port.
 </summary>
@@ -57721,7 +57538,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76391">
+<interface name="corenet_udp_send_sieve_port" lineno="76514">
 <summary>
 Send UDP traffic on the sieve port.
 </summary>
@@ -57732,7 +57549,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76406">
+<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76529">
 <summary>
 Do not audit attempts to send UDP traffic on the sieve port.
 </summary>
@@ -57743,7 +57560,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76421">
+<interface name="corenet_udp_receive_sieve_port" lineno="76544">
 <summary>
 Receive UDP traffic on the sieve port.
 </summary>
@@ -57754,7 +57571,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76436">
+<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76559">
 <summary>
 Do not audit attempts to receive UDP traffic on the sieve port.
 </summary>
@@ -57765,7 +57582,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="76451">
+<interface name="corenet_udp_sendrecv_sieve_port" lineno="76574">
 <summary>
 Send and receive UDP traffic on the sieve port.
 </summary>
@@ -57776,7 +57593,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76467">
+<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76590">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sieve port.
@@ -57788,7 +57605,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="76482">
+<interface name="corenet_tcp_bind_sieve_port" lineno="76605">
 <summary>
 Bind TCP sockets to the sieve port.
 </summary>
@@ -57799,7 +57616,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="76502">
+<interface name="corenet_udp_bind_sieve_port" lineno="76625">
 <summary>
 Bind UDP sockets to the sieve port.
 </summary>
@@ -57810,7 +57627,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="76521">
+<interface name="corenet_tcp_connect_sieve_port" lineno="76644">
 <summary>
 Make a TCP connection to the sieve port.
 </summary>
@@ -57820,7 +57637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_client_packets" lineno="76541">
+<interface name="corenet_send_sieve_client_packets" lineno="76664">
 <summary>
 Send sieve_client packets.
 </summary>
@@ -57831,7 +57648,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76560">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76683">
 <summary>
 Do not audit attempts to send sieve_client packets.
 </summary>
@@ -57842,7 +57659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="76579">
+<interface name="corenet_receive_sieve_client_packets" lineno="76702">
 <summary>
 Receive sieve_client packets.
 </summary>
@@ -57853,7 +57670,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76598">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76721">
 <summary>
 Do not audit attempts to receive sieve_client packets.
 </summary>
@@ -57864,7 +57681,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="76617">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="76740">
 <summary>
 Send and receive sieve_client packets.
 </summary>
@@ -57875,7 +57692,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76633">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76756">
 <summary>
 Do not audit attempts to send and receive sieve_client packets.
 </summary>
@@ -57886,7 +57703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="76648">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="76771">
 <summary>
 Relabel packets to sieve_client the packet type.
 </summary>
@@ -57896,7 +57713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_server_packets" lineno="76668">
+<interface name="corenet_send_sieve_server_packets" lineno="76791">
 <summary>
 Send sieve_server packets.
 </summary>
@@ -57907,7 +57724,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76687">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76810">
 <summary>
 Do not audit attempts to send sieve_server packets.
 </summary>
@@ -57918,7 +57735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="76706">
+<interface name="corenet_receive_sieve_server_packets" lineno="76829">
 <summary>
 Receive sieve_server packets.
 </summary>
@@ -57929,7 +57746,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76725">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76848">
 <summary>
 Do not audit attempts to receive sieve_server packets.
 </summary>
@@ -57940,7 +57757,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="76744">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="76867">
 <summary>
 Send and receive sieve_server packets.
 </summary>
@@ -57951,7 +57768,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76760">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76883">
 <summary>
 Do not audit attempts to send and receive sieve_server packets.
 </summary>
@@ -57962,7 +57779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="76775">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="76898">
 <summary>
 Relabel packets to sieve_server the packet type.
 </summary>
@@ -57972,7 +57789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="76797">
+<interface name="corenet_tcp_sendrecv_sip_port" lineno="76920">
 <summary>
 Send and receive TCP traffic on the sip port.
 </summary>
@@ -57983,7 +57800,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sip_port" lineno="76812">
+<interface name="corenet_udp_send_sip_port" lineno="76935">
 <summary>
 Send UDP traffic on the sip port.
 </summary>
@@ -57994,7 +57811,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76827">
+<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76950">
 <summary>
 Do not audit attempts to send UDP traffic on the sip port.
 </summary>
@@ -58005,7 +57822,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sip_port" lineno="76842">
+<interface name="corenet_udp_receive_sip_port" lineno="76965">
 <summary>
 Receive UDP traffic on the sip port.
 </summary>
@@ -58016,7 +57833,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76857">
+<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76980">
 <summary>
 Do not audit attempts to receive UDP traffic on the sip port.
 </summary>
@@ -58027,7 +57844,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="76872">
+<interface name="corenet_udp_sendrecv_sip_port" lineno="76995">
 <summary>
 Send and receive UDP traffic on the sip port.
 </summary>
@@ -58038,7 +57855,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="76888">
+<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77011">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sip port.
@@ -58050,7 +57867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="76903">
+<interface name="corenet_tcp_bind_sip_port" lineno="77026">
 <summary>
 Bind TCP sockets to the sip port.
 </summary>
@@ -58061,7 +57878,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sip_port" lineno="76923">
+<interface name="corenet_udp_bind_sip_port" lineno="77046">
 <summary>
 Bind UDP sockets to the sip port.
 </summary>
@@ -58072,7 +57889,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="76942">
+<interface name="corenet_tcp_connect_sip_port" lineno="77065">
 <summary>
 Make a TCP connection to the sip port.
 </summary>
@@ -58082,7 +57899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_client_packets" lineno="76962">
+<interface name="corenet_send_sip_client_packets" lineno="77085">
 <summary>
 Send sip_client packets.
 </summary>
@@ -58093,7 +57910,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="76981">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77104">
 <summary>
 Do not audit attempts to send sip_client packets.
 </summary>
@@ -58104,7 +57921,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77000">
+<interface name="corenet_receive_sip_client_packets" lineno="77123">
 <summary>
 Receive sip_client packets.
 </summary>
@@ -58115,7 +57932,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77019">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77142">
 <summary>
 Do not audit attempts to receive sip_client packets.
 </summary>
@@ -58126,7 +57943,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77038">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="77161">
 <summary>
 Send and receive sip_client packets.
 </summary>
@@ -58137,7 +57954,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77054">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77177">
 <summary>
 Do not audit attempts to send and receive sip_client packets.
 </summary>
@@ -58148,7 +57965,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77069">
+<interface name="corenet_relabelto_sip_client_packets" lineno="77192">
 <summary>
 Relabel packets to sip_client the packet type.
 </summary>
@@ -58158,7 +57975,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_server_packets" lineno="77089">
+<interface name="corenet_send_sip_server_packets" lineno="77212">
 <summary>
 Send sip_server packets.
 </summary>
@@ -58169,7 +57986,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77108">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77231">
 <summary>
 Do not audit attempts to send sip_server packets.
 </summary>
@@ -58180,7 +57997,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77127">
+<interface name="corenet_receive_sip_server_packets" lineno="77250">
 <summary>
 Receive sip_server packets.
 </summary>
@@ -58191,7 +58008,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77146">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77269">
 <summary>
 Do not audit attempts to receive sip_server packets.
 </summary>
@@ -58202,7 +58019,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77165">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="77288">
 <summary>
 Send and receive sip_server packets.
 </summary>
@@ -58213,7 +58030,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77181">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77304">
 <summary>
 Do not audit attempts to send and receive sip_server packets.
 </summary>
@@ -58224,7 +58041,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77196">
+<interface name="corenet_relabelto_sip_server_packets" lineno="77319">
 <summary>
 Relabel packets to sip_server the packet type.
 </summary>
@@ -58234,7 +58051,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77218">
+<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77341">
 <summary>
 Send and receive TCP traffic on the sixxsconfig port.
 </summary>
@@ -58245,7 +58062,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77233">
+<interface name="corenet_udp_send_sixxsconfig_port" lineno="77356">
 <summary>
 Send UDP traffic on the sixxsconfig port.
 </summary>
@@ -58256,7 +58073,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77248">
+<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77371">
 <summary>
 Do not audit attempts to send UDP traffic on the sixxsconfig port.
 </summary>
@@ -58267,7 +58084,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77263">
+<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77386">
 <summary>
 Receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58278,7 +58095,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77278">
+<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77401">
 <summary>
 Do not audit attempts to receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58289,7 +58106,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77293">
+<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77416">
 <summary>
 Send and receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58300,7 +58117,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77309">
+<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77432">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sixxsconfig port.
@@ -58312,7 +58129,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77324">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77447">
 <summary>
 Bind TCP sockets to the sixxsconfig port.
 </summary>
@@ -58323,7 +58140,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77344">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77467">
 <summary>
 Bind UDP sockets to the sixxsconfig port.
 </summary>
@@ -58334,7 +58151,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77363">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77486">
 <summary>
 Make a TCP connection to the sixxsconfig port.
 </summary>
@@ -58344,7 +58161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77383">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="77506">
 <summary>
 Send sixxsconfig_client packets.
 </summary>
@@ -58355,7 +58172,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77402">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77525">
 <summary>
 Do not audit attempts to send sixxsconfig_client packets.
 </summary>
@@ -58366,7 +58183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77421">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77544">
 <summary>
 Receive sixxsconfig_client packets.
 </summary>
@@ -58377,7 +58194,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77440">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77563">
 <summary>
 Do not audit attempts to receive sixxsconfig_client packets.
 </summary>
@@ -58388,7 +58205,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77459">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77582">
 <summary>
 Send and receive sixxsconfig_client packets.
 </summary>
@@ -58399,7 +58216,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77475">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77598">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_client packets.
 </summary>
@@ -58410,7 +58227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77490">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77613">
 <summary>
 Relabel packets to sixxsconfig_client the packet type.
 </summary>
@@ -58420,7 +58237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="77510">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="77633">
 <summary>
 Send sixxsconfig_server packets.
 </summary>
@@ -58431,7 +58248,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77529">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77652">
 <summary>
 Do not audit attempts to send sixxsconfig_server packets.
 </summary>
@@ -58442,7 +58259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77548">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77671">
 <summary>
 Receive sixxsconfig_server packets.
 </summary>
@@ -58453,7 +58270,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77567">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77690">
 <summary>
 Do not audit attempts to receive sixxsconfig_server packets.
 </summary>
@@ -58464,7 +58281,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77586">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77709">
 <summary>
 Send and receive sixxsconfig_server packets.
 </summary>
@@ -58475,7 +58292,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77602">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77725">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_server packets.
 </summary>
@@ -58486,7 +58303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77617">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77740">
 <summary>
 Relabel packets to sixxsconfig_server the packet type.
 </summary>
@@ -58496,7 +58313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77639">
+<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77762">
 <summary>
 Send and receive TCP traffic on the smbd port.
 </summary>
@@ -58507,7 +58324,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_smbd_port" lineno="77654">
+<interface name="corenet_udp_send_smbd_port" lineno="77777">
 <summary>
 Send UDP traffic on the smbd port.
 </summary>
@@ -58518,7 +58335,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77669">
+<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77792">
 <summary>
 Do not audit attempts to send UDP traffic on the smbd port.
 </summary>
@@ -58529,7 +58346,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="77684">
+<interface name="corenet_udp_receive_smbd_port" lineno="77807">
 <summary>
 Receive UDP traffic on the smbd port.
 </summary>
@@ -58540,7 +58357,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77699">
+<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77822">
 <summary>
 Do not audit attempts to receive UDP traffic on the smbd port.
 </summary>
@@ -58551,7 +58368,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="77714">
+<interface name="corenet_udp_sendrecv_smbd_port" lineno="77837">
 <summary>
 Send and receive UDP traffic on the smbd port.
 </summary>
@@ -58562,7 +58379,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77730">
+<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77853">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the smbd port.
@@ -58574,7 +58391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="77745">
+<interface name="corenet_tcp_bind_smbd_port" lineno="77868">
 <summary>
 Bind TCP sockets to the smbd port.
 </summary>
@@ -58585,7 +58402,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="77765">
+<interface name="corenet_udp_bind_smbd_port" lineno="77888">
 <summary>
 Bind UDP sockets to the smbd port.
 </summary>
@@ -58596,7 +58413,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="77784">
+<interface name="corenet_tcp_connect_smbd_port" lineno="77907">
 <summary>
 Make a TCP connection to the smbd port.
 </summary>
@@ -58606,7 +58423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_client_packets" lineno="77804">
+<interface name="corenet_send_smbd_client_packets" lineno="77927">
 <summary>
 Send smbd_client packets.
 </summary>
@@ -58617,7 +58434,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77823">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77946">
 <summary>
 Do not audit attempts to send smbd_client packets.
 </summary>
@@ -58628,7 +58445,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="77842">
+<interface name="corenet_receive_smbd_client_packets" lineno="77965">
 <summary>
 Receive smbd_client packets.
 </summary>
@@ -58639,7 +58456,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77861">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77984">
 <summary>
 Do not audit attempts to receive smbd_client packets.
 </summary>
@@ -58650,7 +58467,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="77880">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="78003">
 <summary>
 Send and receive smbd_client packets.
 </summary>
@@ -58661,7 +58478,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="77896">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78019">
 <summary>
 Do not audit attempts to send and receive smbd_client packets.
 </summary>
@@ -58672,7 +58489,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="77911">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="78034">
 <summary>
 Relabel packets to smbd_client the packet type.
 </summary>
@@ -58682,7 +58499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_server_packets" lineno="77931">
+<interface name="corenet_send_smbd_server_packets" lineno="78054">
 <summary>
 Send smbd_server packets.
 </summary>
@@ -58693,7 +58510,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="77950">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78073">
 <summary>
 Do not audit attempts to send smbd_server packets.
 </summary>
@@ -58704,7 +58521,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="77969">
+<interface name="corenet_receive_smbd_server_packets" lineno="78092">
 <summary>
 Receive smbd_server packets.
 </summary>
@@ -58715,7 +58532,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="77988">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78111">
 <summary>
 Do not audit attempts to receive smbd_server packets.
 </summary>
@@ -58726,7 +58543,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78007">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="78130">
 <summary>
 Send and receive smbd_server packets.
 </summary>
@@ -58737,7 +58554,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78023">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78146">
 <summary>
 Do not audit attempts to send and receive smbd_server packets.
 </summary>
@@ -58748,7 +58565,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78038">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="78161">
 <summary>
 Relabel packets to smbd_server the packet type.
 </summary>
@@ -58758,7 +58575,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78060">
+<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78183">
 <summary>
 Send and receive TCP traffic on the smtp port.
 </summary>
@@ -58769,7 +58586,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78075">
+<interface name="corenet_udp_send_smtp_port" lineno="78198">
 <summary>
 Send UDP traffic on the smtp port.
 </summary>
@@ -58780,7 +58597,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78090">
+<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78213">
 <summary>
 Do not audit attempts to send UDP traffic on the smtp port.
 </summary>
@@ -58791,7 +58608,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78105">
+<interface name="corenet_udp_receive_smtp_port" lineno="78228">
 <summary>
 Receive UDP traffic on the smtp port.
 </summary>
@@ -58802,7 +58619,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78120">
+<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78243">
 <summary>
 Do not audit attempts to receive UDP traffic on the smtp port.
 </summary>
@@ -58813,7 +58630,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78135">
+<interface name="corenet_udp_sendrecv_smtp_port" lineno="78258">
 <summary>
 Send and receive UDP traffic on the smtp port.
 </summary>
@@ -58824,7 +58641,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78151">
+<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78274">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the smtp port.
@@ -58836,7 +58653,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78166">
+<interface name="corenet_tcp_bind_smtp_port" lineno="78289">
 <summary>
 Bind TCP sockets to the smtp port.
 </summary>
@@ -58847,7 +58664,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78186">
+<interface name="corenet_udp_bind_smtp_port" lineno="78309">
 <summary>
 Bind UDP sockets to the smtp port.
 </summary>
@@ -58858,7 +58675,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78205">
+<interface name="corenet_tcp_connect_smtp_port" lineno="78328">
 <summary>
 Make a TCP connection to the smtp port.
 </summary>
@@ -58868,7 +58685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78225">
+<interface name="corenet_send_smtp_client_packets" lineno="78348">
 <summary>
 Send smtp_client packets.
 </summary>
@@ -58879,7 +58696,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78244">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78367">
 <summary>
 Do not audit attempts to send smtp_client packets.
 </summary>
@@ -58890,7 +58707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78263">
+<interface name="corenet_receive_smtp_client_packets" lineno="78386">
 <summary>
 Receive smtp_client packets.
 </summary>
@@ -58901,7 +58718,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78282">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78405">
 <summary>
 Do not audit attempts to receive smtp_client packets.
 </summary>
@@ -58912,7 +58729,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78301">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="78424">
 <summary>
 Send and receive smtp_client packets.
 </summary>
@@ -58923,7 +58740,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78317">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78440">
 <summary>
 Do not audit attempts to send and receive smtp_client packets.
 </summary>
@@ -58934,7 +58751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78332">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="78455">
 <summary>
 Relabel packets to smtp_client the packet type.
 </summary>
@@ -58944,7 +58761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78352">
+<interface name="corenet_send_smtp_server_packets" lineno="78475">
 <summary>
 Send smtp_server packets.
 </summary>
@@ -58955,7 +58772,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78371">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78494">
 <summary>
 Do not audit attempts to send smtp_server packets.
 </summary>
@@ -58966,7 +58783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78390">
+<interface name="corenet_receive_smtp_server_packets" lineno="78513">
 <summary>
 Receive smtp_server packets.
 </summary>
@@ -58977,7 +58794,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78409">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78532">
 <summary>
 Do not audit attempts to receive smtp_server packets.
 </summary>
@@ -58988,7 +58805,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78428">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="78551">
 <summary>
 Send and receive smtp_server packets.
 </summary>
@@ -58999,7 +58816,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78444">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78567">
 <summary>
 Do not audit attempts to send and receive smtp_server packets.
 </summary>
@@ -59010,7 +58827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="78459">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="78582">
 <summary>
 Relabel packets to smtp_server the packet type.
 </summary>
@@ -59020,7 +58837,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78481">
+<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78604">
 <summary>
 Send and receive TCP traffic on the snmp port.
 </summary>
@@ -59031,7 +58848,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_snmp_port" lineno="78496">
+<interface name="corenet_udp_send_snmp_port" lineno="78619">
 <summary>
 Send UDP traffic on the snmp port.
 </summary>
@@ -59042,7 +58859,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78511">
+<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78634">
 <summary>
 Do not audit attempts to send UDP traffic on the snmp port.
 </summary>
@@ -59053,7 +58870,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="78526">
+<interface name="corenet_udp_receive_snmp_port" lineno="78649">
 <summary>
 Receive UDP traffic on the snmp port.
 </summary>
@@ -59064,7 +58881,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78541">
+<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78664">
 <summary>
 Do not audit attempts to receive UDP traffic on the snmp port.
 </summary>
@@ -59075,7 +58892,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="78556">
+<interface name="corenet_udp_sendrecv_snmp_port" lineno="78679">
 <summary>
 Send and receive UDP traffic on the snmp port.
 </summary>
@@ -59086,7 +58903,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78572">
+<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78695">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the snmp port.
@@ -59098,7 +58915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="78587">
+<interface name="corenet_tcp_bind_snmp_port" lineno="78710">
 <summary>
 Bind TCP sockets to the snmp port.
 </summary>
@@ -59109,7 +58926,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="78607">
+<interface name="corenet_udp_bind_snmp_port" lineno="78730">
 <summary>
 Bind UDP sockets to the snmp port.
 </summary>
@@ -59120,7 +58937,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="78626">
+<interface name="corenet_tcp_connect_snmp_port" lineno="78749">
 <summary>
 Make a TCP connection to the snmp port.
 </summary>
@@ -59130,7 +58947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_client_packets" lineno="78646">
+<interface name="corenet_send_snmp_client_packets" lineno="78769">
 <summary>
 Send snmp_client packets.
 </summary>
@@ -59141,7 +58958,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78665">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78788">
 <summary>
 Do not audit attempts to send snmp_client packets.
 </summary>
@@ -59152,7 +58969,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="78684">
+<interface name="corenet_receive_snmp_client_packets" lineno="78807">
 <summary>
 Receive snmp_client packets.
 </summary>
@@ -59163,7 +58980,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78703">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78826">
 <summary>
 Do not audit attempts to receive snmp_client packets.
 </summary>
@@ -59174,7 +58991,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="78722">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="78845">
 <summary>
 Send and receive snmp_client packets.
 </summary>
@@ -59185,7 +59002,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78738">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78861">
 <summary>
 Do not audit attempts to send and receive snmp_client packets.
 </summary>
@@ -59196,7 +59013,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="78753">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="78876">
 <summary>
 Relabel packets to snmp_client the packet type.
 </summary>
@@ -59206,7 +59023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_server_packets" lineno="78773">
+<interface name="corenet_send_snmp_server_packets" lineno="78896">
 <summary>
 Send snmp_server packets.
 </summary>
@@ -59217,7 +59034,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78792">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78915">
 <summary>
 Do not audit attempts to send snmp_server packets.
 </summary>
@@ -59228,7 +59045,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="78811">
+<interface name="corenet_receive_snmp_server_packets" lineno="78934">
 <summary>
 Receive snmp_server packets.
 </summary>
@@ -59239,7 +59056,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78830">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78953">
 <summary>
 Do not audit attempts to receive snmp_server packets.
 </summary>
@@ -59250,7 +59067,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="78849">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="78972">
 <summary>
 Send and receive snmp_server packets.
 </summary>
@@ -59261,7 +59078,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78865">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78988">
 <summary>
 Do not audit attempts to send and receive snmp_server packets.
 </summary>
@@ -59272,7 +59089,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="78880">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="79003">
 <summary>
 Relabel packets to snmp_server the packet type.
 </summary>
@@ -59282,7 +59099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="78902">
+<interface name="corenet_tcp_sendrecv_socks_port" lineno="79025">
 <summary>
 Send and receive TCP traffic on the socks port.
 </summary>
@@ -59293,7 +59110,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_socks_port" lineno="78917">
+<interface name="corenet_udp_send_socks_port" lineno="79040">
 <summary>
 Send UDP traffic on the socks port.
 </summary>
@@ -59304,7 +59121,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="78932">
+<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79055">
 <summary>
 Do not audit attempts to send UDP traffic on the socks port.
 </summary>
@@ -59315,7 +59132,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_socks_port" lineno="78947">
+<interface name="corenet_udp_receive_socks_port" lineno="79070">
 <summary>
 Receive UDP traffic on the socks port.
 </summary>
@@ -59326,7 +59143,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="78962">
+<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79085">
 <summary>
 Do not audit attempts to receive UDP traffic on the socks port.
 </summary>
@@ -59337,7 +59154,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="78977">
+<interface name="corenet_udp_sendrecv_socks_port" lineno="79100">
 <summary>
 Send and receive UDP traffic on the socks port.
 </summary>
@@ -59348,7 +59165,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="78993">
+<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79116">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the socks port.
@@ -59360,7 +59177,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79008">
+<interface name="corenet_tcp_bind_socks_port" lineno="79131">
 <summary>
 Bind TCP sockets to the socks port.
 </summary>
@@ -59371,7 +59188,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79028">
+<interface name="corenet_udp_bind_socks_port" lineno="79151">
 <summary>
 Bind UDP sockets to the socks port.
 </summary>
@@ -59382,7 +59199,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79047">
+<interface name="corenet_tcp_connect_socks_port" lineno="79170">
 <summary>
 Make a TCP connection to the socks port.
 </summary>
@@ -59392,7 +59209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_client_packets" lineno="79067">
+<interface name="corenet_send_socks_client_packets" lineno="79190">
 <summary>
 Send socks_client packets.
 </summary>
@@ -59403,7 +59220,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79086">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79209">
 <summary>
 Do not audit attempts to send socks_client packets.
 </summary>
@@ -59414,7 +59231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79105">
+<interface name="corenet_receive_socks_client_packets" lineno="79228">
 <summary>
 Receive socks_client packets.
 </summary>
@@ -59425,7 +59242,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79124">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79247">
 <summary>
 Do not audit attempts to receive socks_client packets.
 </summary>
@@ -59436,7 +59253,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79143">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="79266">
 <summary>
 Send and receive socks_client packets.
 </summary>
@@ -59447,7 +59264,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79159">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79282">
 <summary>
 Do not audit attempts to send and receive socks_client packets.
 </summary>
@@ -59458,7 +59275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79174">
+<interface name="corenet_relabelto_socks_client_packets" lineno="79297">
 <summary>
 Relabel packets to socks_client the packet type.
 </summary>
@@ -59468,7 +59285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_server_packets" lineno="79194">
+<interface name="corenet_send_socks_server_packets" lineno="79317">
 <summary>
 Send socks_server packets.
 </summary>
@@ -59479,7 +59296,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79213">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79336">
 <summary>
 Do not audit attempts to send socks_server packets.
 </summary>
@@ -59490,7 +59307,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79232">
+<interface name="corenet_receive_socks_server_packets" lineno="79355">
 <summary>
 Receive socks_server packets.
 </summary>
@@ -59501,7 +59318,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79251">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79374">
 <summary>
 Do not audit attempts to receive socks_server packets.
 </summary>
@@ -59512,7 +59329,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79270">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="79393">
 <summary>
 Send and receive socks_server packets.
 </summary>
@@ -59523,7 +59340,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79286">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79409">
 <summary>
 Do not audit attempts to send and receive socks_server packets.
 </summary>
@@ -59534,7 +59351,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79301">
+<interface name="corenet_relabelto_socks_server_packets" lineno="79424">
 <summary>
 Relabel packets to socks_server the packet type.
 </summary>
@@ -59544,7 +59361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79323">
+<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79446">
 <summary>
 Send and receive TCP traffic on the soundd port.
 </summary>
@@ -59555,7 +59372,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79338">
+<interface name="corenet_udp_send_soundd_port" lineno="79461">
 <summary>
 Send UDP traffic on the soundd port.
 </summary>
@@ -59566,7 +59383,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79353">
+<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79476">
 <summary>
 Do not audit attempts to send UDP traffic on the soundd port.
 </summary>
@@ -59577,7 +59394,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79368">
+<interface name="corenet_udp_receive_soundd_port" lineno="79491">
 <summary>
 Receive UDP traffic on the soundd port.
 </summary>
@@ -59588,7 +59405,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79383">
+<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79506">
 <summary>
 Do not audit attempts to receive UDP traffic on the soundd port.
 </summary>
@@ -59599,7 +59416,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79398">
+<interface name="corenet_udp_sendrecv_soundd_port" lineno="79521">
 <summary>
 Send and receive UDP traffic on the soundd port.
 </summary>
@@ -59610,7 +59427,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79414">
+<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79537">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the soundd port.
@@ -59622,7 +59439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79429">
+<interface name="corenet_tcp_bind_soundd_port" lineno="79552">
 <summary>
 Bind TCP sockets to the soundd port.
 </summary>
@@ -59633,7 +59450,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="79449">
+<interface name="corenet_udp_bind_soundd_port" lineno="79572">
 <summary>
 Bind UDP sockets to the soundd port.
 </summary>
@@ -59644,7 +59461,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="79468">
+<interface name="corenet_tcp_connect_soundd_port" lineno="79591">
 <summary>
 Make a TCP connection to the soundd port.
 </summary>
@@ -59654,7 +59471,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_client_packets" lineno="79488">
+<interface name="corenet_send_soundd_client_packets" lineno="79611">
 <summary>
 Send soundd_client packets.
 </summary>
@@ -59665,7 +59482,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79507">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79630">
 <summary>
 Do not audit attempts to send soundd_client packets.
 </summary>
@@ -59676,7 +59493,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="79526">
+<interface name="corenet_receive_soundd_client_packets" lineno="79649">
 <summary>
 Receive soundd_client packets.
 </summary>
@@ -59687,7 +59504,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79545">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79668">
 <summary>
 Do not audit attempts to receive soundd_client packets.
 </summary>
@@ -59698,7 +59515,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="79564">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="79687">
 <summary>
 Send and receive soundd_client packets.
 </summary>
@@ -59709,7 +59526,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79580">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79703">
 <summary>
 Do not audit attempts to send and receive soundd_client packets.
 </summary>
@@ -59720,7 +59537,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="79595">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="79718">
 <summary>
 Relabel packets to soundd_client the packet type.
 </summary>
@@ -59730,7 +59547,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_server_packets" lineno="79615">
+<interface name="corenet_send_soundd_server_packets" lineno="79738">
 <summary>
 Send soundd_server packets.
 </summary>
@@ -59741,7 +59558,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79634">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79757">
 <summary>
 Do not audit attempts to send soundd_server packets.
 </summary>
@@ -59752,7 +59569,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="79653">
+<interface name="corenet_receive_soundd_server_packets" lineno="79776">
 <summary>
 Receive soundd_server packets.
 </summary>
@@ -59763,7 +59580,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79672">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79795">
 <summary>
 Do not audit attempts to receive soundd_server packets.
 </summary>
@@ -59774,7 +59591,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="79691">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="79814">
 <summary>
 Send and receive soundd_server packets.
 </summary>
@@ -59785,7 +59602,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79707">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79830">
 <summary>
 Do not audit attempts to send and receive soundd_server packets.
 </summary>
@@ -59796,7 +59613,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="79722">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="79845">
 <summary>
 Relabel packets to soundd_server the packet type.
 </summary>
@@ -59806,7 +59623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79744">
+<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79867">
 <summary>
 Send and receive TCP traffic on the spamd port.
 </summary>
@@ -59817,7 +59634,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_spamd_port" lineno="79759">
+<interface name="corenet_udp_send_spamd_port" lineno="79882">
 <summary>
 Send UDP traffic on the spamd port.
 </summary>
@@ -59828,7 +59645,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79774">
+<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79897">
 <summary>
 Do not audit attempts to send UDP traffic on the spamd port.
 </summary>
@@ -59839,7 +59656,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="79789">
+<interface name="corenet_udp_receive_spamd_port" lineno="79912">
 <summary>
 Receive UDP traffic on the spamd port.
 </summary>
@@ -59850,7 +59667,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79804">
+<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79927">
 <summary>
 Do not audit attempts to receive UDP traffic on the spamd port.
 </summary>
@@ -59861,7 +59678,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="79819">
+<interface name="corenet_udp_sendrecv_spamd_port" lineno="79942">
 <summary>
 Send and receive UDP traffic on the spamd port.
 </summary>
@@ -59872,7 +59689,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79835">
+<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79958">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the spamd port.
@@ -59884,7 +59701,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="79850">
+<interface name="corenet_tcp_bind_spamd_port" lineno="79973">
 <summary>
 Bind TCP sockets to the spamd port.
 </summary>
@@ -59895,7 +59712,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="79870">
+<interface name="corenet_udp_bind_spamd_port" lineno="79993">
 <summary>
 Bind UDP sockets to the spamd port.
 </summary>
@@ -59906,7 +59723,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="79889">
+<interface name="corenet_tcp_connect_spamd_port" lineno="80012">
 <summary>
 Make a TCP connection to the spamd port.
 </summary>
@@ -59916,7 +59733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_client_packets" lineno="79909">
+<interface name="corenet_send_spamd_client_packets" lineno="80032">
 <summary>
 Send spamd_client packets.
 </summary>
@@ -59927,7 +59744,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="79928">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80051">
 <summary>
 Do not audit attempts to send spamd_client packets.
 </summary>
@@ -59938,7 +59755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="79947">
+<interface name="corenet_receive_spamd_client_packets" lineno="80070">
 <summary>
 Receive spamd_client packets.
 </summary>
@@ -59949,7 +59766,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="79966">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80089">
 <summary>
 Do not audit attempts to receive spamd_client packets.
 </summary>
@@ -59960,7 +59777,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="79985">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="80108">
 <summary>
 Send and receive spamd_client packets.
 </summary>
@@ -59971,7 +59788,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80001">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80124">
 <summary>
 Do not audit attempts to send and receive spamd_client packets.
 </summary>
@@ -59982,7 +59799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80016">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="80139">
 <summary>
 Relabel packets to spamd_client the packet type.
 </summary>
@@ -59992,7 +59809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80036">
+<interface name="corenet_send_spamd_server_packets" lineno="80159">
 <summary>
 Send spamd_server packets.
 </summary>
@@ -60003,7 +59820,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80055">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80178">
 <summary>
 Do not audit attempts to send spamd_server packets.
 </summary>
@@ -60014,7 +59831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80074">
+<interface name="corenet_receive_spamd_server_packets" lineno="80197">
 <summary>
 Receive spamd_server packets.
 </summary>
@@ -60025,7 +59842,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80093">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80216">
 <summary>
 Do not audit attempts to receive spamd_server packets.
 </summary>
@@ -60036,7 +59853,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80112">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="80235">
 <summary>
 Send and receive spamd_server packets.
 </summary>
@@ -60047,7 +59864,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80128">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80251">
 <summary>
 Do not audit attempts to send and receive spamd_server packets.
 </summary>
@@ -60058,7 +59875,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80143">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="80266">
 <summary>
 Relabel packets to spamd_server the packet type.
 </summary>
@@ -60068,7 +59885,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80165">
+<interface name="corenet_tcp_sendrecv_speech_port" lineno="80288">
 <summary>
 Send and receive TCP traffic on the speech port.
 </summary>
@@ -60079,7 +59896,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_speech_port" lineno="80180">
+<interface name="corenet_udp_send_speech_port" lineno="80303">
 <summary>
 Send UDP traffic on the speech port.
 </summary>
@@ -60090,7 +59907,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80195">
+<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80318">
 <summary>
 Do not audit attempts to send UDP traffic on the speech port.
 </summary>
@@ -60101,7 +59918,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80210">
+<interface name="corenet_udp_receive_speech_port" lineno="80333">
 <summary>
 Receive UDP traffic on the speech port.
 </summary>
@@ -60112,7 +59929,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80225">
+<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80348">
 <summary>
 Do not audit attempts to receive UDP traffic on the speech port.
 </summary>
@@ -60123,7 +59940,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80240">
+<interface name="corenet_udp_sendrecv_speech_port" lineno="80363">
 <summary>
 Send and receive UDP traffic on the speech port.
 </summary>
@@ -60134,7 +59951,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80256">
+<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80379">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the speech port.
@@ -60146,7 +59963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80271">
+<interface name="corenet_tcp_bind_speech_port" lineno="80394">
 <summary>
 Bind TCP sockets to the speech port.
 </summary>
@@ -60157,7 +59974,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80291">
+<interface name="corenet_udp_bind_speech_port" lineno="80414">
 <summary>
 Bind UDP sockets to the speech port.
 </summary>
@@ -60168,7 +59985,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80310">
+<interface name="corenet_tcp_connect_speech_port" lineno="80433">
 <summary>
 Make a TCP connection to the speech port.
 </summary>
@@ -60178,7 +59995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_client_packets" lineno="80330">
+<interface name="corenet_send_speech_client_packets" lineno="80453">
 <summary>
 Send speech_client packets.
 </summary>
@@ -60189,7 +60006,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80349">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80472">
 <summary>
 Do not audit attempts to send speech_client packets.
 </summary>
@@ -60200,7 +60017,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80368">
+<interface name="corenet_receive_speech_client_packets" lineno="80491">
 <summary>
 Receive speech_client packets.
 </summary>
@@ -60211,7 +60028,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80387">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80510">
 <summary>
 Do not audit attempts to receive speech_client packets.
 </summary>
@@ -60222,7 +60039,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80406">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="80529">
 <summary>
 Send and receive speech_client packets.
 </summary>
@@ -60233,7 +60050,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80422">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80545">
 <summary>
 Do not audit attempts to send and receive speech_client packets.
 </summary>
@@ -60244,7 +60061,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80437">
+<interface name="corenet_relabelto_speech_client_packets" lineno="80560">
 <summary>
 Relabel packets to speech_client the packet type.
 </summary>
@@ -60254,7 +60071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_server_packets" lineno="80457">
+<interface name="corenet_send_speech_server_packets" lineno="80580">
 <summary>
 Send speech_server packets.
 </summary>
@@ -60265,7 +60082,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80476">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80599">
 <summary>
 Do not audit attempts to send speech_server packets.
 </summary>
@@ -60276,7 +60093,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_server_packets" lineno="80495">
+<interface name="corenet_receive_speech_server_packets" lineno="80618">
 <summary>
 Receive speech_server packets.
 </summary>
@@ -60287,7 +60104,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80514">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80637">
 <summary>
 Do not audit attempts to receive speech_server packets.
 </summary>
@@ -60298,7 +60115,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="80533">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="80656">
 <summary>
 Send and receive speech_server packets.
 </summary>
@@ -60309,7 +60126,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80549">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80672">
 <summary>
 Do not audit attempts to send and receive speech_server packets.
 </summary>
@@ -60320,7 +60137,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="80564">
+<interface name="corenet_relabelto_speech_server_packets" lineno="80687">
 <summary>
 Relabel packets to speech_server the packet type.
 </summary>
@@ -60330,7 +60147,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="80586">
+<interface name="corenet_tcp_sendrecv_squid_port" lineno="80709">
 <summary>
 Send and receive TCP traffic on the squid port.
 </summary>
@@ -60341,7 +60158,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_squid_port" lineno="80601">
+<interface name="corenet_udp_send_squid_port" lineno="80724">
 <summary>
 Send UDP traffic on the squid port.
 </summary>
@@ -60352,7 +60169,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80616">
+<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80739">
 <summary>
 Do not audit attempts to send UDP traffic on the squid port.
 </summary>
@@ -60363,7 +60180,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_squid_port" lineno="80631">
+<interface name="corenet_udp_receive_squid_port" lineno="80754">
 <summary>
 Receive UDP traffic on the squid port.
 </summary>
@@ -60374,7 +60191,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80646">
+<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80769">
 <summary>
 Do not audit attempts to receive UDP traffic on the squid port.
 </summary>
@@ -60385,7 +60202,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="80661">
+<interface name="corenet_udp_sendrecv_squid_port" lineno="80784">
 <summary>
 Send and receive UDP traffic on the squid port.
 </summary>
@@ -60396,7 +60213,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80677">
+<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80800">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the squid port.
@@ -60408,7 +60225,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="80692">
+<interface name="corenet_tcp_bind_squid_port" lineno="80815">
 <summary>
 Bind TCP sockets to the squid port.
 </summary>
@@ -60419,7 +60236,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_squid_port" lineno="80712">
+<interface name="corenet_udp_bind_squid_port" lineno="80835">
 <summary>
 Bind UDP sockets to the squid port.
 </summary>
@@ -60430,7 +60247,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="80731">
+<interface name="corenet_tcp_connect_squid_port" lineno="80854">
 <summary>
 Make a TCP connection to the squid port.
 </summary>
@@ -60440,7 +60257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_client_packets" lineno="80751">
+<interface name="corenet_send_squid_client_packets" lineno="80874">
 <summary>
 Send squid_client packets.
 </summary>
@@ -60451,7 +60268,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80770">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80893">
 <summary>
 Do not audit attempts to send squid_client packets.
 </summary>
@@ -60462,7 +60279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_client_packets" lineno="80789">
+<interface name="corenet_receive_squid_client_packets" lineno="80912">
 <summary>
 Receive squid_client packets.
 </summary>
@@ -60473,7 +60290,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80808">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80931">
 <summary>
 Do not audit attempts to receive squid_client packets.
 </summary>
@@ -60484,7 +60301,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="80827">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="80950">
 <summary>
 Send and receive squid_client packets.
 </summary>
@@ -60495,7 +60312,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80843">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80966">
 <summary>
 Do not audit attempts to send and receive squid_client packets.
 </summary>
@@ -60506,7 +60323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="80858">
+<interface name="corenet_relabelto_squid_client_packets" lineno="80981">
 <summary>
 Relabel packets to squid_client the packet type.
 </summary>
@@ -60516,7 +60333,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_server_packets" lineno="80878">
+<interface name="corenet_send_squid_server_packets" lineno="81001">
 <summary>
 Send squid_server packets.
 </summary>
@@ -60527,7 +60344,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="80897">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81020">
 <summary>
 Do not audit attempts to send squid_server packets.
 </summary>
@@ -60538,7 +60355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_server_packets" lineno="80916">
+<interface name="corenet_receive_squid_server_packets" lineno="81039">
 <summary>
 Receive squid_server packets.
 </summary>
@@ -60549,7 +60366,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="80935">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81058">
 <summary>
 Do not audit attempts to receive squid_server packets.
 </summary>
@@ -60560,7 +60377,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="80954">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="81077">
 <summary>
 Send and receive squid_server packets.
 </summary>
@@ -60571,7 +60388,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="80970">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81093">
 <summary>
 Do not audit attempts to send and receive squid_server packets.
 </summary>
@@ -60582,7 +60399,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="80985">
+<interface name="corenet_relabelto_squid_server_packets" lineno="81108">
 <summary>
 Relabel packets to squid_server the packet type.
 </summary>
@@ -60592,7 +60409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81007">
+<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81130">
 <summary>
 Send and receive TCP traffic on the ssdp port.
 </summary>
@@ -60603,7 +60420,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81022">
+<interface name="corenet_udp_send_ssdp_port" lineno="81145">
 <summary>
 Send UDP traffic on the ssdp port.
 </summary>
@@ -60614,7 +60431,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81037">
+<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81160">
 <summary>
 Do not audit attempts to send UDP traffic on the ssdp port.
 </summary>
@@ -60625,7 +60442,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81052">
+<interface name="corenet_udp_receive_ssdp_port" lineno="81175">
 <summary>
 Receive UDP traffic on the ssdp port.
 </summary>
@@ -60636,7 +60453,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81067">
+<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81190">
 <summary>
 Do not audit attempts to receive UDP traffic on the ssdp port.
 </summary>
@@ -60647,7 +60464,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81082">
+<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81205">
 <summary>
 Send and receive UDP traffic on the ssdp port.
 </summary>
@@ -60658,7 +60475,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81098">
+<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81221">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ssdp port.
@@ -60670,7 +60487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81113">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="81236">
 <summary>
 Bind TCP sockets to the ssdp port.
 </summary>
@@ -60681,7 +60498,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81133">
+<interface name="corenet_udp_bind_ssdp_port" lineno="81256">
 <summary>
 Bind UDP sockets to the ssdp port.
 </summary>
@@ -60692,7 +60509,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81152">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="81275">
 <summary>
 Make a TCP connection to the ssdp port.
 </summary>
@@ -60702,7 +60519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81172">
+<interface name="corenet_send_ssdp_client_packets" lineno="81295">
 <summary>
 Send ssdp_client packets.
 </summary>
@@ -60713,7 +60530,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81191">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81314">
 <summary>
 Do not audit attempts to send ssdp_client packets.
 </summary>
@@ -60724,7 +60541,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81210">
+<interface name="corenet_receive_ssdp_client_packets" lineno="81333">
 <summary>
 Receive ssdp_client packets.
 </summary>
@@ -60735,7 +60552,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81229">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81352">
 <summary>
 Do not audit attempts to receive ssdp_client packets.
 </summary>
@@ -60746,7 +60563,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81248">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81371">
 <summary>
 Send and receive ssdp_client packets.
 </summary>
@@ -60757,7 +60574,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81264">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81387">
 <summary>
 Do not audit attempts to send and receive ssdp_client packets.
 </summary>
@@ -60768,7 +60585,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81279">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="81402">
 <summary>
 Relabel packets to ssdp_client the packet type.
 </summary>
@@ -60778,7 +60595,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81299">
+<interface name="corenet_send_ssdp_server_packets" lineno="81422">
 <summary>
 Send ssdp_server packets.
 </summary>
@@ -60789,7 +60606,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81318">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81441">
 <summary>
 Do not audit attempts to send ssdp_server packets.
 </summary>
@@ -60800,7 +60617,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81337">
+<interface name="corenet_receive_ssdp_server_packets" lineno="81460">
 <summary>
 Receive ssdp_server packets.
 </summary>
@@ -60811,7 +60628,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81356">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81479">
 <summary>
 Do not audit attempts to receive ssdp_server packets.
 </summary>
@@ -60822,7 +60639,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81375">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81498">
 <summary>
 Send and receive ssdp_server packets.
 </summary>
@@ -60833,7 +60650,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81391">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81514">
 <summary>
 Do not audit attempts to send and receive ssdp_server packets.
 </summary>
@@ -60844,7 +60661,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81406">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="81529">
 <summary>
 Relabel packets to ssdp_server the packet type.
 </summary>
@@ -60854,7 +60671,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81428">
+<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81551">
 <summary>
 Send and receive TCP traffic on the ssh port.
 </summary>
@@ -60865,7 +60682,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ssh_port" lineno="81443">
+<interface name="corenet_udp_send_ssh_port" lineno="81566">
 <summary>
 Send UDP traffic on the ssh port.
 </summary>
@@ -60876,7 +60693,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81458">
+<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81581">
 <summary>
 Do not audit attempts to send UDP traffic on the ssh port.
 </summary>
@@ -60887,7 +60704,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="81473">
+<interface name="corenet_udp_receive_ssh_port" lineno="81596">
 <summary>
 Receive UDP traffic on the ssh port.
 </summary>
@@ -60898,7 +60715,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81488">
+<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81611">
 <summary>
 Do not audit attempts to receive UDP traffic on the ssh port.
 </summary>
@@ -60909,7 +60726,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="81503">
+<interface name="corenet_udp_sendrecv_ssh_port" lineno="81626">
 <summary>
 Send and receive UDP traffic on the ssh port.
 </summary>
@@ -60920,7 +60737,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81519">
+<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81642">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ssh port.
@@ -60932,7 +60749,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="81534">
+<interface name="corenet_tcp_bind_ssh_port" lineno="81657">
 <summary>
 Bind TCP sockets to the ssh port.
 </summary>
@@ -60943,7 +60760,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="81554">
+<interface name="corenet_udp_bind_ssh_port" lineno="81677">
 <summary>
 Bind UDP sockets to the ssh port.
 </summary>
@@ -60954,7 +60771,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="81573">
+<interface name="corenet_tcp_connect_ssh_port" lineno="81696">
 <summary>
 Make a TCP connection to the ssh port.
 </summary>
@@ -60964,7 +60781,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_client_packets" lineno="81593">
+<interface name="corenet_send_ssh_client_packets" lineno="81716">
 <summary>
 Send ssh_client packets.
 </summary>
@@ -60975,7 +60792,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81612">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81735">
 <summary>
 Do not audit attempts to send ssh_client packets.
 </summary>
@@ -60986,7 +60803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="81631">
+<interface name="corenet_receive_ssh_client_packets" lineno="81754">
 <summary>
 Receive ssh_client packets.
 </summary>
@@ -60997,7 +60814,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81650">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81773">
 <summary>
 Do not audit attempts to receive ssh_client packets.
 </summary>
@@ -61008,7 +60825,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="81669">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="81792">
 <summary>
 Send and receive ssh_client packets.
 </summary>
@@ -61019,7 +60836,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81685">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81808">
 <summary>
 Do not audit attempts to send and receive ssh_client packets.
 </summary>
@@ -61030,7 +60847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="81700">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="81823">
 <summary>
 Relabel packets to ssh_client the packet type.
 </summary>
@@ -61040,7 +60857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_server_packets" lineno="81720">
+<interface name="corenet_send_ssh_server_packets" lineno="81843">
 <summary>
 Send ssh_server packets.
 </summary>
@@ -61051,7 +60868,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81739">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81862">
 <summary>
 Do not audit attempts to send ssh_server packets.
 </summary>
@@ -61062,7 +60879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="81758">
+<interface name="corenet_receive_ssh_server_packets" lineno="81881">
 <summary>
 Receive ssh_server packets.
 </summary>
@@ -61073,7 +60890,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81777">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81900">
 <summary>
 Do not audit attempts to receive ssh_server packets.
 </summary>
@@ -61084,7 +60901,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="81796">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="81919">
 <summary>
 Send and receive ssh_server packets.
 </summary>
@@ -61095,7 +60912,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81812">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81935">
 <summary>
 Do not audit attempts to send and receive ssh_server packets.
 </summary>
@@ -61106,7 +60923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="81827">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="81950">
 <summary>
 Relabel packets to ssh_server the packet type.
 </summary>
@@ -61116,7 +60933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81849">
+<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81972">
 <summary>
 Send and receive TCP traffic on the stunnel port.
 </summary>
@@ -61127,7 +60944,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="81864">
+<interface name="corenet_udp_send_stunnel_port" lineno="81987">
 <summary>
 Send UDP traffic on the stunnel port.
 </summary>
@@ -61138,7 +60955,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="81879">
+<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82002">
 <summary>
 Do not audit attempts to send UDP traffic on the stunnel port.
 </summary>
@@ -61149,7 +60966,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="81894">
+<interface name="corenet_udp_receive_stunnel_port" lineno="82017">
 <summary>
 Receive UDP traffic on the stunnel port.
 </summary>
@@ -61160,7 +60977,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="81909">
+<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82032">
 <summary>
 Do not audit attempts to receive UDP traffic on the stunnel port.
 </summary>
@@ -61171,7 +60988,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="81924">
+<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82047">
 <summary>
 Send and receive UDP traffic on the stunnel port.
 </summary>
@@ -61182,7 +60999,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="81940">
+<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82063">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the stunnel port.
@@ -61194,7 +61011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="81955">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="82078">
 <summary>
 Bind TCP sockets to the stunnel port.
 </summary>
@@ -61205,7 +61022,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="81975">
+<interface name="corenet_udp_bind_stunnel_port" lineno="82098">
 <summary>
 Bind UDP sockets to the stunnel port.
 </summary>
@@ -61216,7 +61033,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="81994">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="82117">
 <summary>
 Make a TCP connection to the stunnel port.
 </summary>
@@ -61226,7 +61043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82014">
+<interface name="corenet_send_stunnel_client_packets" lineno="82137">
 <summary>
 Send stunnel_client packets.
 </summary>
@@ -61237,7 +61054,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82033">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82156">
 <summary>
 Do not audit attempts to send stunnel_client packets.
 </summary>
@@ -61248,7 +61065,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82052">
+<interface name="corenet_receive_stunnel_client_packets" lineno="82175">
 <summary>
 Receive stunnel_client packets.
 </summary>
@@ -61259,7 +61076,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82071">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82194">
 <summary>
 Do not audit attempts to receive stunnel_client packets.
 </summary>
@@ -61270,7 +61087,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82090">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82213">
 <summary>
 Send and receive stunnel_client packets.
 </summary>
@@ -61281,7 +61098,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82106">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82229">
 <summary>
 Do not audit attempts to send and receive stunnel_client packets.
 </summary>
@@ -61292,7 +61109,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82121">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="82244">
 <summary>
 Relabel packets to stunnel_client the packet type.
 </summary>
@@ -61302,7 +61119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82141">
+<interface name="corenet_send_stunnel_server_packets" lineno="82264">
 <summary>
 Send stunnel_server packets.
 </summary>
@@ -61313,7 +61130,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82160">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82283">
 <summary>
 Do not audit attempts to send stunnel_server packets.
 </summary>
@@ -61324,7 +61141,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82179">
+<interface name="corenet_receive_stunnel_server_packets" lineno="82302">
 <summary>
 Receive stunnel_server packets.
 </summary>
@@ -61335,7 +61152,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82198">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82321">
 <summary>
 Do not audit attempts to receive stunnel_server packets.
 </summary>
@@ -61346,7 +61163,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82217">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82340">
 <summary>
 Send and receive stunnel_server packets.
 </summary>
@@ -61357,7 +61174,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82233">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82356">
 <summary>
 Do not audit attempts to send and receive stunnel_server packets.
 </summary>
@@ -61368,7 +61185,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82248">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="82371">
 <summary>
 Relabel packets to stunnel_server the packet type.
 </summary>
@@ -61378,7 +61195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82270">
+<interface name="corenet_tcp_sendrecv_svn_port" lineno="82393">
 <summary>
 Send and receive TCP traffic on the svn port.
 </summary>
@@ -61389,7 +61206,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_svn_port" lineno="82285">
+<interface name="corenet_udp_send_svn_port" lineno="82408">
 <summary>
 Send UDP traffic on the svn port.
 </summary>
@@ -61400,7 +61217,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82300">
+<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82423">
 <summary>
 Do not audit attempts to send UDP traffic on the svn port.
 </summary>
@@ -61411,7 +61228,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82315">
+<interface name="corenet_udp_receive_svn_port" lineno="82438">
 <summary>
 Receive UDP traffic on the svn port.
 </summary>
@@ -61422,7 +61239,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82330">
+<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82453">
 <summary>
 Do not audit attempts to receive UDP traffic on the svn port.
 </summary>
@@ -61433,7 +61250,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82345">
+<interface name="corenet_udp_sendrecv_svn_port" lineno="82468">
 <summary>
 Send and receive UDP traffic on the svn port.
 </summary>
@@ -61444,7 +61261,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82361">
+<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82484">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the svn port.
@@ -61456,7 +61273,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82376">
+<interface name="corenet_tcp_bind_svn_port" lineno="82499">
 <summary>
 Bind TCP sockets to the svn port.
 </summary>
@@ -61467,7 +61284,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82396">
+<interface name="corenet_udp_bind_svn_port" lineno="82519">
 <summary>
 Bind UDP sockets to the svn port.
 </summary>
@@ -61478,7 +61295,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82415">
+<interface name="corenet_tcp_connect_svn_port" lineno="82538">
 <summary>
 Make a TCP connection to the svn port.
 </summary>
@@ -61488,7 +61305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_client_packets" lineno="82435">
+<interface name="corenet_send_svn_client_packets" lineno="82558">
 <summary>
 Send svn_client packets.
 </summary>
@@ -61499,7 +61316,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82454">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82577">
 <summary>
 Do not audit attempts to send svn_client packets.
 </summary>
@@ -61510,7 +61327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_client_packets" lineno="82473">
+<interface name="corenet_receive_svn_client_packets" lineno="82596">
 <summary>
 Receive svn_client packets.
 </summary>
@@ -61521,7 +61338,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82492">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82615">
 <summary>
 Do not audit attempts to receive svn_client packets.
 </summary>
@@ -61532,7 +61349,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="82511">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="82634">
 <summary>
 Send and receive svn_client packets.
 </summary>
@@ -61543,7 +61360,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82527">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82650">
 <summary>
 Do not audit attempts to send and receive svn_client packets.
 </summary>
@@ -61554,7 +61371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="82542">
+<interface name="corenet_relabelto_svn_client_packets" lineno="82665">
 <summary>
 Relabel packets to svn_client the packet type.
 </summary>
@@ -61564,7 +61381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_server_packets" lineno="82562">
+<interface name="corenet_send_svn_server_packets" lineno="82685">
 <summary>
 Send svn_server packets.
 </summary>
@@ -61575,7 +61392,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82581">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82704">
 <summary>
 Do not audit attempts to send svn_server packets.
 </summary>
@@ -61586,7 +61403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_server_packets" lineno="82600">
+<interface name="corenet_receive_svn_server_packets" lineno="82723">
 <summary>
 Receive svn_server packets.
 </summary>
@@ -61597,7 +61414,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82619">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82742">
 <summary>
 Do not audit attempts to receive svn_server packets.
 </summary>
@@ -61608,7 +61425,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="82638">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="82761">
 <summary>
 Send and receive svn_server packets.
 </summary>
@@ -61619,7 +61436,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82654">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82777">
 <summary>
 Do not audit attempts to send and receive svn_server packets.
 </summary>
@@ -61630,7 +61447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="82669">
+<interface name="corenet_relabelto_svn_server_packets" lineno="82792">
 <summary>
 Relabel packets to svn_server the packet type.
 </summary>
@@ -61640,7 +61457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82691">
+<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82814">
 <summary>
 Send and receive TCP traffic on the svrloc port.
 </summary>
@@ -61651,7 +61468,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="82706">
+<interface name="corenet_udp_send_svrloc_port" lineno="82829">
 <summary>
 Send UDP traffic on the svrloc port.
 </summary>
@@ -61662,7 +61479,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82721">
+<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82844">
 <summary>
 Do not audit attempts to send UDP traffic on the svrloc port.
 </summary>
@@ -61673,7 +61490,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="82736">
+<interface name="corenet_udp_receive_svrloc_port" lineno="82859">
 <summary>
 Receive UDP traffic on the svrloc port.
 </summary>
@@ -61684,7 +61501,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82751">
+<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82874">
 <summary>
 Do not audit attempts to receive UDP traffic on the svrloc port.
 </summary>
@@ -61695,7 +61512,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82766">
+<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82889">
 <summary>
 Send and receive UDP traffic on the svrloc port.
 </summary>
@@ -61706,7 +61523,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82782">
+<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82905">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the svrloc port.
@@ -61718,7 +61535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="82797">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="82920">
 <summary>
 Bind TCP sockets to the svrloc port.
 </summary>
@@ -61729,7 +61546,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="82817">
+<interface name="corenet_udp_bind_svrloc_port" lineno="82940">
 <summary>
 Bind UDP sockets to the svrloc port.
 </summary>
@@ -61740,7 +61557,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="82836">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="82959">
 <summary>
 Make a TCP connection to the svrloc port.
 </summary>
@@ -61750,7 +61567,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="82856">
+<interface name="corenet_send_svrloc_client_packets" lineno="82979">
 <summary>
 Send svrloc_client packets.
 </summary>
@@ -61761,7 +61578,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82875">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82998">
 <summary>
 Do not audit attempts to send svrloc_client packets.
 </summary>
@@ -61772,7 +61589,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="82894">
+<interface name="corenet_receive_svrloc_client_packets" lineno="83017">
 <summary>
 Receive svrloc_client packets.
 </summary>
@@ -61783,7 +61600,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="82913">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83036">
 <summary>
 Do not audit attempts to receive svrloc_client packets.
 </summary>
@@ -61794,7 +61611,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="82932">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83055">
 <summary>
 Send and receive svrloc_client packets.
 </summary>
@@ -61805,7 +61622,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="82948">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83071">
 <summary>
 Do not audit attempts to send and receive svrloc_client packets.
 </summary>
@@ -61816,7 +61633,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="82963">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="83086">
 <summary>
 Relabel packets to svrloc_client the packet type.
 </summary>
@@ -61826,7 +61643,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="82983">
+<interface name="corenet_send_svrloc_server_packets" lineno="83106">
 <summary>
 Send svrloc_server packets.
 </summary>
@@ -61837,7 +61654,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83002">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83125">
 <summary>
 Do not audit attempts to send svrloc_server packets.
 </summary>
@@ -61848,7 +61665,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83021">
+<interface name="corenet_receive_svrloc_server_packets" lineno="83144">
 <summary>
 Receive svrloc_server packets.
 </summary>
@@ -61859,7 +61676,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83040">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83163">
 <summary>
 Do not audit attempts to receive svrloc_server packets.
 </summary>
@@ -61870,7 +61687,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83059">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83182">
 <summary>
 Send and receive svrloc_server packets.
 </summary>
@@ -61881,7 +61698,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83075">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83198">
 <summary>
 Do not audit attempts to send and receive svrloc_server packets.
 </summary>
@@ -61892,7 +61709,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83090">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="83213">
 <summary>
 Relabel packets to svrloc_server the packet type.
 </summary>
@@ -61902,7 +61719,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83112">
+<interface name="corenet_tcp_sendrecv_swat_port" lineno="83235">
 <summary>
 Send and receive TCP traffic on the swat port.
 </summary>
@@ -61913,7 +61730,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_swat_port" lineno="83127">
+<interface name="corenet_udp_send_swat_port" lineno="83250">
 <summary>
 Send UDP traffic on the swat port.
 </summary>
@@ -61924,7 +61741,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83142">
+<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83265">
 <summary>
 Do not audit attempts to send UDP traffic on the swat port.
 </summary>
@@ -61935,7 +61752,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83157">
+<interface name="corenet_udp_receive_swat_port" lineno="83280">
 <summary>
 Receive UDP traffic on the swat port.
 </summary>
@@ -61946,7 +61763,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83172">
+<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83295">
 <summary>
 Do not audit attempts to receive UDP traffic on the swat port.
 </summary>
@@ -61957,7 +61774,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83187">
+<interface name="corenet_udp_sendrecv_swat_port" lineno="83310">
 <summary>
 Send and receive UDP traffic on the swat port.
 </summary>
@@ -61968,7 +61785,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83203">
+<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83326">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the swat port.
@@ -61980,7 +61797,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83218">
+<interface name="corenet_tcp_bind_swat_port" lineno="83341">
 <summary>
 Bind TCP sockets to the swat port.
 </summary>
@@ -61991,7 +61808,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83238">
+<interface name="corenet_udp_bind_swat_port" lineno="83361">
 <summary>
 Bind UDP sockets to the swat port.
 </summary>
@@ -62002,7 +61819,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83257">
+<interface name="corenet_tcp_connect_swat_port" lineno="83380">
 <summary>
 Make a TCP connection to the swat port.
 </summary>
@@ -62012,7 +61829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_client_packets" lineno="83277">
+<interface name="corenet_send_swat_client_packets" lineno="83400">
 <summary>
 Send swat_client packets.
 </summary>
@@ -62023,7 +61840,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83296">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83419">
 <summary>
 Do not audit attempts to send swat_client packets.
 </summary>
@@ -62034,7 +61851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83315">
+<interface name="corenet_receive_swat_client_packets" lineno="83438">
 <summary>
 Receive swat_client packets.
 </summary>
@@ -62045,7 +61862,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83334">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83457">
 <summary>
 Do not audit attempts to receive swat_client packets.
 </summary>
@@ -62056,7 +61873,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83353">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="83476">
 <summary>
 Send and receive swat_client packets.
 </summary>
@@ -62067,7 +61884,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83369">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83492">
 <summary>
 Do not audit attempts to send and receive swat_client packets.
 </summary>
@@ -62078,7 +61895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83384">
+<interface name="corenet_relabelto_swat_client_packets" lineno="83507">
 <summary>
 Relabel packets to swat_client the packet type.
 </summary>
@@ -62088,7 +61905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_server_packets" lineno="83404">
+<interface name="corenet_send_swat_server_packets" lineno="83527">
 <summary>
 Send swat_server packets.
 </summary>
@@ -62099,7 +61916,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83423">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83546">
 <summary>
 Do not audit attempts to send swat_server packets.
 </summary>
@@ -62110,7 +61927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_server_packets" lineno="83442">
+<interface name="corenet_receive_swat_server_packets" lineno="83565">
 <summary>
 Receive swat_server packets.
 </summary>
@@ -62121,7 +61938,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83461">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83584">
 <summary>
 Do not audit attempts to receive swat_server packets.
 </summary>
@@ -62132,7 +61949,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="83480">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="83603">
 <summary>
 Send and receive swat_server packets.
 </summary>
@@ -62143,7 +61960,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83496">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83619">
 <summary>
 Do not audit attempts to send and receive swat_server packets.
 </summary>
@@ -62154,7 +61971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="83511">
+<interface name="corenet_relabelto_swat_server_packets" lineno="83634">
 <summary>
 Relabel packets to swat_server the packet type.
 </summary>
@@ -62164,7 +61981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83533">
+<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83656">
 <summary>
 Send and receive TCP traffic on the syncthing port.
 </summary>
@@ -62175,7 +61992,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="83548">
+<interface name="corenet_udp_send_syncthing_port" lineno="83671">
 <summary>
 Send UDP traffic on the syncthing port.
 </summary>
@@ -62186,7 +62003,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83563">
+<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83686">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing port.
 </summary>
@@ -62197,7 +62014,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="83578">
+<interface name="corenet_udp_receive_syncthing_port" lineno="83701">
 <summary>
 Receive UDP traffic on the syncthing port.
 </summary>
@@ -62208,7 +62025,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83593">
+<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83716">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing port.
 </summary>
@@ -62219,7 +62036,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83608">
+<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83731">
 <summary>
 Send and receive UDP traffic on the syncthing port.
 </summary>
@@ -62230,7 +62047,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83624">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83747">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing port.
@@ -62242,7 +62059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="83639">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="83762">
 <summary>
 Bind TCP sockets to the syncthing port.
 </summary>
@@ -62253,7 +62070,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="83659">
+<interface name="corenet_udp_bind_syncthing_port" lineno="83782">
 <summary>
 Bind UDP sockets to the syncthing port.
 </summary>
@@ -62264,7 +62081,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="83678">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="83801">
 <summary>
 Make a TCP connection to the syncthing port.
 </summary>
@@ -62274,7 +62091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="83698">
+<interface name="corenet_send_syncthing_client_packets" lineno="83821">
 <summary>
 Send syncthing_client packets.
 </summary>
@@ -62285,7 +62102,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83717">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83840">
 <summary>
 Do not audit attempts to send syncthing_client packets.
 </summary>
@@ -62296,7 +62113,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="83736">
+<interface name="corenet_receive_syncthing_client_packets" lineno="83859">
 <summary>
 Receive syncthing_client packets.
 </summary>
@@ -62307,7 +62124,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83755">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83878">
 <summary>
 Do not audit attempts to receive syncthing_client packets.
 </summary>
@@ -62318,7 +62135,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83774">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83897">
 <summary>
 Send and receive syncthing_client packets.
 </summary>
@@ -62329,7 +62146,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83790">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83913">
 <summary>
 Do not audit attempts to send and receive syncthing_client packets.
 </summary>
@@ -62340,7 +62157,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="83805">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="83928">
 <summary>
 Relabel packets to syncthing_client the packet type.
 </summary>
@@ -62350,7 +62167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="83825">
+<interface name="corenet_send_syncthing_server_packets" lineno="83948">
 <summary>
 Send syncthing_server packets.
 </summary>
@@ -62361,7 +62178,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83844">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83967">
 <summary>
 Do not audit attempts to send syncthing_server packets.
 </summary>
@@ -62372,7 +62189,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="83863">
+<interface name="corenet_receive_syncthing_server_packets" lineno="83986">
 <summary>
 Receive syncthing_server packets.
 </summary>
@@ -62383,7 +62200,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="83882">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84005">
 <summary>
 Do not audit attempts to receive syncthing_server packets.
 </summary>
@@ -62394,7 +62211,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="83901">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84024">
 <summary>
 Send and receive syncthing_server packets.
 </summary>
@@ -62405,7 +62222,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="83917">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84040">
 <summary>
 Do not audit attempts to send and receive syncthing_server packets.
 </summary>
@@ -62416,7 +62233,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="83932">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="84055">
 <summary>
 Relabel packets to syncthing_server the packet type.
 </summary>
@@ -62426,7 +62243,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="83954">
+<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84077">
 <summary>
 Send and receive TCP traffic on the syncthing_admin port.
 </summary>
@@ -62437,7 +62254,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="83969">
+<interface name="corenet_udp_send_syncthing_admin_port" lineno="84092">
 <summary>
 Send UDP traffic on the syncthing_admin port.
 </summary>
@@ -62448,7 +62265,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="83984">
+<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84107">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing_admin port.
 </summary>
@@ -62459,7 +62276,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="83999">
+<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84122">
 <summary>
 Receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62470,7 +62287,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84014">
+<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84137">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62481,7 +62298,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84029">
+<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84152">
 <summary>
 Send and receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62492,7 +62309,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84045">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84168">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing_admin port.
@@ -62504,7 +62321,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84060">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84183">
 <summary>
 Bind TCP sockets to the syncthing_admin port.
 </summary>
@@ -62515,7 +62332,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84080">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84203">
 <summary>
 Bind UDP sockets to the syncthing_admin port.
 </summary>
@@ -62526,7 +62343,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84099">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84222">
 <summary>
 Make a TCP connection to the syncthing_admin port.
 </summary>
@@ -62536,7 +62353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84119">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="84242">
 <summary>
 Send syncthing_admin_client packets.
 </summary>
@@ -62547,7 +62364,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84138">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84261">
 <summary>
 Do not audit attempts to send syncthing_admin_client packets.
 </summary>
@@ -62558,7 +62375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84157">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84280">
 <summary>
 Receive syncthing_admin_client packets.
 </summary>
@@ -62569,7 +62386,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84176">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84299">
 <summary>
 Do not audit attempts to receive syncthing_admin_client packets.
 </summary>
@@ -62580,7 +62397,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84195">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84318">
 <summary>
 Send and receive syncthing_admin_client packets.
 </summary>
@@ -62591,7 +62408,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84211">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84334">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_client packets.
 </summary>
@@ -62602,7 +62419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84226">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84349">
 <summary>
 Relabel packets to syncthing_admin_client the packet type.
 </summary>
@@ -62612,7 +62429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84246">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="84369">
 <summary>
 Send syncthing_admin_server packets.
 </summary>
@@ -62623,7 +62440,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84265">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84388">
 <summary>
 Do not audit attempts to send syncthing_admin_server packets.
 </summary>
@@ -62634,7 +62451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84284">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84407">
 <summary>
 Receive syncthing_admin_server packets.
 </summary>
@@ -62645,7 +62462,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84303">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84426">
 <summary>
 Do not audit attempts to receive syncthing_admin_server packets.
 </summary>
@@ -62656,7 +62473,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84322">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84445">
 <summary>
 Send and receive syncthing_admin_server packets.
 </summary>
@@ -62667,7 +62484,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84338">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84461">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_server packets.
 </summary>
@@ -62678,7 +62495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84353">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84476">
 <summary>
 Relabel packets to syncthing_admin_server the packet type.
 </summary>
@@ -62688,7 +62505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84375">
+<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84498">
 <summary>
 Send and receive TCP traffic on the syncthing_discovery port.
 </summary>
@@ -62699,7 +62516,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84390">
+<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84513">
 <summary>
 Send UDP traffic on the syncthing_discovery port.
 </summary>
@@ -62710,7 +62527,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84405">
+<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84528">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing_discovery port.
 </summary>
@@ -62721,7 +62538,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84420">
+<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84543">
 <summary>
 Receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -62732,7 +62549,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84435">
+<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84558">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -62743,7 +62560,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84450">
+<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84573">
 <summary>
 Send and receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -62754,7 +62571,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84466">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84589">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing_discovery port.
@@ -62766,7 +62583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84481">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84604">
 <summary>
 Bind TCP sockets to the syncthing_discovery port.
 </summary>
@@ -62777,7 +62594,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84501">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84624">
 <summary>
 Bind UDP sockets to the syncthing_discovery port.
 </summary>
@@ -62788,7 +62605,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84520">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84643">
 <summary>
 Make a TCP connection to the syncthing_discovery port.
 </summary>
@@ -62798,7 +62615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84540">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84663">
 <summary>
 Send syncthing_discovery_client packets.
 </summary>
@@ -62809,7 +62626,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84559">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84682">
 <summary>
 Do not audit attempts to send syncthing_discovery_client packets.
 </summary>
@@ -62820,7 +62637,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84578">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84701">
 <summary>
 Receive syncthing_discovery_client packets.
 </summary>
@@ -62831,7 +62648,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84597">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84720">
 <summary>
 Do not audit attempts to receive syncthing_discovery_client packets.
 </summary>
@@ -62842,7 +62659,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84616">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84739">
 <summary>
 Send and receive syncthing_discovery_client packets.
 </summary>
@@ -62853,7 +62670,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84632">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84755">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_client packets.
 </summary>
@@ -62864,7 +62681,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84647">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84770">
 <summary>
 Relabel packets to syncthing_discovery_client the packet type.
 </summary>
@@ -62874,7 +62691,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84667">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84790">
 <summary>
 Send syncthing_discovery_server packets.
 </summary>
@@ -62885,7 +62702,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84686">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84809">
 <summary>
 Do not audit attempts to send syncthing_discovery_server packets.
 </summary>
@@ -62896,7 +62713,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84705">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84828">
 <summary>
 Receive syncthing_discovery_server packets.
 </summary>
@@ -62907,7 +62724,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84724">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84847">
 <summary>
 Do not audit attempts to receive syncthing_discovery_server packets.
 </summary>
@@ -62918,7 +62735,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84743">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84866">
 <summary>
 Send and receive syncthing_discovery_server packets.
 </summary>
@@ -62929,7 +62746,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84759">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84882">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_server packets.
 </summary>
@@ -62940,7 +62757,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84774">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84897">
 <summary>
 Relabel packets to syncthing_discovery_server the packet type.
 </summary>
@@ -62950,7 +62767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84796">
+<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84919">
 <summary>
 Send and receive TCP traffic on the sype_transport port.
 </summary>
@@ -62961,7 +62778,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="84811">
+<interface name="corenet_udp_send_sype_transport_port" lineno="84934">
 <summary>
 Send UDP traffic on the sype_transport port.
 </summary>
@@ -62972,7 +62789,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84826">
+<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84949">
 <summary>
 Do not audit attempts to send UDP traffic on the sype_transport port.
 </summary>
@@ -62983,7 +62800,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="84841">
+<interface name="corenet_udp_receive_sype_transport_port" lineno="84964">
 <summary>
 Receive UDP traffic on the sype_transport port.
 </summary>
@@ -62994,7 +62811,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84856">
+<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84979">
 <summary>
 Do not audit attempts to receive UDP traffic on the sype_transport port.
 </summary>
@@ -63005,7 +62822,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84871">
+<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84994">
 <summary>
 Send and receive UDP traffic on the sype_transport port.
 </summary>
@@ -63016,7 +62833,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="84887">
+<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85010">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sype_transport port.
@@ -63028,7 +62845,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="84902">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="85025">
 <summary>
 Bind TCP sockets to the sype_transport port.
 </summary>
@@ -63039,7 +62856,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="84922">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="85045">
 <summary>
 Bind UDP sockets to the sype_transport port.
 </summary>
@@ -63050,7 +62867,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="84941">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="85064">
 <summary>
 Make a TCP connection to the sype_transport port.
 </summary>
@@ -63060,7 +62877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="84961">
+<interface name="corenet_send_sype_transport_client_packets" lineno="85084">
 <summary>
 Send sype_transport_client packets.
 </summary>
@@ -63071,7 +62888,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="84980">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85103">
 <summary>
 Do not audit attempts to send sype_transport_client packets.
 </summary>
@@ -63082,7 +62899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="84999">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="85122">
 <summary>
 Receive sype_transport_client packets.
 </summary>
@@ -63093,7 +62910,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85018">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85141">
 <summary>
 Do not audit attempts to receive sype_transport_client packets.
 </summary>
@@ -63104,7 +62921,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85037">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85160">
 <summary>
 Send and receive sype_transport_client packets.
 </summary>
@@ -63115,7 +62932,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85053">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85176">
 <summary>
 Do not audit attempts to send and receive sype_transport_client packets.
 </summary>
@@ -63126,7 +62943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85068">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85191">
 <summary>
 Relabel packets to sype_transport_client the packet type.
 </summary>
@@ -63136,7 +62953,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85088">
+<interface name="corenet_send_sype_transport_server_packets" lineno="85211">
 <summary>
 Send sype_transport_server packets.
 </summary>
@@ -63147,7 +62964,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85107">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85230">
 <summary>
 Do not audit attempts to send sype_transport_server packets.
 </summary>
@@ -63158,7 +62975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85126">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="85249">
 <summary>
 Receive sype_transport_server packets.
 </summary>
@@ -63169,7 +62986,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85145">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85268">
 <summary>
 Do not audit attempts to receive sype_transport_server packets.
 </summary>
@@ -63180,7 +62997,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85164">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85287">
 <summary>
 Send and receive sype_transport_server packets.
 </summary>
@@ -63191,7 +63008,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85180">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85303">
 <summary>
 Do not audit attempts to send and receive sype_transport_server packets.
 </summary>
@@ -63202,7 +63019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85195">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85318">
 <summary>
 Relabel packets to sype_transport_server the packet type.
 </summary>
@@ -63212,7 +63029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85217">
+<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85340">
 <summary>
 Send and receive TCP traffic on the syslogd port.
 </summary>
@@ -63223,7 +63040,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85232">
+<interface name="corenet_udp_send_syslogd_port" lineno="85355">
 <summary>
 Send UDP traffic on the syslogd port.
 </summary>
@@ -63234,7 +63051,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85247">
+<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85370">
 <summary>
 Do not audit attempts to send UDP traffic on the syslogd port.
 </summary>
@@ -63245,7 +63062,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85262">
+<interface name="corenet_udp_receive_syslogd_port" lineno="85385">
 <summary>
 Receive UDP traffic on the syslogd port.
 </summary>
@@ -63256,7 +63073,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85277">
+<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85400">
 <summary>
 Do not audit attempts to receive UDP traffic on the syslogd port.
 </summary>
@@ -63267,7 +63084,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85292">
+<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85415">
 <summary>
 Send and receive UDP traffic on the syslogd port.
 </summary>
@@ -63278,7 +63095,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85308">
+<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85431">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syslogd port.
@@ -63290,7 +63107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85323">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="85446">
 <summary>
 Bind TCP sockets to the syslogd port.
 </summary>
@@ -63301,7 +63118,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85343">
+<interface name="corenet_udp_bind_syslogd_port" lineno="85466">
 <summary>
 Bind UDP sockets to the syslogd port.
 </summary>
@@ -63312,7 +63129,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85362">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="85485">
 <summary>
 Make a TCP connection to the syslogd port.
 </summary>
@@ -63322,7 +63139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85382">
+<interface name="corenet_send_syslogd_client_packets" lineno="85505">
 <summary>
 Send syslogd_client packets.
 </summary>
@@ -63333,7 +63150,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85401">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85524">
 <summary>
 Do not audit attempts to send syslogd_client packets.
 </summary>
@@ -63344,7 +63161,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85420">
+<interface name="corenet_receive_syslogd_client_packets" lineno="85543">
 <summary>
 Receive syslogd_client packets.
 </summary>
@@ -63355,7 +63172,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85439">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85562">
 <summary>
 Do not audit attempts to receive syslogd_client packets.
 </summary>
@@ -63366,7 +63183,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85458">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85581">
 <summary>
 Send and receive syslogd_client packets.
 </summary>
@@ -63377,7 +63194,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85474">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85597">
 <summary>
 Do not audit attempts to send and receive syslogd_client packets.
 </summary>
@@ -63388,7 +63205,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="85489">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="85612">
 <summary>
 Relabel packets to syslogd_client the packet type.
 </summary>
@@ -63398,7 +63215,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="85509">
+<interface name="corenet_send_syslogd_server_packets" lineno="85632">
 <summary>
 Send syslogd_server packets.
 </summary>
@@ -63409,7 +63226,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85528">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85651">
 <summary>
 Do not audit attempts to send syslogd_server packets.
 </summary>
@@ -63420,7 +63237,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="85547">
+<interface name="corenet_receive_syslogd_server_packets" lineno="85670">
 <summary>
 Receive syslogd_server packets.
 </summary>
@@ -63431,7 +63248,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85566">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85689">
 <summary>
 Do not audit attempts to receive syslogd_server packets.
 </summary>
@@ -63442,7 +63259,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85585">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85708">
 <summary>
 Send and receive syslogd_server packets.
 </summary>
@@ -63453,7 +63270,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85601">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85724">
 <summary>
 Do not audit attempts to send and receive syslogd_server packets.
 </summary>
@@ -63464,7 +63281,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="85616">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="85739">
 <summary>
 Relabel packets to syslogd_server the packet type.
 </summary>
@@ -63474,7 +63291,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85638">
+<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85761">
 <summary>
 Send and receive TCP traffic on the syslog_tls port.
 </summary>
@@ -63485,7 +63302,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="85653">
+<interface name="corenet_udp_send_syslog_tls_port" lineno="85776">
 <summary>
 Send UDP traffic on the syslog_tls port.
 </summary>
@@ -63496,7 +63313,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85668">
+<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85791">
 <summary>
 Do not audit attempts to send UDP traffic on the syslog_tls port.
 </summary>
@@ -63507,7 +63324,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="85683">
+<interface name="corenet_udp_receive_syslog_tls_port" lineno="85806">
 <summary>
 Receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63518,7 +63335,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85698">
+<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85821">
 <summary>
 Do not audit attempts to receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63529,7 +63346,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85713">
+<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85836">
 <summary>
 Send and receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63540,7 +63357,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85729">
+<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85852">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syslog_tls port.
@@ -63552,7 +63369,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85744">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85867">
 <summary>
 Bind TCP sockets to the syslog_tls port.
 </summary>
@@ -63563,7 +63380,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="85764">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="85887">
 <summary>
 Bind UDP sockets to the syslog_tls port.
 </summary>
@@ -63574,7 +63391,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85783">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85906">
 <summary>
 Make a TCP connection to the syslog_tls port.
 </summary>
@@ -63584,7 +63401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="85803">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="85926">
 <summary>
 Send syslog_tls_client packets.
 </summary>
@@ -63595,7 +63412,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85822">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85945">
 <summary>
 Do not audit attempts to send syslog_tls_client packets.
 </summary>
@@ -63606,7 +63423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="85841">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="85964">
 <summary>
 Receive syslog_tls_client packets.
 </summary>
@@ -63617,7 +63434,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85860">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85983">
 <summary>
 Do not audit attempts to receive syslog_tls_client packets.
 </summary>
@@ -63628,7 +63445,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="85879">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86002">
 <summary>
 Send and receive syslog_tls_client packets.
 </summary>
@@ -63639,7 +63456,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="85895">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86018">
 <summary>
 Do not audit attempts to send and receive syslog_tls_client packets.
 </summary>
@@ -63650,7 +63467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="85910">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86033">
 <summary>
 Relabel packets to syslog_tls_client the packet type.
 </summary>
@@ -63660,7 +63477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="85930">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="86053">
 <summary>
 Send syslog_tls_server packets.
 </summary>
@@ -63671,7 +63488,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="85949">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86072">
 <summary>
 Do not audit attempts to send syslog_tls_server packets.
 </summary>
@@ -63682,7 +63499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="85968">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="86091">
 <summary>
 Receive syslog_tls_server packets.
 </summary>
@@ -63693,7 +63510,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="85987">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86110">
 <summary>
 Do not audit attempts to receive syslog_tls_server packets.
 </summary>
@@ -63704,7 +63521,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86006">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86129">
 <summary>
 Send and receive syslog_tls_server packets.
 </summary>
@@ -63715,7 +63532,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86022">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86145">
 <summary>
 Do not audit attempts to send and receive syslog_tls_server packets.
 </summary>
@@ -63726,7 +63543,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86037">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86160">
 <summary>
 Relabel packets to syslog_tls_server the packet type.
 </summary>
@@ -63736,7 +63553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86059">
+<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86182">
 <summary>
 Send and receive TCP traffic on the tcs port.
 </summary>
@@ -63747,7 +63564,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86074">
+<interface name="corenet_udp_send_tcs_port" lineno="86197">
 <summary>
 Send UDP traffic on the tcs port.
 </summary>
@@ -63758,7 +63575,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86089">
+<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86212">
 <summary>
 Do not audit attempts to send UDP traffic on the tcs port.
 </summary>
@@ -63769,7 +63586,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86104">
+<interface name="corenet_udp_receive_tcs_port" lineno="86227">
 <summary>
 Receive UDP traffic on the tcs port.
 </summary>
@@ -63780,7 +63597,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86119">
+<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86242">
 <summary>
 Do not audit attempts to receive UDP traffic on the tcs port.
 </summary>
@@ -63791,7 +63608,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86134">
+<interface name="corenet_udp_sendrecv_tcs_port" lineno="86257">
 <summary>
 Send and receive UDP traffic on the tcs port.
 </summary>
@@ -63802,7 +63619,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86150">
+<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86273">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tcs port.
@@ -63814,7 +63631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86165">
+<interface name="corenet_tcp_bind_tcs_port" lineno="86288">
 <summary>
 Bind TCP sockets to the tcs port.
 </summary>
@@ -63825,7 +63642,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86185">
+<interface name="corenet_udp_bind_tcs_port" lineno="86308">
 <summary>
 Bind UDP sockets to the tcs port.
 </summary>
@@ -63836,7 +63653,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86204">
+<interface name="corenet_tcp_connect_tcs_port" lineno="86327">
 <summary>
 Make a TCP connection to the tcs port.
 </summary>
@@ -63846,7 +63663,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86224">
+<interface name="corenet_send_tcs_client_packets" lineno="86347">
 <summary>
 Send tcs_client packets.
 </summary>
@@ -63857,7 +63674,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86243">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86366">
 <summary>
 Do not audit attempts to send tcs_client packets.
 </summary>
@@ -63868,7 +63685,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86262">
+<interface name="corenet_receive_tcs_client_packets" lineno="86385">
 <summary>
 Receive tcs_client packets.
 </summary>
@@ -63879,7 +63696,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86281">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86404">
 <summary>
 Do not audit attempts to receive tcs_client packets.
 </summary>
@@ -63890,7 +63707,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86300">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="86423">
 <summary>
 Send and receive tcs_client packets.
 </summary>
@@ -63901,7 +63718,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86316">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86439">
 <summary>
 Do not audit attempts to send and receive tcs_client packets.
 </summary>
@@ -63912,7 +63729,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86331">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="86454">
 <summary>
 Relabel packets to tcs_client the packet type.
 </summary>
@@ -63922,7 +63739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86351">
+<interface name="corenet_send_tcs_server_packets" lineno="86474">
 <summary>
 Send tcs_server packets.
 </summary>
@@ -63933,7 +63750,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86370">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86493">
 <summary>
 Do not audit attempts to send tcs_server packets.
 </summary>
@@ -63944,7 +63761,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86389">
+<interface name="corenet_receive_tcs_server_packets" lineno="86512">
 <summary>
 Receive tcs_server packets.
 </summary>
@@ -63955,7 +63772,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86408">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86531">
 <summary>
 Do not audit attempts to receive tcs_server packets.
 </summary>
@@ -63966,7 +63783,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86427">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="86550">
 <summary>
 Send and receive tcs_server packets.
 </summary>
@@ -63977,7 +63794,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86443">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86566">
 <summary>
 Do not audit attempts to send and receive tcs_server packets.
 </summary>
@@ -63988,7 +63805,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="86458">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="86581">
 <summary>
 Relabel packets to tcs_server the packet type.
 </summary>
@@ -63998,7 +63815,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86480">
+<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86603">
 <summary>
 Send and receive TCP traffic on the telnetd port.
 </summary>
@@ -64009,7 +63826,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="86495">
+<interface name="corenet_udp_send_telnetd_port" lineno="86618">
 <summary>
 Send UDP traffic on the telnetd port.
 </summary>
@@ -64020,7 +63837,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86510">
+<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86633">
 <summary>
 Do not audit attempts to send UDP traffic on the telnetd port.
 </summary>
@@ -64031,7 +63848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="86525">
+<interface name="corenet_udp_receive_telnetd_port" lineno="86648">
 <summary>
 Receive UDP traffic on the telnetd port.
 </summary>
@@ -64042,7 +63859,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86540">
+<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86663">
 <summary>
 Do not audit attempts to receive UDP traffic on the telnetd port.
 </summary>
@@ -64053,7 +63870,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86555">
+<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86678">
 <summary>
 Send and receive UDP traffic on the telnetd port.
 </summary>
@@ -64064,7 +63881,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86571">
+<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86694">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the telnetd port.
@@ -64076,7 +63893,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="86586">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="86709">
 <summary>
 Bind TCP sockets to the telnetd port.
 </summary>
@@ -64087,7 +63904,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="86606">
+<interface name="corenet_udp_bind_telnetd_port" lineno="86729">
 <summary>
 Bind UDP sockets to the telnetd port.
 </summary>
@@ -64098,7 +63915,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="86625">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="86748">
 <summary>
 Make a TCP connection to the telnetd port.
 </summary>
@@ -64108,7 +63925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="86645">
+<interface name="corenet_send_telnetd_client_packets" lineno="86768">
 <summary>
 Send telnetd_client packets.
 </summary>
@@ -64119,7 +63936,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86664">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86787">
 <summary>
 Do not audit attempts to send telnetd_client packets.
 </summary>
@@ -64130,7 +63947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="86683">
+<interface name="corenet_receive_telnetd_client_packets" lineno="86806">
 <summary>
 Receive telnetd_client packets.
 </summary>
@@ -64141,7 +63958,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86702">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86825">
 <summary>
 Do not audit attempts to receive telnetd_client packets.
 </summary>
@@ -64152,7 +63969,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86721">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86844">
 <summary>
 Send and receive telnetd_client packets.
 </summary>
@@ -64163,7 +63980,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86737">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86860">
 <summary>
 Do not audit attempts to send and receive telnetd_client packets.
 </summary>
@@ -64174,7 +63991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="86752">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="86875">
 <summary>
 Relabel packets to telnetd_client the packet type.
 </summary>
@@ -64184,7 +64001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="86772">
+<interface name="corenet_send_telnetd_server_packets" lineno="86895">
 <summary>
 Send telnetd_server packets.
 </summary>
@@ -64195,7 +64012,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86791">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86914">
 <summary>
 Do not audit attempts to send telnetd_server packets.
 </summary>
@@ -64206,7 +64023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="86810">
+<interface name="corenet_receive_telnetd_server_packets" lineno="86933">
 <summary>
 Receive telnetd_server packets.
 </summary>
@@ -64217,7 +64034,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86829">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86952">
 <summary>
 Do not audit attempts to receive telnetd_server packets.
 </summary>
@@ -64228,7 +64045,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86848">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86971">
 <summary>
 Send and receive telnetd_server packets.
 </summary>
@@ -64239,7 +64056,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86864">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86987">
 <summary>
 Do not audit attempts to send and receive telnetd_server packets.
 </summary>
@@ -64250,7 +64067,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="86879">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="87002">
 <summary>
 Relabel packets to telnetd_server the packet type.
 </summary>
@@ -64260,7 +64077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="86901">
+<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87024">
 <summary>
 Send and receive TCP traffic on the tftp port.
 </summary>
@@ -64271,7 +64088,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tftp_port" lineno="86916">
+<interface name="corenet_udp_send_tftp_port" lineno="87039">
 <summary>
 Send UDP traffic on the tftp port.
 </summary>
@@ -64282,7 +64099,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86931">
+<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87054">
 <summary>
 Do not audit attempts to send UDP traffic on the tftp port.
 </summary>
@@ -64293,7 +64110,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="86946">
+<interface name="corenet_udp_receive_tftp_port" lineno="87069">
 <summary>
 Receive UDP traffic on the tftp port.
 </summary>
@@ -64304,7 +64121,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86961">
+<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87084">
 <summary>
 Do not audit attempts to receive UDP traffic on the tftp port.
 </summary>
@@ -64315,7 +64132,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="86976">
+<interface name="corenet_udp_sendrecv_tftp_port" lineno="87099">
 <summary>
 Send and receive UDP traffic on the tftp port.
 </summary>
@@ -64326,7 +64143,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86992">
+<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87115">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tftp port.
@@ -64338,7 +64155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87007">
+<interface name="corenet_tcp_bind_tftp_port" lineno="87130">
 <summary>
 Bind TCP sockets to the tftp port.
 </summary>
@@ -64349,7 +64166,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87027">
+<interface name="corenet_udp_bind_tftp_port" lineno="87150">
 <summary>
 Bind UDP sockets to the tftp port.
 </summary>
@@ -64360,7 +64177,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87046">
+<interface name="corenet_tcp_connect_tftp_port" lineno="87169">
 <summary>
 Make a TCP connection to the tftp port.
 </summary>
@@ -64370,7 +64187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87066">
+<interface name="corenet_send_tftp_client_packets" lineno="87189">
 <summary>
 Send tftp_client packets.
 </summary>
@@ -64381,7 +64198,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87085">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87208">
 <summary>
 Do not audit attempts to send tftp_client packets.
 </summary>
@@ -64392,7 +64209,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87104">
+<interface name="corenet_receive_tftp_client_packets" lineno="87227">
 <summary>
 Receive tftp_client packets.
 </summary>
@@ -64403,7 +64220,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87123">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87246">
 <summary>
 Do not audit attempts to receive tftp_client packets.
 </summary>
@@ -64414,7 +64231,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87142">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="87265">
 <summary>
 Send and receive tftp_client packets.
 </summary>
@@ -64425,7 +64242,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87158">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87281">
 <summary>
 Do not audit attempts to send and receive tftp_client packets.
 </summary>
@@ -64436,7 +64253,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87173">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="87296">
 <summary>
 Relabel packets to tftp_client the packet type.
 </summary>
@@ -64446,7 +64263,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87193">
+<interface name="corenet_send_tftp_server_packets" lineno="87316">
 <summary>
 Send tftp_server packets.
 </summary>
@@ -64457,7 +64274,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87212">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87335">
 <summary>
 Do not audit attempts to send tftp_server packets.
 </summary>
@@ -64468,7 +64285,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87231">
+<interface name="corenet_receive_tftp_server_packets" lineno="87354">
 <summary>
 Receive tftp_server packets.
 </summary>
@@ -64479,7 +64296,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87250">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87373">
 <summary>
 Do not audit attempts to receive tftp_server packets.
 </summary>
@@ -64490,7 +64307,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87269">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="87392">
 <summary>
 Send and receive tftp_server packets.
 </summary>
@@ -64501,7 +64318,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87285">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87408">
 <summary>
 Do not audit attempts to send and receive tftp_server packets.
 </summary>
@@ -64512,7 +64329,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87300">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="87423">
 <summary>
 Relabel packets to tftp_server the packet type.
 </summary>
@@ -64522,7 +64339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87322">
+<interface name="corenet_tcp_sendrecv_tor_port" lineno="87445">
 <summary>
 Send and receive TCP traffic on the tor port.
 </summary>
@@ -64533,7 +64350,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tor_port" lineno="87337">
+<interface name="corenet_udp_send_tor_port" lineno="87460">
 <summary>
 Send UDP traffic on the tor port.
 </summary>
@@ -64544,7 +64361,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87352">
+<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87475">
 <summary>
 Do not audit attempts to send UDP traffic on the tor port.
 </summary>
@@ -64555,7 +64372,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87367">
+<interface name="corenet_udp_receive_tor_port" lineno="87490">
 <summary>
 Receive UDP traffic on the tor port.
 </summary>
@@ -64566,7 +64383,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87382">
+<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87505">
 <summary>
 Do not audit attempts to receive UDP traffic on the tor port.
 </summary>
@@ -64577,7 +64394,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87397">
+<interface name="corenet_udp_sendrecv_tor_port" lineno="87520">
 <summary>
 Send and receive UDP traffic on the tor port.
 </summary>
@@ -64588,7 +64405,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87413">
+<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87536">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tor port.
@@ -64600,7 +64417,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87428">
+<interface name="corenet_tcp_bind_tor_port" lineno="87551">
 <summary>
 Bind TCP sockets to the tor port.
 </summary>
@@ -64611,7 +64428,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tor_port" lineno="87448">
+<interface name="corenet_udp_bind_tor_port" lineno="87571">
 <summary>
 Bind UDP sockets to the tor port.
 </summary>
@@ -64622,7 +64439,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="87467">
+<interface name="corenet_tcp_connect_tor_port" lineno="87590">
 <summary>
 Make a TCP connection to the tor port.
 </summary>
@@ -64632,7 +64449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_client_packets" lineno="87487">
+<interface name="corenet_send_tor_client_packets" lineno="87610">
 <summary>
 Send tor_client packets.
 </summary>
@@ -64643,7 +64460,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87506">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87629">
 <summary>
 Do not audit attempts to send tor_client packets.
 </summary>
@@ -64654,7 +64471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_client_packets" lineno="87525">
+<interface name="corenet_receive_tor_client_packets" lineno="87648">
 <summary>
 Receive tor_client packets.
 </summary>
@@ -64665,7 +64482,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87544">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87667">
 <summary>
 Do not audit attempts to receive tor_client packets.
 </summary>
@@ -64676,7 +64493,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="87563">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="87686">
 <summary>
 Send and receive tor_client packets.
 </summary>
@@ -64687,7 +64504,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87579">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87702">
 <summary>
 Do not audit attempts to send and receive tor_client packets.
 </summary>
@@ -64698,7 +64515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="87594">
+<interface name="corenet_relabelto_tor_client_packets" lineno="87717">
 <summary>
 Relabel packets to tor_client the packet type.
 </summary>
@@ -64708,7 +64525,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_server_packets" lineno="87614">
+<interface name="corenet_send_tor_server_packets" lineno="87737">
 <summary>
 Send tor_server packets.
 </summary>
@@ -64719,7 +64536,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87633">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87756">
 <summary>
 Do not audit attempts to send tor_server packets.
 </summary>
@@ -64730,7 +64547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_server_packets" lineno="87652">
+<interface name="corenet_receive_tor_server_packets" lineno="87775">
 <summary>
 Receive tor_server packets.
 </summary>
@@ -64741,7 +64558,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87671">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87794">
 <summary>
 Do not audit attempts to receive tor_server packets.
 </summary>
@@ -64752,7 +64569,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="87690">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="87813">
 <summary>
 Send and receive tor_server packets.
 </summary>
@@ -64763,7 +64580,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87706">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87829">
 <summary>
 Do not audit attempts to send and receive tor_server packets.
 </summary>
@@ -64774,7 +64591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="87721">
+<interface name="corenet_relabelto_tor_server_packets" lineno="87844">
 <summary>
 Relabel packets to tor_server the packet type.
 </summary>
@@ -64784,7 +64601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87743">
+<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87866">
 <summary>
 Send and receive TCP traffic on the traceroute port.
 </summary>
@@ -64795,7 +64612,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="87758">
+<interface name="corenet_udp_send_traceroute_port" lineno="87881">
 <summary>
 Send UDP traffic on the traceroute port.
 </summary>
@@ -64806,7 +64623,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87773">
+<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87896">
 <summary>
 Do not audit attempts to send UDP traffic on the traceroute port.
 </summary>
@@ -64817,7 +64634,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="87788">
+<interface name="corenet_udp_receive_traceroute_port" lineno="87911">
 <summary>
 Receive UDP traffic on the traceroute port.
 </summary>
@@ -64828,7 +64645,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87803">
+<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87926">
 <summary>
 Do not audit attempts to receive UDP traffic on the traceroute port.
 </summary>
@@ -64839,7 +64656,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87818">
+<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87941">
 <summary>
 Send and receive UDP traffic on the traceroute port.
 </summary>
@@ -64850,7 +64667,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87834">
+<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87957">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the traceroute port.
@@ -64862,7 +64679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="87849">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="87972">
 <summary>
 Bind TCP sockets to the traceroute port.
 </summary>
@@ -64873,7 +64690,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="87869">
+<interface name="corenet_udp_bind_traceroute_port" lineno="87992">
 <summary>
 Bind UDP sockets to the traceroute port.
 </summary>
@@ -64884,7 +64701,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="87888">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="88011">
 <summary>
 Make a TCP connection to the traceroute port.
 </summary>
@@ -64894,7 +64711,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="87908">
+<interface name="corenet_send_traceroute_client_packets" lineno="88031">
 <summary>
 Send traceroute_client packets.
 </summary>
@@ -64905,7 +64722,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87927">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88050">
 <summary>
 Do not audit attempts to send traceroute_client packets.
 </summary>
@@ -64916,7 +64733,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="87946">
+<interface name="corenet_receive_traceroute_client_packets" lineno="88069">
 <summary>
 Receive traceroute_client packets.
 </summary>
@@ -64927,7 +64744,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87965">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88088">
 <summary>
 Do not audit attempts to receive traceroute_client packets.
 </summary>
@@ -64938,7 +64755,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="87984">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88107">
 <summary>
 Send and receive traceroute_client packets.
 </summary>
@@ -64949,7 +64766,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88000">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88123">
 <summary>
 Do not audit attempts to send and receive traceroute_client packets.
 </summary>
@@ -64960,7 +64777,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88015">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="88138">
 <summary>
 Relabel packets to traceroute_client the packet type.
 </summary>
@@ -64970,7 +64787,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88035">
+<interface name="corenet_send_traceroute_server_packets" lineno="88158">
 <summary>
 Send traceroute_server packets.
 </summary>
@@ -64981,7 +64798,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88054">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88177">
 <summary>
 Do not audit attempts to send traceroute_server packets.
 </summary>
@@ -64992,7 +64809,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88073">
+<interface name="corenet_receive_traceroute_server_packets" lineno="88196">
 <summary>
 Receive traceroute_server packets.
 </summary>
@@ -65003,7 +64820,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88092">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88215">
 <summary>
 Do not audit attempts to receive traceroute_server packets.
 </summary>
@@ -65014,7 +64831,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88111">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88234">
 <summary>
 Send and receive traceroute_server packets.
 </summary>
@@ -65025,7 +64842,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88127">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88250">
 <summary>
 Do not audit attempts to send and receive traceroute_server packets.
 </summary>
@@ -65036,7 +64853,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88142">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="88265">
 <summary>
 Relabel packets to traceroute_server the packet type.
 </summary>
@@ -65046,7 +64863,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88164">
+<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88287">
 <summary>
 Send and receive TCP traffic on the transproxy port.
 </summary>
@@ -65057,7 +64874,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88179">
+<interface name="corenet_udp_send_transproxy_port" lineno="88302">
 <summary>
 Send UDP traffic on the transproxy port.
 </summary>
@@ -65068,7 +64885,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88194">
+<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88317">
 <summary>
 Do not audit attempts to send UDP traffic on the transproxy port.
 </summary>
@@ -65079,7 +64896,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88209">
+<interface name="corenet_udp_receive_transproxy_port" lineno="88332">
 <summary>
 Receive UDP traffic on the transproxy port.
 </summary>
@@ -65090,7 +64907,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88224">
+<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88347">
 <summary>
 Do not audit attempts to receive UDP traffic on the transproxy port.
 </summary>
@@ -65101,7 +64918,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88239">
+<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88362">
 <summary>
 Send and receive UDP traffic on the transproxy port.
 </summary>
@@ -65112,7 +64929,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88255">
+<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88378">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the transproxy port.
@@ -65124,7 +64941,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88270">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="88393">
 <summary>
 Bind TCP sockets to the transproxy port.
 </summary>
@@ -65135,7 +64952,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88290">
+<interface name="corenet_udp_bind_transproxy_port" lineno="88413">
 <summary>
 Bind UDP sockets to the transproxy port.
 </summary>
@@ -65146,7 +64963,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88309">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="88432">
 <summary>
 Make a TCP connection to the transproxy port.
 </summary>
@@ -65156,7 +64973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88329">
+<interface name="corenet_send_transproxy_client_packets" lineno="88452">
 <summary>
 Send transproxy_client packets.
 </summary>
@@ -65167,7 +64984,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88348">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88471">
 <summary>
 Do not audit attempts to send transproxy_client packets.
 </summary>
@@ -65178,7 +64995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88367">
+<interface name="corenet_receive_transproxy_client_packets" lineno="88490">
 <summary>
 Receive transproxy_client packets.
 </summary>
@@ -65189,7 +65006,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88386">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88509">
 <summary>
 Do not audit attempts to receive transproxy_client packets.
 </summary>
@@ -65200,7 +65017,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88405">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88528">
 <summary>
 Send and receive transproxy_client packets.
 </summary>
@@ -65211,7 +65028,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88421">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88544">
 <summary>
 Do not audit attempts to send and receive transproxy_client packets.
 </summary>
@@ -65222,7 +65039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88436">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="88559">
 <summary>
 Relabel packets to transproxy_client the packet type.
 </summary>
@@ -65232,7 +65049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="88456">
+<interface name="corenet_send_transproxy_server_packets" lineno="88579">
 <summary>
 Send transproxy_server packets.
 </summary>
@@ -65243,7 +65060,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88475">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88598">
 <summary>
 Do not audit attempts to send transproxy_server packets.
 </summary>
@@ -65254,7 +65071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="88494">
+<interface name="corenet_receive_transproxy_server_packets" lineno="88617">
 <summary>
 Receive transproxy_server packets.
 </summary>
@@ -65265,7 +65082,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88513">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88636">
 <summary>
 Do not audit attempts to receive transproxy_server packets.
 </summary>
@@ -65276,7 +65093,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88532">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88655">
 <summary>
 Send and receive transproxy_server packets.
 </summary>
@@ -65287,7 +65104,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88548">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88671">
 <summary>
 Do not audit attempts to send and receive transproxy_server packets.
 </summary>
@@ -65298,7 +65115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="88563">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="88686">
 <summary>
 Relabel packets to transproxy_server the packet type.
 </summary>
@@ -65308,7 +65125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88585">
+<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88708">
 <summary>
 Send and receive TCP traffic on the trisoap port.
 </summary>
@@ -65319,7 +65136,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="88600">
+<interface name="corenet_udp_send_trisoap_port" lineno="88723">
 <summary>
 Send UDP traffic on the trisoap port.
 </summary>
@@ -65330,7 +65147,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88615">
+<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88738">
 <summary>
 Do not audit attempts to send UDP traffic on the trisoap port.
 </summary>
@@ -65341,7 +65158,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="88630">
+<interface name="corenet_udp_receive_trisoap_port" lineno="88753">
 <summary>
 Receive UDP traffic on the trisoap port.
 </summary>
@@ -65352,7 +65169,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88645">
+<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88768">
 <summary>
 Do not audit attempts to receive UDP traffic on the trisoap port.
 </summary>
@@ -65363,7 +65180,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88660">
+<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88783">
 <summary>
 Send and receive UDP traffic on the trisoap port.
 </summary>
@@ -65374,7 +65191,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88676">
+<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88799">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the trisoap port.
@@ -65386,7 +65203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="88691">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="88814">
 <summary>
 Bind TCP sockets to the trisoap port.
 </summary>
@@ -65397,7 +65214,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="88711">
+<interface name="corenet_udp_bind_trisoap_port" lineno="88834">
 <summary>
 Bind UDP sockets to the trisoap port.
 </summary>
@@ -65408,7 +65225,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="88730">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="88853">
 <summary>
 Make a TCP connection to the trisoap port.
 </summary>
@@ -65418,7 +65235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="88750">
+<interface name="corenet_send_trisoap_client_packets" lineno="88873">
 <summary>
 Send trisoap_client packets.
 </summary>
@@ -65429,7 +65246,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88769">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88892">
 <summary>
 Do not audit attempts to send trisoap_client packets.
 </summary>
@@ -65440,7 +65257,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="88788">
+<interface name="corenet_receive_trisoap_client_packets" lineno="88911">
 <summary>
 Receive trisoap_client packets.
 </summary>
@@ -65451,7 +65268,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88807">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88930">
 <summary>
 Do not audit attempts to receive trisoap_client packets.
 </summary>
@@ -65462,7 +65279,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88826">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88949">
 <summary>
 Send and receive trisoap_client packets.
 </summary>
@@ -65473,7 +65290,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88842">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88965">
 <summary>
 Do not audit attempts to send and receive trisoap_client packets.
 </summary>
@@ -65484,7 +65301,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="88857">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="88980">
 <summary>
 Relabel packets to trisoap_client the packet type.
 </summary>
@@ -65494,7 +65311,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="88877">
+<interface name="corenet_send_trisoap_server_packets" lineno="89000">
 <summary>
 Send trisoap_server packets.
 </summary>
@@ -65505,7 +65322,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="88896">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89019">
 <summary>
 Do not audit attempts to send trisoap_server packets.
 </summary>
@@ -65516,7 +65333,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="88915">
+<interface name="corenet_receive_trisoap_server_packets" lineno="89038">
 <summary>
 Receive trisoap_server packets.
 </summary>
@@ -65527,7 +65344,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="88934">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89057">
 <summary>
 Do not audit attempts to receive trisoap_server packets.
 </summary>
@@ -65538,7 +65355,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="88953">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89076">
 <summary>
 Send and receive trisoap_server packets.
 </summary>
@@ -65549,7 +65366,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="88969">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89092">
 <summary>
 Do not audit attempts to send and receive trisoap_server packets.
 </summary>
@@ -65560,7 +65377,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="88984">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="89107">
 <summary>
 Relabel packets to trisoap_server the packet type.
 </summary>
@@ -65570,7 +65387,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89006">
+<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89129">
 <summary>
 Send and receive TCP traffic on the trivnet1 port.
 </summary>
@@ -65581,7 +65398,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89021">
+<interface name="corenet_udp_send_trivnet1_port" lineno="89144">
 <summary>
 Send UDP traffic on the trivnet1 port.
 </summary>
@@ -65592,7 +65409,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89036">
+<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89159">
 <summary>
 Do not audit attempts to send UDP traffic on the trivnet1 port.
 </summary>
@@ -65603,7 +65420,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89051">
+<interface name="corenet_udp_receive_trivnet1_port" lineno="89174">
 <summary>
 Receive UDP traffic on the trivnet1 port.
 </summary>
@@ -65614,7 +65431,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89066">
+<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89189">
 <summary>
 Do not audit attempts to receive UDP traffic on the trivnet1 port.
 </summary>
@@ -65625,7 +65442,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89081">
+<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89204">
 <summary>
 Send and receive UDP traffic on the trivnet1 port.
 </summary>
@@ -65636,7 +65453,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89097">
+<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89220">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the trivnet1 port.
@@ -65648,7 +65465,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89112">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="89235">
 <summary>
 Bind TCP sockets to the trivnet1 port.
 </summary>
@@ -65659,7 +65476,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89132">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="89255">
 <summary>
 Bind UDP sockets to the trivnet1 port.
 </summary>
@@ -65670,7 +65487,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89151">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="89274">
 <summary>
 Make a TCP connection to the trivnet1 port.
 </summary>
@@ -65680,7 +65497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89171">
+<interface name="corenet_send_trivnet1_client_packets" lineno="89294">
 <summary>
 Send trivnet1_client packets.
 </summary>
@@ -65691,7 +65508,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89190">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89313">
 <summary>
 Do not audit attempts to send trivnet1_client packets.
 </summary>
@@ -65702,7 +65519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89209">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="89332">
 <summary>
 Receive trivnet1_client packets.
 </summary>
@@ -65713,7 +65530,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89228">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89351">
 <summary>
 Do not audit attempts to receive trivnet1_client packets.
 </summary>
@@ -65724,7 +65541,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89247">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89370">
 <summary>
 Send and receive trivnet1_client packets.
 </summary>
@@ -65735,7 +65552,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89263">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89386">
 <summary>
 Do not audit attempts to send and receive trivnet1_client packets.
 </summary>
@@ -65746,7 +65563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89278">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89401">
 <summary>
 Relabel packets to trivnet1_client the packet type.
 </summary>
@@ -65756,7 +65573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89298">
+<interface name="corenet_send_trivnet1_server_packets" lineno="89421">
 <summary>
 Send trivnet1_server packets.
 </summary>
@@ -65767,7 +65584,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89317">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89440">
 <summary>
 Do not audit attempts to send trivnet1_server packets.
 </summary>
@@ -65778,7 +65595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89336">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="89459">
 <summary>
 Receive trivnet1_server packets.
 </summary>
@@ -65789,7 +65606,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89355">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89478">
 <summary>
 Do not audit attempts to receive trivnet1_server packets.
 </summary>
@@ -65800,7 +65617,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89374">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89497">
 <summary>
 Send and receive trivnet1_server packets.
 </summary>
@@ -65811,7 +65628,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89390">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89513">
 <summary>
 Do not audit attempts to send and receive trivnet1_server packets.
 </summary>
@@ -65822,7 +65639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89405">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89528">
 <summary>
 Relabel packets to trivnet1_server the packet type.
 </summary>
@@ -65832,7 +65649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89427">
+<interface name="corenet_tcp_sendrecv_ups_port" lineno="89550">
 <summary>
 Send and receive TCP traffic on the ups port.
 </summary>
@@ -65843,7 +65660,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ups_port" lineno="89442">
+<interface name="corenet_udp_send_ups_port" lineno="89565">
 <summary>
 Send UDP traffic on the ups port.
 </summary>
@@ -65854,7 +65671,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89457">
+<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89580">
 <summary>
 Do not audit attempts to send UDP traffic on the ups port.
 </summary>
@@ -65865,7 +65682,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ups_port" lineno="89472">
+<interface name="corenet_udp_receive_ups_port" lineno="89595">
 <summary>
 Receive UDP traffic on the ups port.
 </summary>
@@ -65876,7 +65693,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89487">
+<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89610">
 <summary>
 Do not audit attempts to receive UDP traffic on the ups port.
 </summary>
@@ -65887,7 +65704,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="89502">
+<interface name="corenet_udp_sendrecv_ups_port" lineno="89625">
 <summary>
 Send and receive UDP traffic on the ups port.
 </summary>
@@ -65898,7 +65715,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89518">
+<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89641">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ups port.
@@ -65910,7 +65727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="89533">
+<interface name="corenet_tcp_bind_ups_port" lineno="89656">
 <summary>
 Bind TCP sockets to the ups port.
 </summary>
@@ -65921,7 +65738,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ups_port" lineno="89553">
+<interface name="corenet_udp_bind_ups_port" lineno="89676">
 <summary>
 Bind UDP sockets to the ups port.
 </summary>
@@ -65932,7 +65749,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="89572">
+<interface name="corenet_tcp_connect_ups_port" lineno="89695">
 <summary>
 Make a TCP connection to the ups port.
 </summary>
@@ -65942,7 +65759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_client_packets" lineno="89592">
+<interface name="corenet_send_ups_client_packets" lineno="89715">
 <summary>
 Send ups_client packets.
 </summary>
@@ -65953,7 +65770,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89611">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89734">
 <summary>
 Do not audit attempts to send ups_client packets.
 </summary>
@@ -65964,7 +65781,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_client_packets" lineno="89630">
+<interface name="corenet_receive_ups_client_packets" lineno="89753">
 <summary>
 Receive ups_client packets.
 </summary>
@@ -65975,7 +65792,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89649">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89772">
 <summary>
 Do not audit attempts to receive ups_client packets.
 </summary>
@@ -65986,7 +65803,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="89668">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="89791">
 <summary>
 Send and receive ups_client packets.
 </summary>
@@ -65997,7 +65814,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89684">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89807">
 <summary>
 Do not audit attempts to send and receive ups_client packets.
 </summary>
@@ -66008,7 +65825,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="89699">
+<interface name="corenet_relabelto_ups_client_packets" lineno="89822">
 <summary>
 Relabel packets to ups_client the packet type.
 </summary>
@@ -66018,7 +65835,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_server_packets" lineno="89719">
+<interface name="corenet_send_ups_server_packets" lineno="89842">
 <summary>
 Send ups_server packets.
 </summary>
@@ -66029,7 +65846,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89738">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89861">
 <summary>
 Do not audit attempts to send ups_server packets.
 </summary>
@@ -66040,7 +65857,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_server_packets" lineno="89757">
+<interface name="corenet_receive_ups_server_packets" lineno="89880">
 <summary>
 Receive ups_server packets.
 </summary>
@@ -66051,7 +65868,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89776">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89899">
 <summary>
 Do not audit attempts to receive ups_server packets.
 </summary>
@@ -66062,7 +65879,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="89795">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="89918">
 <summary>
 Send and receive ups_server packets.
 </summary>
@@ -66073,7 +65890,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89811">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89934">
 <summary>
 Do not audit attempts to send and receive ups_server packets.
 </summary>
@@ -66084,7 +65901,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="89826">
+<interface name="corenet_relabelto_ups_server_packets" lineno="89949">
 <summary>
 Relabel packets to ups_server the packet type.
 </summary>
@@ -66094,7 +65911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89848">
+<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89971">
 <summary>
 Send and receive TCP traffic on the utcpserver port.
 </summary>
@@ -66105,7 +65922,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="89863">
+<interface name="corenet_udp_send_utcpserver_port" lineno="89986">
 <summary>
 Send UDP traffic on the utcpserver port.
 </summary>
@@ -66116,7 +65933,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="89878">
+<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90001">
 <summary>
 Do not audit attempts to send UDP traffic on the utcpserver port.
 </summary>
@@ -66127,7 +65944,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="89893">
+<interface name="corenet_udp_receive_utcpserver_port" lineno="90016">
 <summary>
 Receive UDP traffic on the utcpserver port.
 </summary>
@@ -66138,7 +65955,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="89908">
+<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90031">
 <summary>
 Do not audit attempts to receive UDP traffic on the utcpserver port.
 </summary>
@@ -66149,7 +65966,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="89923">
+<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90046">
 <summary>
 Send and receive UDP traffic on the utcpserver port.
 </summary>
@@ -66160,7 +65977,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="89939">
+<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90062">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the utcpserver port.
@@ -66172,7 +65989,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="89954">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="90077">
 <summary>
 Bind TCP sockets to the utcpserver port.
 </summary>
@@ -66183,7 +66000,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="89974">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="90097">
 <summary>
 Bind UDP sockets to the utcpserver port.
 </summary>
@@ -66194,7 +66011,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="89993">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="90116">
 <summary>
 Make a TCP connection to the utcpserver port.
 </summary>
@@ -66204,7 +66021,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90013">
+<interface name="corenet_send_utcpserver_client_packets" lineno="90136">
 <summary>
 Send utcpserver_client packets.
 </summary>
@@ -66215,7 +66032,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90032">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90155">
 <summary>
 Do not audit attempts to send utcpserver_client packets.
 </summary>
@@ -66226,7 +66043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90051">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="90174">
 <summary>
 Receive utcpserver_client packets.
 </summary>
@@ -66237,7 +66054,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90070">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90193">
 <summary>
 Do not audit attempts to receive utcpserver_client packets.
 </summary>
@@ -66248,7 +66065,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90089">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90212">
 <summary>
 Send and receive utcpserver_client packets.
 </summary>
@@ -66259,7 +66076,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90105">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90228">
 <summary>
 Do not audit attempts to send and receive utcpserver_client packets.
 </summary>
@@ -66270,7 +66087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90120">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90243">
 <summary>
 Relabel packets to utcpserver_client the packet type.
 </summary>
@@ -66280,7 +66097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90140">
+<interface name="corenet_send_utcpserver_server_packets" lineno="90263">
 <summary>
 Send utcpserver_server packets.
 </summary>
@@ -66291,7 +66108,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90159">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90282">
 <summary>
 Do not audit attempts to send utcpserver_server packets.
 </summary>
@@ -66302,7 +66119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90178">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="90301">
 <summary>
 Receive utcpserver_server packets.
 </summary>
@@ -66313,7 +66130,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90197">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90320">
 <summary>
 Do not audit attempts to receive utcpserver_server packets.
 </summary>
@@ -66324,7 +66141,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90216">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90339">
 <summary>
 Send and receive utcpserver_server packets.
 </summary>
@@ -66335,7 +66152,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90232">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90355">
 <summary>
 Do not audit attempts to send and receive utcpserver_server packets.
 </summary>
@@ -66346,7 +66163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90247">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90370">
 <summary>
 Relabel packets to utcpserver_server the packet type.
 </summary>
@@ -66356,7 +66173,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90269">
+<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90392">
 <summary>
 Send and receive TCP traffic on the uucpd port.
 </summary>
@@ -66367,7 +66184,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90284">
+<interface name="corenet_udp_send_uucpd_port" lineno="90407">
 <summary>
 Send UDP traffic on the uucpd port.
 </summary>
@@ -66378,7 +66195,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90299">
+<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90422">
 <summary>
 Do not audit attempts to send UDP traffic on the uucpd port.
 </summary>
@@ -66389,7 +66206,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90314">
+<interface name="corenet_udp_receive_uucpd_port" lineno="90437">
 <summary>
 Receive UDP traffic on the uucpd port.
 </summary>
@@ -66400,7 +66217,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90329">
+<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90452">
 <summary>
 Do not audit attempts to receive UDP traffic on the uucpd port.
 </summary>
@@ -66411,7 +66228,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90344">
+<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90467">
 <summary>
 Send and receive UDP traffic on the uucpd port.
 </summary>
@@ -66422,7 +66239,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90360">
+<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90483">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the uucpd port.
@@ -66434,7 +66251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90375">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="90498">
 <summary>
 Bind TCP sockets to the uucpd port.
 </summary>
@@ -66445,7 +66262,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90395">
+<interface name="corenet_udp_bind_uucpd_port" lineno="90518">
 <summary>
 Bind UDP sockets to the uucpd port.
 </summary>
@@ -66456,7 +66273,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90414">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="90537">
 <summary>
 Make a TCP connection to the uucpd port.
 </summary>
@@ -66466,7 +66283,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90434">
+<interface name="corenet_send_uucpd_client_packets" lineno="90557">
 <summary>
 Send uucpd_client packets.
 </summary>
@@ -66477,7 +66294,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90453">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90576">
 <summary>
 Do not audit attempts to send uucpd_client packets.
 </summary>
@@ -66488,7 +66305,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="90472">
+<interface name="corenet_receive_uucpd_client_packets" lineno="90595">
 <summary>
 Receive uucpd_client packets.
 </summary>
@@ -66499,7 +66316,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90491">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90614">
 <summary>
 Do not audit attempts to receive uucpd_client packets.
 </summary>
@@ -66510,7 +66327,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90510">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90633">
 <summary>
 Send and receive uucpd_client packets.
 </summary>
@@ -66521,7 +66338,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90526">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90649">
 <summary>
 Do not audit attempts to send and receive uucpd_client packets.
 </summary>
@@ -66532,7 +66349,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="90541">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="90664">
 <summary>
 Relabel packets to uucpd_client the packet type.
 </summary>
@@ -66542,7 +66359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="90561">
+<interface name="corenet_send_uucpd_server_packets" lineno="90684">
 <summary>
 Send uucpd_server packets.
 </summary>
@@ -66553,7 +66370,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90580">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90703">
 <summary>
 Do not audit attempts to send uucpd_server packets.
 </summary>
@@ -66564,7 +66381,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="90599">
+<interface name="corenet_receive_uucpd_server_packets" lineno="90722">
 <summary>
 Receive uucpd_server packets.
 </summary>
@@ -66575,7 +66392,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90618">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90741">
 <summary>
 Do not audit attempts to receive uucpd_server packets.
 </summary>
@@ -66586,7 +66403,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90637">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90760">
 <summary>
 Send and receive uucpd_server packets.
 </summary>
@@ -66597,7 +66414,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90653">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90776">
 <summary>
 Do not audit attempts to send and receive uucpd_server packets.
 </summary>
@@ -66608,7 +66425,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="90668">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="90791">
 <summary>
 Relabel packets to uucpd_server the packet type.
 </summary>
@@ -66618,7 +66435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90690">
+<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90813">
 <summary>
 Send and receive TCP traffic on the varnishd port.
 </summary>
@@ -66629,7 +66446,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="90705">
+<interface name="corenet_udp_send_varnishd_port" lineno="90828">
 <summary>
 Send UDP traffic on the varnishd port.
 </summary>
@@ -66640,7 +66457,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90720">
+<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90843">
 <summary>
 Do not audit attempts to send UDP traffic on the varnishd port.
 </summary>
@@ -66651,7 +66468,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="90735">
+<interface name="corenet_udp_receive_varnishd_port" lineno="90858">
 <summary>
 Receive UDP traffic on the varnishd port.
 </summary>
@@ -66662,7 +66479,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90750">
+<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90873">
 <summary>
 Do not audit attempts to receive UDP traffic on the varnishd port.
 </summary>
@@ -66673,7 +66490,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90765">
+<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90888">
 <summary>
 Send and receive UDP traffic on the varnishd port.
 </summary>
@@ -66684,7 +66501,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90781">
+<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90904">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the varnishd port.
@@ -66696,7 +66513,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="90796">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="90919">
 <summary>
 Bind TCP sockets to the varnishd port.
 </summary>
@@ -66707,7 +66524,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="90816">
+<interface name="corenet_udp_bind_varnishd_port" lineno="90939">
 <summary>
 Bind UDP sockets to the varnishd port.
 </summary>
@@ -66718,7 +66535,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="90835">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="90958">
 <summary>
 Make a TCP connection to the varnishd port.
 </summary>
@@ -66728,7 +66545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="90855">
+<interface name="corenet_send_varnishd_client_packets" lineno="90978">
 <summary>
 Send varnishd_client packets.
 </summary>
@@ -66739,7 +66556,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90874">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90997">
 <summary>
 Do not audit attempts to send varnishd_client packets.
 </summary>
@@ -66750,7 +66567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="90893">
+<interface name="corenet_receive_varnishd_client_packets" lineno="91016">
 <summary>
 Receive varnishd_client packets.
 </summary>
@@ -66761,7 +66578,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="90912">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91035">
 <summary>
 Do not audit attempts to receive varnishd_client packets.
 </summary>
@@ -66772,7 +66589,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="90931">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91054">
 <summary>
 Send and receive varnishd_client packets.
 </summary>
@@ -66783,7 +66600,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="90947">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91070">
 <summary>
 Do not audit attempts to send and receive varnishd_client packets.
 </summary>
@@ -66794,7 +66611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="90962">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="91085">
 <summary>
 Relabel packets to varnishd_client the packet type.
 </summary>
@@ -66804,7 +66621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="90982">
+<interface name="corenet_send_varnishd_server_packets" lineno="91105">
 <summary>
 Send varnishd_server packets.
 </summary>
@@ -66815,7 +66632,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91001">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91124">
 <summary>
 Do not audit attempts to send varnishd_server packets.
 </summary>
@@ -66826,7 +66643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91020">
+<interface name="corenet_receive_varnishd_server_packets" lineno="91143">
 <summary>
 Receive varnishd_server packets.
 </summary>
@@ -66837,7 +66654,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91039">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91162">
 <summary>
 Do not audit attempts to receive varnishd_server packets.
 </summary>
@@ -66848,7 +66665,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91058">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91181">
 <summary>
 Send and receive varnishd_server packets.
 </summary>
@@ -66859,7 +66676,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91074">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91197">
 <summary>
 Do not audit attempts to send and receive varnishd_server packets.
 </summary>
@@ -66870,7 +66687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91089">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="91212">
 <summary>
 Relabel packets to varnishd_server the packet type.
 </summary>
@@ -66880,7 +66697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91111">
+<interface name="corenet_tcp_sendrecv_virt_port" lineno="91234">
 <summary>
 Send and receive TCP traffic on the virt port.
 </summary>
@@ -66891,7 +66708,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virt_port" lineno="91126">
+<interface name="corenet_udp_send_virt_port" lineno="91249">
 <summary>
 Send UDP traffic on the virt port.
 </summary>
@@ -66902,7 +66719,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91141">
+<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91264">
 <summary>
 Do not audit attempts to send UDP traffic on the virt port.
 </summary>
@@ -66913,7 +66730,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91156">
+<interface name="corenet_udp_receive_virt_port" lineno="91279">
 <summary>
 Receive UDP traffic on the virt port.
 </summary>
@@ -66924,7 +66741,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91171">
+<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91294">
 <summary>
 Do not audit attempts to receive UDP traffic on the virt port.
 </summary>
@@ -66935,7 +66752,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91186">
+<interface name="corenet_udp_sendrecv_virt_port" lineno="91309">
 <summary>
 Send and receive UDP traffic on the virt port.
 </summary>
@@ -66946,7 +66763,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91202">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91325">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virt port.
@@ -66958,7 +66775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91217">
+<interface name="corenet_tcp_bind_virt_port" lineno="91340">
 <summary>
 Bind TCP sockets to the virt port.
 </summary>
@@ -66969,7 +66786,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91237">
+<interface name="corenet_udp_bind_virt_port" lineno="91360">
 <summary>
 Bind UDP sockets to the virt port.
 </summary>
@@ -66980,7 +66797,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91256">
+<interface name="corenet_tcp_connect_virt_port" lineno="91379">
 <summary>
 Make a TCP connection to the virt port.
 </summary>
@@ -66990,7 +66807,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_client_packets" lineno="91276">
+<interface name="corenet_send_virt_client_packets" lineno="91399">
 <summary>
 Send virt_client packets.
 </summary>
@@ -67001,7 +66818,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91295">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91418">
 <summary>
 Do not audit attempts to send virt_client packets.
 </summary>
@@ -67012,7 +66829,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91314">
+<interface name="corenet_receive_virt_client_packets" lineno="91437">
 <summary>
 Receive virt_client packets.
 </summary>
@@ -67023,7 +66840,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91333">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91456">
 <summary>
 Do not audit attempts to receive virt_client packets.
 </summary>
@@ -67034,7 +66851,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91352">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="91475">
 <summary>
 Send and receive virt_client packets.
 </summary>
@@ -67045,7 +66862,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91368">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91491">
 <summary>
 Do not audit attempts to send and receive virt_client packets.
 </summary>
@@ -67056,7 +66873,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91383">
+<interface name="corenet_relabelto_virt_client_packets" lineno="91506">
 <summary>
 Relabel packets to virt_client the packet type.
 </summary>
@@ -67066,7 +66883,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_server_packets" lineno="91403">
+<interface name="corenet_send_virt_server_packets" lineno="91526">
 <summary>
 Send virt_server packets.
 </summary>
@@ -67077,7 +66894,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91422">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91545">
 <summary>
 Do not audit attempts to send virt_server packets.
 </summary>
@@ -67088,7 +66905,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_server_packets" lineno="91441">
+<interface name="corenet_receive_virt_server_packets" lineno="91564">
 <summary>
 Receive virt_server packets.
 </summary>
@@ -67099,7 +66916,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91460">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91583">
 <summary>
 Do not audit attempts to receive virt_server packets.
 </summary>
@@ -67110,7 +66927,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="91479">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="91602">
 <summary>
 Send and receive virt_server packets.
 </summary>
@@ -67121,7 +66938,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91495">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91618">
 <summary>
 Do not audit attempts to send and receive virt_server packets.
 </summary>
@@ -67132,7 +66949,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="91510">
+<interface name="corenet_relabelto_virt_server_packets" lineno="91633">
 <summary>
 Relabel packets to virt_server the packet type.
 </summary>
@@ -67142,7 +66959,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91532">
+<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91655">
 <summary>
 Send and receive TCP traffic on the virtual_places port.
 </summary>
@@ -67153,7 +66970,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="91547">
+<interface name="corenet_udp_send_virtual_places_port" lineno="91670">
 <summary>
 Send UDP traffic on the virtual_places port.
 </summary>
@@ -67164,7 +66981,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91562">
+<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91685">
 <summary>
 Do not audit attempts to send UDP traffic on the virtual_places port.
 </summary>
@@ -67175,7 +66992,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="91577">
+<interface name="corenet_udp_receive_virtual_places_port" lineno="91700">
 <summary>
 Receive UDP traffic on the virtual_places port.
 </summary>
@@ -67186,7 +67003,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91592">
+<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91715">
 <summary>
 Do not audit attempts to receive UDP traffic on the virtual_places port.
 </summary>
@@ -67197,7 +67014,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91607">
+<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91730">
 <summary>
 Send and receive UDP traffic on the virtual_places port.
 </summary>
@@ -67208,7 +67025,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91623">
+<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91746">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virtual_places port.
@@ -67220,7 +67037,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="91638">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="91761">
 <summary>
 Bind TCP sockets to the virtual_places port.
 </summary>
@@ -67231,7 +67048,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="91658">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="91781">
 <summary>
 Bind UDP sockets to the virtual_places port.
 </summary>
@@ -67242,7 +67059,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="91677">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="91800">
 <summary>
 Make a TCP connection to the virtual_places port.
 </summary>
@@ -67252,7 +67069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="91697">
+<interface name="corenet_send_virtual_places_client_packets" lineno="91820">
 <summary>
 Send virtual_places_client packets.
 </summary>
@@ -67263,7 +67080,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91716">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91839">
 <summary>
 Do not audit attempts to send virtual_places_client packets.
 </summary>
@@ -67274,7 +67091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="91735">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="91858">
 <summary>
 Receive virtual_places_client packets.
 </summary>
@@ -67285,7 +67102,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91754">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91877">
 <summary>
 Do not audit attempts to receive virtual_places_client packets.
 </summary>
@@ -67296,7 +67113,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91773">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91896">
 <summary>
 Send and receive virtual_places_client packets.
 </summary>
@@ -67307,7 +67124,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91789">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91912">
 <summary>
 Do not audit attempts to send and receive virtual_places_client packets.
 </summary>
@@ -67318,7 +67135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91804">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91927">
 <summary>
 Relabel packets to virtual_places_client the packet type.
 </summary>
@@ -67328,7 +67145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="91824">
+<interface name="corenet_send_virtual_places_server_packets" lineno="91947">
 <summary>
 Send virtual_places_server packets.
 </summary>
@@ -67339,7 +67156,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91843">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91966">
 <summary>
 Do not audit attempts to send virtual_places_server packets.
 </summary>
@@ -67350,7 +67167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="91862">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="91985">
 <summary>
 Receive virtual_places_server packets.
 </summary>
@@ -67361,7 +67178,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="91881">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92004">
 <summary>
 Do not audit attempts to receive virtual_places_server packets.
 </summary>
@@ -67372,7 +67189,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="91900">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92023">
 <summary>
 Send and receive virtual_places_server packets.
 </summary>
@@ -67383,7 +67200,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="91916">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92039">
 <summary>
 Do not audit attempts to send and receive virtual_places_server packets.
 </summary>
@@ -67394,7 +67211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="91931">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92054">
 <summary>
 Relabel packets to virtual_places_server the packet type.
 </summary>
@@ -67404,7 +67221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="91953">
+<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92076">
 <summary>
 Send and receive TCP traffic on the virt_migration port.
 </summary>
@@ -67415,7 +67232,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="91968">
+<interface name="corenet_udp_send_virt_migration_port" lineno="92091">
 <summary>
 Send UDP traffic on the virt_migration port.
 </summary>
@@ -67426,7 +67243,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="91983">
+<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92106">
 <summary>
 Do not audit attempts to send UDP traffic on the virt_migration port.
 </summary>
@@ -67437,7 +67254,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="91998">
+<interface name="corenet_udp_receive_virt_migration_port" lineno="92121">
 <summary>
 Receive UDP traffic on the virt_migration port.
 </summary>
@@ -67448,7 +67265,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92013">
+<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92136">
 <summary>
 Do not audit attempts to receive UDP traffic on the virt_migration port.
 </summary>
@@ -67459,7 +67276,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92028">
+<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92151">
 <summary>
 Send and receive UDP traffic on the virt_migration port.
 </summary>
@@ -67470,7 +67287,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92044">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92167">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virt_migration port.
@@ -67482,7 +67299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92059">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="92182">
 <summary>
 Bind TCP sockets to the virt_migration port.
 </summary>
@@ -67493,7 +67310,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92079">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="92202">
 <summary>
 Bind UDP sockets to the virt_migration port.
 </summary>
@@ -67504,7 +67321,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92098">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="92221">
 <summary>
 Make a TCP connection to the virt_migration port.
 </summary>
@@ -67514,7 +67331,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92118">
+<interface name="corenet_send_virt_migration_client_packets" lineno="92241">
 <summary>
 Send virt_migration_client packets.
 </summary>
@@ -67525,7 +67342,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92137">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92260">
 <summary>
 Do not audit attempts to send virt_migration_client packets.
 </summary>
@@ -67536,7 +67353,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92156">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="92279">
 <summary>
 Receive virt_migration_client packets.
 </summary>
@@ -67547,7 +67364,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92175">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92298">
 <summary>
 Do not audit attempts to receive virt_migration_client packets.
 </summary>
@@ -67558,7 +67375,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92194">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92317">
 <summary>
 Send and receive virt_migration_client packets.
 </summary>
@@ -67569,7 +67386,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92210">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92333">
 <summary>
 Do not audit attempts to send and receive virt_migration_client packets.
 </summary>
@@ -67580,7 +67397,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92225">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92348">
 <summary>
 Relabel packets to virt_migration_client the packet type.
 </summary>
@@ -67590,7 +67407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92245">
+<interface name="corenet_send_virt_migration_server_packets" lineno="92368">
 <summary>
 Send virt_migration_server packets.
 </summary>
@@ -67601,7 +67418,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92264">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92387">
 <summary>
 Do not audit attempts to send virt_migration_server packets.
 </summary>
@@ -67612,7 +67429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92283">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="92406">
 <summary>
 Receive virt_migration_server packets.
 </summary>
@@ -67623,7 +67440,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92302">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92425">
 <summary>
 Do not audit attempts to receive virt_migration_server packets.
 </summary>
@@ -67634,7 +67451,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92321">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92444">
 <summary>
 Send and receive virt_migration_server packets.
 </summary>
@@ -67645,7 +67462,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92337">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92460">
 <summary>
 Do not audit attempts to send and receive virt_migration_server packets.
 </summary>
@@ -67656,7 +67473,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92352">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92475">
 <summary>
 Relabel packets to virt_migration_server the packet type.
 </summary>
@@ -67666,7 +67483,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92374">
+<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92497">
 <summary>
 Send and receive TCP traffic on the vnc port.
 </summary>
@@ -67677,7 +67494,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92389">
+<interface name="corenet_udp_send_vnc_port" lineno="92512">
 <summary>
 Send UDP traffic on the vnc port.
 </summary>
@@ -67688,7 +67505,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92404">
+<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92527">
 <summary>
 Do not audit attempts to send UDP traffic on the vnc port.
 </summary>
@@ -67699,7 +67516,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92419">
+<interface name="corenet_udp_receive_vnc_port" lineno="92542">
 <summary>
 Receive UDP traffic on the vnc port.
 </summary>
@@ -67710,7 +67527,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92434">
+<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92557">
 <summary>
 Do not audit attempts to receive UDP traffic on the vnc port.
 </summary>
@@ -67721,7 +67538,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="92449">
+<interface name="corenet_udp_sendrecv_vnc_port" lineno="92572">
 <summary>
 Send and receive UDP traffic on the vnc port.
 </summary>
@@ -67732,7 +67549,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92465">
+<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92588">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the vnc port.
@@ -67744,7 +67561,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="92480">
+<interface name="corenet_tcp_bind_vnc_port" lineno="92603">
 <summary>
 Bind TCP sockets to the vnc port.
 </summary>
@@ -67755,7 +67572,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="92500">
+<interface name="corenet_udp_bind_vnc_port" lineno="92623">
 <summary>
 Bind UDP sockets to the vnc port.
 </summary>
@@ -67766,7 +67583,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="92519">
+<interface name="corenet_tcp_connect_vnc_port" lineno="92642">
 <summary>
 Make a TCP connection to the vnc port.
 </summary>
@@ -67776,7 +67593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_client_packets" lineno="92539">
+<interface name="corenet_send_vnc_client_packets" lineno="92662">
 <summary>
 Send vnc_client packets.
 </summary>
@@ -67787,7 +67604,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92558">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92681">
 <summary>
 Do not audit attempts to send vnc_client packets.
 </summary>
@@ -67798,7 +67615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="92577">
+<interface name="corenet_receive_vnc_client_packets" lineno="92700">
 <summary>
 Receive vnc_client packets.
 </summary>
@@ -67809,7 +67626,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92596">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92719">
 <summary>
 Do not audit attempts to receive vnc_client packets.
 </summary>
@@ -67820,7 +67637,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="92615">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="92738">
 <summary>
 Send and receive vnc_client packets.
 </summary>
@@ -67831,7 +67648,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92631">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92754">
 <summary>
 Do not audit attempts to send and receive vnc_client packets.
 </summary>
@@ -67842,7 +67659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="92646">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="92769">
 <summary>
 Relabel packets to vnc_client the packet type.
 </summary>
@@ -67852,7 +67669,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_server_packets" lineno="92666">
+<interface name="corenet_send_vnc_server_packets" lineno="92789">
 <summary>
 Send vnc_server packets.
 </summary>
@@ -67863,7 +67680,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92685">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92808">
 <summary>
 Do not audit attempts to send vnc_server packets.
 </summary>
@@ -67874,7 +67691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="92704">
+<interface name="corenet_receive_vnc_server_packets" lineno="92827">
 <summary>
 Receive vnc_server packets.
 </summary>
@@ -67885,7 +67702,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92723">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92846">
 <summary>
 Do not audit attempts to receive vnc_server packets.
 </summary>
@@ -67896,7 +67713,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="92742">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="92865">
 <summary>
 Send and receive vnc_server packets.
 </summary>
@@ -67907,7 +67724,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92758">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92881">
 <summary>
 Do not audit attempts to send and receive vnc_server packets.
 </summary>
@@ -67918,7 +67735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="92773">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="92896">
 <summary>
 Relabel packets to vnc_server the packet type.
 </summary>
@@ -67928,7 +67745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92795">
+<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92918">
 <summary>
 Send and receive TCP traffic on the wccp port.
 </summary>
@@ -67939,7 +67756,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wccp_port" lineno="92810">
+<interface name="corenet_udp_send_wccp_port" lineno="92933">
 <summary>
 Send UDP traffic on the wccp port.
 </summary>
@@ -67950,7 +67767,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92825">
+<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92948">
 <summary>
 Do not audit attempts to send UDP traffic on the wccp port.
 </summary>
@@ -67961,7 +67778,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="92840">
+<interface name="corenet_udp_receive_wccp_port" lineno="92963">
 <summary>
 Receive UDP traffic on the wccp port.
 </summary>
@@ -67972,7 +67789,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92855">
+<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92978">
 <summary>
 Do not audit attempts to receive UDP traffic on the wccp port.
 </summary>
@@ -67983,7 +67800,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="92870">
+<interface name="corenet_udp_sendrecv_wccp_port" lineno="92993">
 <summary>
 Send and receive UDP traffic on the wccp port.
 </summary>
@@ -67994,7 +67811,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="92886">
+<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93009">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wccp port.
@@ -68006,7 +67823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="92901">
+<interface name="corenet_tcp_bind_wccp_port" lineno="93024">
 <summary>
 Bind TCP sockets to the wccp port.
 </summary>
@@ -68017,7 +67834,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="92921">
+<interface name="corenet_udp_bind_wccp_port" lineno="93044">
 <summary>
 Bind UDP sockets to the wccp port.
 </summary>
@@ -68028,7 +67845,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="92940">
+<interface name="corenet_tcp_connect_wccp_port" lineno="93063">
 <summary>
 Make a TCP connection to the wccp port.
 </summary>
@@ -68038,7 +67855,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_client_packets" lineno="92960">
+<interface name="corenet_send_wccp_client_packets" lineno="93083">
 <summary>
 Send wccp_client packets.
 </summary>
@@ -68049,7 +67866,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="92979">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93102">
 <summary>
 Do not audit attempts to send wccp_client packets.
 </summary>
@@ -68060,7 +67877,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="92998">
+<interface name="corenet_receive_wccp_client_packets" lineno="93121">
 <summary>
 Receive wccp_client packets.
 </summary>
@@ -68071,7 +67888,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93017">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93140">
 <summary>
 Do not audit attempts to receive wccp_client packets.
 </summary>
@@ -68082,7 +67899,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93036">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="93159">
 <summary>
 Send and receive wccp_client packets.
 </summary>
@@ -68093,7 +67910,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93052">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93175">
 <summary>
 Do not audit attempts to send and receive wccp_client packets.
 </summary>
@@ -68104,7 +67921,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93067">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="93190">
 <summary>
 Relabel packets to wccp_client the packet type.
 </summary>
@@ -68114,7 +67931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93087">
+<interface name="corenet_send_wccp_server_packets" lineno="93210">
 <summary>
 Send wccp_server packets.
 </summary>
@@ -68125,7 +67942,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93106">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93229">
 <summary>
 Do not audit attempts to send wccp_server packets.
 </summary>
@@ -68136,7 +67953,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93125">
+<interface name="corenet_receive_wccp_server_packets" lineno="93248">
 <summary>
 Receive wccp_server packets.
 </summary>
@@ -68147,7 +67964,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93144">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93267">
 <summary>
 Do not audit attempts to receive wccp_server packets.
 </summary>
@@ -68158,7 +67975,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93163">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="93286">
 <summary>
 Send and receive wccp_server packets.
 </summary>
@@ -68169,7 +67986,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93179">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93302">
 <summary>
 Do not audit attempts to send and receive wccp_server packets.
 </summary>
@@ -68180,7 +67997,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93194">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="93317">
 <summary>
 Relabel packets to wccp_server the packet type.
 </summary>
@@ -68190,7 +68007,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93216">
+<interface name="corenet_tcp_sendrecv_websm_port" lineno="93339">
 <summary>
 Send and receive TCP traffic on the websm port.
 </summary>
@@ -68201,7 +68018,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_websm_port" lineno="93231">
+<interface name="corenet_udp_send_websm_port" lineno="93354">
 <summary>
 Send UDP traffic on the websm port.
 </summary>
@@ -68212,7 +68029,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93246">
+<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93369">
 <summary>
 Do not audit attempts to send UDP traffic on the websm port.
 </summary>
@@ -68223,7 +68040,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93261">
+<interface name="corenet_udp_receive_websm_port" lineno="93384">
 <summary>
 Receive UDP traffic on the websm port.
 </summary>
@@ -68234,7 +68051,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93276">
+<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93399">
 <summary>
 Do not audit attempts to receive UDP traffic on the websm port.
 </summary>
@@ -68245,7 +68062,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93291">
+<interface name="corenet_udp_sendrecv_websm_port" lineno="93414">
 <summary>
 Send and receive UDP traffic on the websm port.
 </summary>
@@ -68256,7 +68073,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93307">
+<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93430">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the websm port.
@@ -68268,7 +68085,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93322">
+<interface name="corenet_tcp_bind_websm_port" lineno="93445">
 <summary>
 Bind TCP sockets to the websm port.
 </summary>
@@ -68279,7 +68096,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93342">
+<interface name="corenet_udp_bind_websm_port" lineno="93465">
 <summary>
 Bind UDP sockets to the websm port.
 </summary>
@@ -68290,7 +68107,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93361">
+<interface name="corenet_tcp_connect_websm_port" lineno="93484">
 <summary>
 Make a TCP connection to the websm port.
 </summary>
@@ -68300,7 +68117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_client_packets" lineno="93381">
+<interface name="corenet_send_websm_client_packets" lineno="93504">
 <summary>
 Send websm_client packets.
 </summary>
@@ -68311,7 +68128,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93400">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93523">
 <summary>
 Do not audit attempts to send websm_client packets.
 </summary>
@@ -68322,7 +68139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93419">
+<interface name="corenet_receive_websm_client_packets" lineno="93542">
 <summary>
 Receive websm_client packets.
 </summary>
@@ -68333,7 +68150,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93438">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93561">
 <summary>
 Do not audit attempts to receive websm_client packets.
 </summary>
@@ -68344,7 +68161,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="93457">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="93580">
 <summary>
 Send and receive websm_client packets.
 </summary>
@@ -68355,7 +68172,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93473">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93596">
 <summary>
 Do not audit attempts to send and receive websm_client packets.
 </summary>
@@ -68366,7 +68183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="93488">
+<interface name="corenet_relabelto_websm_client_packets" lineno="93611">
 <summary>
 Relabel packets to websm_client the packet type.
 </summary>
@@ -68376,7 +68193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_server_packets" lineno="93508">
+<interface name="corenet_send_websm_server_packets" lineno="93631">
 <summary>
 Send websm_server packets.
 </summary>
@@ -68387,7 +68204,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93527">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93650">
 <summary>
 Do not audit attempts to send websm_server packets.
 </summary>
@@ -68398,7 +68215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_server_packets" lineno="93546">
+<interface name="corenet_receive_websm_server_packets" lineno="93669">
 <summary>
 Receive websm_server packets.
 </summary>
@@ -68409,7 +68226,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93565">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93688">
 <summary>
 Do not audit attempts to receive websm_server packets.
 </summary>
@@ -68420,7 +68237,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="93584">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="93707">
 <summary>
 Send and receive websm_server packets.
 </summary>
@@ -68431,7 +68248,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93600">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93723">
 <summary>
 Do not audit attempts to send and receive websm_server packets.
 </summary>
@@ -68442,7 +68259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="93615">
+<interface name="corenet_relabelto_websm_server_packets" lineno="93738">
 <summary>
 Relabel packets to websm_server the packet type.
 </summary>
@@ -68452,7 +68269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="93637">
+<interface name="corenet_tcp_sendrecv_whois_port" lineno="93760">
 <summary>
 Send and receive TCP traffic on the whois port.
 </summary>
@@ -68463,7 +68280,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_whois_port" lineno="93652">
+<interface name="corenet_udp_send_whois_port" lineno="93775">
 <summary>
 Send UDP traffic on the whois port.
 </summary>
@@ -68474,7 +68291,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93667">
+<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93790">
 <summary>
 Do not audit attempts to send UDP traffic on the whois port.
 </summary>
@@ -68485,7 +68302,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_whois_port" lineno="93682">
+<interface name="corenet_udp_receive_whois_port" lineno="93805">
 <summary>
 Receive UDP traffic on the whois port.
 </summary>
@@ -68496,7 +68313,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93697">
+<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93820">
 <summary>
 Do not audit attempts to receive UDP traffic on the whois port.
 </summary>
@@ -68507,7 +68324,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="93712">
+<interface name="corenet_udp_sendrecv_whois_port" lineno="93835">
 <summary>
 Send and receive UDP traffic on the whois port.
 </summary>
@@ -68518,7 +68335,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93728">
+<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93851">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the whois port.
@@ -68530,7 +68347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="93743">
+<interface name="corenet_tcp_bind_whois_port" lineno="93866">
 <summary>
 Bind TCP sockets to the whois port.
 </summary>
@@ -68541,7 +68358,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_whois_port" lineno="93763">
+<interface name="corenet_udp_bind_whois_port" lineno="93886">
 <summary>
 Bind UDP sockets to the whois port.
 </summary>
@@ -68552,7 +68369,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="93782">
+<interface name="corenet_tcp_connect_whois_port" lineno="93905">
 <summary>
 Make a TCP connection to the whois port.
 </summary>
@@ -68562,7 +68379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_client_packets" lineno="93802">
+<interface name="corenet_send_whois_client_packets" lineno="93925">
 <summary>
 Send whois_client packets.
 </summary>
@@ -68573,7 +68390,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93821">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93944">
 <summary>
 Do not audit attempts to send whois_client packets.
 </summary>
@@ -68584,7 +68401,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_client_packets" lineno="93840">
+<interface name="corenet_receive_whois_client_packets" lineno="93963">
 <summary>
 Receive whois_client packets.
 </summary>
@@ -68595,7 +68412,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93859">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93982">
 <summary>
 Do not audit attempts to receive whois_client packets.
 </summary>
@@ -68606,7 +68423,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="93878">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="94001">
 <summary>
 Send and receive whois_client packets.
 </summary>
@@ -68617,7 +68434,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="93894">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94017">
 <summary>
 Do not audit attempts to send and receive whois_client packets.
 </summary>
@@ -68628,7 +68445,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="93909">
+<interface name="corenet_relabelto_whois_client_packets" lineno="94032">
 <summary>
 Relabel packets to whois_client the packet type.
 </summary>
@@ -68638,7 +68455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_server_packets" lineno="93929">
+<interface name="corenet_send_whois_server_packets" lineno="94052">
 <summary>
 Send whois_server packets.
 </summary>
@@ -68649,7 +68466,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="93948">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94071">
 <summary>
 Do not audit attempts to send whois_server packets.
 </summary>
@@ -68660,7 +68477,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_server_packets" lineno="93967">
+<interface name="corenet_receive_whois_server_packets" lineno="94090">
 <summary>
 Receive whois_server packets.
 </summary>
@@ -68671,7 +68488,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="93986">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94109">
 <summary>
 Do not audit attempts to receive whois_server packets.
 </summary>
@@ -68682,7 +68499,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94005">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="94128">
 <summary>
 Send and receive whois_server packets.
 </summary>
@@ -68693,7 +68510,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94021">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94144">
 <summary>
 Do not audit attempts to send and receive whois_server packets.
 </summary>
@@ -68704,7 +68521,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94036">
+<interface name="corenet_relabelto_whois_server_packets" lineno="94159">
 <summary>
 Relabel packets to whois_server the packet type.
 </summary>
@@ -68714,7 +68531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94058">
+<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94181">
 <summary>
 Send and receive TCP traffic on the winshadow port.
 </summary>
@@ -68725,7 +68542,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94073">
+<interface name="corenet_udp_send_winshadow_port" lineno="94196">
 <summary>
 Send UDP traffic on the winshadow port.
 </summary>
@@ -68736,7 +68553,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94088">
+<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94211">
 <summary>
 Do not audit attempts to send UDP traffic on the winshadow port.
 </summary>
@@ -68747,7 +68564,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94103">
+<interface name="corenet_udp_receive_winshadow_port" lineno="94226">
 <summary>
 Receive UDP traffic on the winshadow port.
 </summary>
@@ -68758,7 +68575,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94118">
+<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94241">
 <summary>
 Do not audit attempts to receive UDP traffic on the winshadow port.
 </summary>
@@ -68769,7 +68586,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94133">
+<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94256">
 <summary>
 Send and receive UDP traffic on the winshadow port.
 </summary>
@@ -68780,7 +68597,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94149">
+<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94272">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the winshadow port.
@@ -68792,7 +68609,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94164">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="94287">
 <summary>
 Bind TCP sockets to the winshadow port.
 </summary>
@@ -68803,7 +68620,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94184">
+<interface name="corenet_udp_bind_winshadow_port" lineno="94307">
 <summary>
 Bind UDP sockets to the winshadow port.
 </summary>
@@ -68814,7 +68631,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94203">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="94326">
 <summary>
 Make a TCP connection to the winshadow port.
 </summary>
@@ -68824,7 +68641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94223">
+<interface name="corenet_send_winshadow_client_packets" lineno="94346">
 <summary>
 Send winshadow_client packets.
 </summary>
@@ -68835,7 +68652,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94242">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94365">
 <summary>
 Do not audit attempts to send winshadow_client packets.
 </summary>
@@ -68846,7 +68663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94261">
+<interface name="corenet_receive_winshadow_client_packets" lineno="94384">
 <summary>
 Receive winshadow_client packets.
 </summary>
@@ -68857,7 +68674,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94280">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94403">
 <summary>
 Do not audit attempts to receive winshadow_client packets.
 </summary>
@@ -68868,7 +68685,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94299">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94422">
 <summary>
 Send and receive winshadow_client packets.
 </summary>
@@ -68879,7 +68696,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94315">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94438">
 <summary>
 Do not audit attempts to send and receive winshadow_client packets.
 </summary>
@@ -68890,7 +68707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94330">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="94453">
 <summary>
 Relabel packets to winshadow_client the packet type.
 </summary>
@@ -68900,7 +68717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94350">
+<interface name="corenet_send_winshadow_server_packets" lineno="94473">
 <summary>
 Send winshadow_server packets.
 </summary>
@@ -68911,7 +68728,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94369">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94492">
 <summary>
 Do not audit attempts to send winshadow_server packets.
 </summary>
@@ -68922,7 +68739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94388">
+<interface name="corenet_receive_winshadow_server_packets" lineno="94511">
 <summary>
 Receive winshadow_server packets.
 </summary>
@@ -68933,7 +68750,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94407">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94530">
 <summary>
 Do not audit attempts to receive winshadow_server packets.
 </summary>
@@ -68944,7 +68761,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94426">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94549">
 <summary>
 Send and receive winshadow_server packets.
 </summary>
@@ -68955,7 +68772,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94442">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94565">
 <summary>
 Do not audit attempts to send and receive winshadow_server packets.
 </summary>
@@ -68966,7 +68783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="94457">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="94580">
 <summary>
 Relabel packets to winshadow_server the packet type.
 </summary>
@@ -68976,7 +68793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94479">
+<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94602">
 <summary>
 Send and receive TCP traffic on the wsdapi port.
 </summary>
@@ -68987,7 +68804,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="94494">
+<interface name="corenet_udp_send_wsdapi_port" lineno="94617">
 <summary>
 Send UDP traffic on the wsdapi port.
 </summary>
@@ -68998,7 +68815,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94509">
+<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94632">
 <summary>
 Do not audit attempts to send UDP traffic on the wsdapi port.
 </summary>
@@ -69009,7 +68826,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="94524">
+<interface name="corenet_udp_receive_wsdapi_port" lineno="94647">
 <summary>
 Receive UDP traffic on the wsdapi port.
 </summary>
@@ -69020,7 +68837,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94539">
+<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94662">
 <summary>
 Do not audit attempts to receive UDP traffic on the wsdapi port.
 </summary>
@@ -69031,7 +68848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94554">
+<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94677">
 <summary>
 Send and receive UDP traffic on the wsdapi port.
 </summary>
@@ -69042,7 +68859,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94570">
+<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94693">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wsdapi port.
@@ -69054,7 +68871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="94585">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="94708">
 <summary>
 Bind TCP sockets to the wsdapi port.
 </summary>
@@ -69065,7 +68882,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="94605">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="94728">
 <summary>
 Bind UDP sockets to the wsdapi port.
 </summary>
@@ -69076,7 +68893,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="94624">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="94747">
 <summary>
 Make a TCP connection to the wsdapi port.
 </summary>
@@ -69086,7 +68903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="94644">
+<interface name="corenet_send_wsdapi_client_packets" lineno="94767">
 <summary>
 Send wsdapi_client packets.
 </summary>
@@ -69097,7 +68914,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94663">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94786">
 <summary>
 Do not audit attempts to send wsdapi_client packets.
 </summary>
@@ -69108,7 +68925,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="94682">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="94805">
 <summary>
 Receive wsdapi_client packets.
 </summary>
@@ -69119,7 +68936,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94701">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94824">
 <summary>
 Do not audit attempts to receive wsdapi_client packets.
 </summary>
@@ -69130,7 +68947,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94720">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94843">
 <summary>
 Send and receive wsdapi_client packets.
 </summary>
@@ -69141,7 +68958,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94736">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94859">
 <summary>
 Do not audit attempts to send and receive wsdapi_client packets.
 </summary>
@@ -69152,7 +68969,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94751">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94874">
 <summary>
 Relabel packets to wsdapi_client the packet type.
 </summary>
@@ -69162,7 +68979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="94771">
+<interface name="corenet_send_wsdapi_server_packets" lineno="94894">
 <summary>
 Send wsdapi_server packets.
 </summary>
@@ -69173,7 +68990,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94790">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94913">
 <summary>
 Do not audit attempts to send wsdapi_server packets.
 </summary>
@@ -69184,7 +69001,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="94809">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="94932">
 <summary>
 Receive wsdapi_server packets.
 </summary>
@@ -69195,7 +69012,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94828">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94951">
 <summary>
 Do not audit attempts to receive wsdapi_server packets.
 </summary>
@@ -69206,7 +69023,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94847">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94970">
 <summary>
 Send and receive wsdapi_server packets.
 </summary>
@@ -69217,7 +69034,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94863">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94986">
 <summary>
 Do not audit attempts to send and receive wsdapi_server packets.
 </summary>
@@ -69228,7 +69045,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="94878">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95001">
 <summary>
 Relabel packets to wsdapi_server the packet type.
 </summary>
@@ -69238,7 +69055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="94900">
+<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95023">
 <summary>
 Send and receive TCP traffic on the wsicopy port.
 </summary>
@@ -69249,7 +69066,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="94915">
+<interface name="corenet_udp_send_wsicopy_port" lineno="95038">
 <summary>
 Send UDP traffic on the wsicopy port.
 </summary>
@@ -69260,7 +69077,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="94930">
+<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95053">
 <summary>
 Do not audit attempts to send UDP traffic on the wsicopy port.
 </summary>
@@ -69271,7 +69088,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="94945">
+<interface name="corenet_udp_receive_wsicopy_port" lineno="95068">
 <summary>
 Receive UDP traffic on the wsicopy port.
 </summary>
@@ -69282,7 +69099,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="94960">
+<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95083">
 <summary>
 Do not audit attempts to receive UDP traffic on the wsicopy port.
 </summary>
@@ -69293,7 +69110,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="94975">
+<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95098">
 <summary>
 Send and receive UDP traffic on the wsicopy port.
 </summary>
@@ -69304,7 +69121,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="94991">
+<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95114">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wsicopy port.
@@ -69316,7 +69133,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95006">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="95129">
 <summary>
 Bind TCP sockets to the wsicopy port.
 </summary>
@@ -69327,7 +69144,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95026">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="95149">
 <summary>
 Bind UDP sockets to the wsicopy port.
 </summary>
@@ -69338,7 +69155,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95045">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="95168">
 <summary>
 Make a TCP connection to the wsicopy port.
 </summary>
@@ -69348,7 +69165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95065">
+<interface name="corenet_send_wsicopy_client_packets" lineno="95188">
 <summary>
 Send wsicopy_client packets.
 </summary>
@@ -69359,7 +69176,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95084">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95207">
 <summary>
 Do not audit attempts to send wsicopy_client packets.
 </summary>
@@ -69370,7 +69187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95103">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="95226">
 <summary>
 Receive wsicopy_client packets.
 </summary>
@@ -69381,7 +69198,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95122">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95245">
 <summary>
 Do not audit attempts to receive wsicopy_client packets.
 </summary>
@@ -69392,7 +69209,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95141">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95264">
 <summary>
 Send and receive wsicopy_client packets.
 </summary>
@@ -69403,7 +69220,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95157">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95280">
 <summary>
 Do not audit attempts to send and receive wsicopy_client packets.
 </summary>
@@ -69414,7 +69231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95172">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95295">
 <summary>
 Relabel packets to wsicopy_client the packet type.
 </summary>
@@ -69424,7 +69241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95192">
+<interface name="corenet_send_wsicopy_server_packets" lineno="95315">
 <summary>
 Send wsicopy_server packets.
 </summary>
@@ -69435,7 +69252,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95211">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95334">
 <summary>
 Do not audit attempts to send wsicopy_server packets.
 </summary>
@@ -69446,7 +69263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95230">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="95353">
 <summary>
 Receive wsicopy_server packets.
 </summary>
@@ -69457,7 +69274,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95249">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95372">
 <summary>
 Do not audit attempts to receive wsicopy_server packets.
 </summary>
@@ -69468,7 +69285,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95268">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95391">
 <summary>
 Send and receive wsicopy_server packets.
 </summary>
@@ -69479,7 +69296,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95284">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95407">
 <summary>
 Do not audit attempts to send and receive wsicopy_server packets.
 </summary>
@@ -69490,7 +69307,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95299">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95422">
 <summary>
 Relabel packets to wsicopy_server the packet type.
 </summary>
@@ -69500,7 +69317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95321">
+<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95444">
 <summary>
 Send and receive TCP traffic on the xdmcp port.
 </summary>
@@ -69511,7 +69328,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95336">
+<interface name="corenet_udp_send_xdmcp_port" lineno="95459">
 <summary>
 Send UDP traffic on the xdmcp port.
 </summary>
@@ -69522,7 +69339,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95351">
+<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95474">
 <summary>
 Do not audit attempts to send UDP traffic on the xdmcp port.
 </summary>
@@ -69533,7 +69350,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95366">
+<interface name="corenet_udp_receive_xdmcp_port" lineno="95489">
 <summary>
 Receive UDP traffic on the xdmcp port.
 </summary>
@@ -69544,7 +69361,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95381">
+<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95504">
 <summary>
 Do not audit attempts to receive UDP traffic on the xdmcp port.
 </summary>
@@ -69555,7 +69372,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95396">
+<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95519">
 <summary>
 Send and receive UDP traffic on the xdmcp port.
 </summary>
@@ -69566,7 +69383,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95412">
+<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95535">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xdmcp port.
@@ -69578,7 +69395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95427">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="95550">
 <summary>
 Bind TCP sockets to the xdmcp port.
 </summary>
@@ -69589,7 +69406,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="95447">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="95570">
 <summary>
 Bind UDP sockets to the xdmcp port.
 </summary>
@@ -69600,7 +69417,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="95466">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="95589">
 <summary>
 Make a TCP connection to the xdmcp port.
 </summary>
@@ -69610,7 +69427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="95486">
+<interface name="corenet_send_xdmcp_client_packets" lineno="95609">
 <summary>
 Send xdmcp_client packets.
 </summary>
@@ -69621,7 +69438,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95505">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95628">
 <summary>
 Do not audit attempts to send xdmcp_client packets.
 </summary>
@@ -69632,7 +69449,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="95524">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="95647">
 <summary>
 Receive xdmcp_client packets.
 </summary>
@@ -69643,7 +69460,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95543">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95666">
 <summary>
 Do not audit attempts to receive xdmcp_client packets.
 </summary>
@@ -69654,7 +69471,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95562">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95685">
 <summary>
 Send and receive xdmcp_client packets.
 </summary>
@@ -69665,7 +69482,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95578">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95701">
 <summary>
 Do not audit attempts to send and receive xdmcp_client packets.
 </summary>
@@ -69676,7 +69493,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95593">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95716">
 <summary>
 Relabel packets to xdmcp_client the packet type.
 </summary>
@@ -69686,7 +69503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="95613">
+<interface name="corenet_send_xdmcp_server_packets" lineno="95736">
 <summary>
 Send xdmcp_server packets.
 </summary>
@@ -69697,7 +69514,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95632">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95755">
 <summary>
 Do not audit attempts to send xdmcp_server packets.
 </summary>
@@ -69708,7 +69525,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="95651">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="95774">
 <summary>
 Receive xdmcp_server packets.
 </summary>
@@ -69719,7 +69536,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95670">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95793">
 <summary>
 Do not audit attempts to receive xdmcp_server packets.
 </summary>
@@ -69730,7 +69547,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95689">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95812">
 <summary>
 Send and receive xdmcp_server packets.
 </summary>
@@ -69741,7 +69558,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95705">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95828">
 <summary>
 Do not audit attempts to send and receive xdmcp_server packets.
 </summary>
@@ -69752,7 +69569,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95720">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95843">
 <summary>
 Relabel packets to xdmcp_server the packet type.
 </summary>
@@ -69762,7 +69579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="95742">
+<interface name="corenet_tcp_sendrecv_xen_port" lineno="95865">
 <summary>
 Send and receive TCP traffic on the xen port.
 </summary>
@@ -69773,7 +69590,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xen_port" lineno="95757">
+<interface name="corenet_udp_send_xen_port" lineno="95880">
 <summary>
 Send UDP traffic on the xen port.
 </summary>
@@ -69784,7 +69601,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95772">
+<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95895">
 <summary>
 Do not audit attempts to send UDP traffic on the xen port.
 </summary>
@@ -69795,7 +69612,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xen_port" lineno="95787">
+<interface name="corenet_udp_receive_xen_port" lineno="95910">
 <summary>
 Receive UDP traffic on the xen port.
 </summary>
@@ -69806,7 +69623,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95802">
+<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95925">
 <summary>
 Do not audit attempts to receive UDP traffic on the xen port.
 </summary>
@@ -69817,7 +69634,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="95817">
+<interface name="corenet_udp_sendrecv_xen_port" lineno="95940">
 <summary>
 Send and receive UDP traffic on the xen port.
 </summary>
@@ -69828,7 +69645,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95833">
+<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95956">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xen port.
@@ -69840,7 +69657,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="95848">
+<interface name="corenet_tcp_bind_xen_port" lineno="95971">
 <summary>
 Bind TCP sockets to the xen port.
 </summary>
@@ -69851,7 +69668,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xen_port" lineno="95868">
+<interface name="corenet_udp_bind_xen_port" lineno="95991">
 <summary>
 Bind UDP sockets to the xen port.
 </summary>
@@ -69862,7 +69679,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="95887">
+<interface name="corenet_tcp_connect_xen_port" lineno="96010">
 <summary>
 Make a TCP connection to the xen port.
 </summary>
@@ -69872,7 +69689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_client_packets" lineno="95907">
+<interface name="corenet_send_xen_client_packets" lineno="96030">
 <summary>
 Send xen_client packets.
 </summary>
@@ -69883,7 +69700,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="95926">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96049">
 <summary>
 Do not audit attempts to send xen_client packets.
 </summary>
@@ -69894,7 +69711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_client_packets" lineno="95945">
+<interface name="corenet_receive_xen_client_packets" lineno="96068">
 <summary>
 Receive xen_client packets.
 </summary>
@@ -69905,7 +69722,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="95964">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96087">
 <summary>
 Do not audit attempts to receive xen_client packets.
 </summary>
@@ -69916,7 +69733,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="95983">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="96106">
 <summary>
 Send and receive xen_client packets.
 </summary>
@@ -69927,7 +69744,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="95999">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96122">
 <summary>
 Do not audit attempts to send and receive xen_client packets.
 </summary>
@@ -69938,7 +69755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96014">
+<interface name="corenet_relabelto_xen_client_packets" lineno="96137">
 <summary>
 Relabel packets to xen_client the packet type.
 </summary>
@@ -69948,7 +69765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_server_packets" lineno="96034">
+<interface name="corenet_send_xen_server_packets" lineno="96157">
 <summary>
 Send xen_server packets.
 </summary>
@@ -69959,7 +69776,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96053">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96176">
 <summary>
 Do not audit attempts to send xen_server packets.
 </summary>
@@ -69970,7 +69787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96072">
+<interface name="corenet_receive_xen_server_packets" lineno="96195">
 <summary>
 Receive xen_server packets.
 </summary>
@@ -69981,7 +69798,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96091">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96214">
 <summary>
 Do not audit attempts to receive xen_server packets.
 </summary>
@@ -69992,7 +69809,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96110">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="96233">
 <summary>
 Send and receive xen_server packets.
 </summary>
@@ -70003,7 +69820,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96126">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96249">
 <summary>
 Do not audit attempts to send and receive xen_server packets.
 </summary>
@@ -70014,7 +69831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96141">
+<interface name="corenet_relabelto_xen_server_packets" lineno="96264">
 <summary>
 Relabel packets to xen_server the packet type.
 </summary>
@@ -70024,7 +69841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96163">
+<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96286">
 <summary>
 Send and receive TCP traffic on the xfs port.
 </summary>
@@ -70035,7 +69852,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96178">
+<interface name="corenet_udp_send_xfs_port" lineno="96301">
 <summary>
 Send UDP traffic on the xfs port.
 </summary>
@@ -70046,7 +69863,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96193">
+<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96316">
 <summary>
 Do not audit attempts to send UDP traffic on the xfs port.
 </summary>
@@ -70057,7 +69874,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96208">
+<interface name="corenet_udp_receive_xfs_port" lineno="96331">
 <summary>
 Receive UDP traffic on the xfs port.
 </summary>
@@ -70068,7 +69885,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96223">
+<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96346">
 <summary>
 Do not audit attempts to receive UDP traffic on the xfs port.
 </summary>
@@ -70079,7 +69896,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96238">
+<interface name="corenet_udp_sendrecv_xfs_port" lineno="96361">
 <summary>
 Send and receive UDP traffic on the xfs port.
 </summary>
@@ -70090,7 +69907,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96254">
+<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96377">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xfs port.
@@ -70102,7 +69919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96269">
+<interface name="corenet_tcp_bind_xfs_port" lineno="96392">
 <summary>
 Bind TCP sockets to the xfs port.
 </summary>
@@ -70113,7 +69930,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96289">
+<interface name="corenet_udp_bind_xfs_port" lineno="96412">
 <summary>
 Bind UDP sockets to the xfs port.
 </summary>
@@ -70124,7 +69941,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96308">
+<interface name="corenet_tcp_connect_xfs_port" lineno="96431">
 <summary>
 Make a TCP connection to the xfs port.
 </summary>
@@ -70134,7 +69951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96328">
+<interface name="corenet_send_xfs_client_packets" lineno="96451">
 <summary>
 Send xfs_client packets.
 </summary>
@@ -70145,7 +69962,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96347">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96470">
 <summary>
 Do not audit attempts to send xfs_client packets.
 </summary>
@@ -70156,7 +69973,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96366">
+<interface name="corenet_receive_xfs_client_packets" lineno="96489">
 <summary>
 Receive xfs_client packets.
 </summary>
@@ -70167,7 +69984,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96385">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96508">
 <summary>
 Do not audit attempts to receive xfs_client packets.
 </summary>
@@ -70178,7 +69995,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96404">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="96527">
 <summary>
 Send and receive xfs_client packets.
 </summary>
@@ -70189,7 +70006,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96420">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96543">
 <summary>
 Do not audit attempts to send and receive xfs_client packets.
 </summary>
@@ -70200,7 +70017,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96435">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="96558">
 <summary>
 Relabel packets to xfs_client the packet type.
 </summary>
@@ -70210,7 +70027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_server_packets" lineno="96455">
+<interface name="corenet_send_xfs_server_packets" lineno="96578">
 <summary>
 Send xfs_server packets.
 </summary>
@@ -70221,7 +70038,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96474">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96597">
 <summary>
 Do not audit attempts to send xfs_server packets.
 </summary>
@@ -70232,7 +70049,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="96493">
+<interface name="corenet_receive_xfs_server_packets" lineno="96616">
 <summary>
 Receive xfs_server packets.
 </summary>
@@ -70243,7 +70060,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96512">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96635">
 <summary>
 Do not audit attempts to receive xfs_server packets.
 </summary>
@@ -70254,7 +70071,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="96531">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="96654">
 <summary>
 Send and receive xfs_server packets.
 </summary>
@@ -70265,7 +70082,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96547">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96670">
 <summary>
 Do not audit attempts to send and receive xfs_server packets.
 </summary>
@@ -70276,7 +70093,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="96562">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="96685">
 <summary>
 Relabel packets to xfs_server the packet type.
 </summary>
@@ -70286,7 +70103,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96584">
+<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96707">
 <summary>
 Send and receive TCP traffic on the xserver port.
 </summary>
@@ -70297,7 +70114,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xserver_port" lineno="96599">
+<interface name="corenet_udp_send_xserver_port" lineno="96722">
 <summary>
 Send UDP traffic on the xserver port.
 </summary>
@@ -70308,7 +70125,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96614">
+<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96737">
 <summary>
 Do not audit attempts to send UDP traffic on the xserver port.
 </summary>
@@ -70319,7 +70136,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="96629">
+<interface name="corenet_udp_receive_xserver_port" lineno="96752">
 <summary>
 Receive UDP traffic on the xserver port.
 </summary>
@@ -70330,7 +70147,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96644">
+<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96767">
 <summary>
 Do not audit attempts to receive UDP traffic on the xserver port.
 </summary>
@@ -70341,7 +70158,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="96659">
+<interface name="corenet_udp_sendrecv_xserver_port" lineno="96782">
 <summary>
 Send and receive UDP traffic on the xserver port.
 </summary>
@@ -70352,7 +70169,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96675">
+<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96798">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xserver port.
@@ -70364,7 +70181,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="96690">
+<interface name="corenet_tcp_bind_xserver_port" lineno="96813">
 <summary>
 Bind TCP sockets to the xserver port.
 </summary>
@@ -70375,7 +70192,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="96710">
+<interface name="corenet_udp_bind_xserver_port" lineno="96833">
 <summary>
 Bind UDP sockets to the xserver port.
 </summary>
@@ -70386,7 +70203,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="96729">
+<interface name="corenet_tcp_connect_xserver_port" lineno="96852">
 <summary>
 Make a TCP connection to the xserver port.
 </summary>
@@ -70396,7 +70213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_client_packets" lineno="96749">
+<interface name="corenet_send_xserver_client_packets" lineno="96872">
 <summary>
 Send xserver_client packets.
 </summary>
@@ -70407,7 +70224,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96768">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96891">
 <summary>
 Do not audit attempts to send xserver_client packets.
 </summary>
@@ -70418,7 +70235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="96787">
+<interface name="corenet_receive_xserver_client_packets" lineno="96910">
 <summary>
 Receive xserver_client packets.
 </summary>
@@ -70429,7 +70246,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96806">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96929">
 <summary>
 Do not audit attempts to receive xserver_client packets.
 </summary>
@@ -70440,7 +70257,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="96825">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="96948">
 <summary>
 Send and receive xserver_client packets.
 </summary>
@@ -70451,7 +70268,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96841">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96964">
 <summary>
 Do not audit attempts to send and receive xserver_client packets.
 </summary>
@@ -70462,7 +70279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="96856">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="96979">
 <summary>
 Relabel packets to xserver_client the packet type.
 </summary>
@@ -70472,7 +70289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_server_packets" lineno="96876">
+<interface name="corenet_send_xserver_server_packets" lineno="96999">
 <summary>
 Send xserver_server packets.
 </summary>
@@ -70483,7 +70300,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="96895">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97018">
 <summary>
 Do not audit attempts to send xserver_server packets.
 </summary>
@@ -70494,7 +70311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="96914">
+<interface name="corenet_receive_xserver_server_packets" lineno="97037">
 <summary>
 Receive xserver_server packets.
 </summary>
@@ -70505,7 +70322,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="96933">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97056">
 <summary>
 Do not audit attempts to receive xserver_server packets.
 </summary>
@@ -70516,7 +70333,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="96952">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="97075">
 <summary>
 Send and receive xserver_server packets.
 </summary>
@@ -70527,7 +70344,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="96968">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97091">
 <summary>
 Do not audit attempts to send and receive xserver_server packets.
 </summary>
@@ -70538,7 +70355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="96983">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="97106">
 <summary>
 Relabel packets to xserver_server the packet type.
 </summary>
@@ -70548,7 +70365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97005">
+<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97128">
 <summary>
 Send and receive TCP traffic on the zarafa port.
 </summary>
@@ -70559,7 +70376,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97020">
+<interface name="corenet_udp_send_zarafa_port" lineno="97143">
 <summary>
 Send UDP traffic on the zarafa port.
 </summary>
@@ -70570,7 +70387,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97035">
+<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97158">
 <summary>
 Do not audit attempts to send UDP traffic on the zarafa port.
 </summary>
@@ -70581,7 +70398,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97050">
+<interface name="corenet_udp_receive_zarafa_port" lineno="97173">
 <summary>
 Receive UDP traffic on the zarafa port.
 </summary>
@@ -70592,7 +70409,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97065">
+<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97188">
 <summary>
 Do not audit attempts to receive UDP traffic on the zarafa port.
 </summary>
@@ -70603,7 +70420,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97080">
+<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97203">
 <summary>
 Send and receive UDP traffic on the zarafa port.
 </summary>
@@ -70614,7 +70431,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97096">
+<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97219">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zarafa port.
@@ -70626,7 +70443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97111">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="97234">
 <summary>
 Bind TCP sockets to the zarafa port.
 </summary>
@@ -70637,7 +70454,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97131">
+<interface name="corenet_udp_bind_zarafa_port" lineno="97254">
 <summary>
 Bind UDP sockets to the zarafa port.
 </summary>
@@ -70648,7 +70465,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97150">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="97273">
 <summary>
 Make a TCP connection to the zarafa port.
 </summary>
@@ -70658,7 +70475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97170">
+<interface name="corenet_send_zarafa_client_packets" lineno="97293">
 <summary>
 Send zarafa_client packets.
 </summary>
@@ -70669,7 +70486,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97189">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97312">
 <summary>
 Do not audit attempts to send zarafa_client packets.
 </summary>
@@ -70680,7 +70497,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97208">
+<interface name="corenet_receive_zarafa_client_packets" lineno="97331">
 <summary>
 Receive zarafa_client packets.
 </summary>
@@ -70691,7 +70508,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97227">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97350">
 <summary>
 Do not audit attempts to receive zarafa_client packets.
 </summary>
@@ -70702,7 +70519,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97246">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97369">
 <summary>
 Send and receive zarafa_client packets.
 </summary>
@@ -70713,7 +70530,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97262">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97385">
 <summary>
 Do not audit attempts to send and receive zarafa_client packets.
 </summary>
@@ -70724,7 +70541,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97277">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="97400">
 <summary>
 Relabel packets to zarafa_client the packet type.
 </summary>
@@ -70734,7 +70551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97297">
+<interface name="corenet_send_zarafa_server_packets" lineno="97420">
 <summary>
 Send zarafa_server packets.
 </summary>
@@ -70745,7 +70562,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97316">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97439">
 <summary>
 Do not audit attempts to send zarafa_server packets.
 </summary>
@@ -70756,7 +70573,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97335">
+<interface name="corenet_receive_zarafa_server_packets" lineno="97458">
 <summary>
 Receive zarafa_server packets.
 </summary>
@@ -70767,7 +70584,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97354">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97477">
 <summary>
 Do not audit attempts to receive zarafa_server packets.
 </summary>
@@ -70778,7 +70595,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97373">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97496">
 <summary>
 Send and receive zarafa_server packets.
 </summary>
@@ -70789,7 +70606,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97389">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97512">
 <summary>
 Do not audit attempts to send and receive zarafa_server packets.
 </summary>
@@ -70800,7 +70617,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97404">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="97527">
 <summary>
 Relabel packets to zarafa_server the packet type.
 </summary>
@@ -70810,7 +70627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97426">
+<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97549">
 <summary>
 Send and receive TCP traffic on the zabbix port.
 </summary>
@@ -70821,7 +70638,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="97441">
+<interface name="corenet_udp_send_zabbix_port" lineno="97564">
 <summary>
 Send UDP traffic on the zabbix port.
 </summary>
@@ -70832,7 +70649,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97456">
+<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97579">
 <summary>
 Do not audit attempts to send UDP traffic on the zabbix port.
 </summary>
@@ -70843,7 +70660,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="97471">
+<interface name="corenet_udp_receive_zabbix_port" lineno="97594">
 <summary>
 Receive UDP traffic on the zabbix port.
 </summary>
@@ -70854,7 +70671,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97486">
+<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97609">
 <summary>
 Do not audit attempts to receive UDP traffic on the zabbix port.
 </summary>
@@ -70865,7 +70682,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97501">
+<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97624">
 <summary>
 Send and receive UDP traffic on the zabbix port.
 </summary>
@@ -70876,7 +70693,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97517">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97640">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zabbix port.
@@ -70888,7 +70705,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="97532">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="97655">
 <summary>
 Bind TCP sockets to the zabbix port.
 </summary>
@@ -70899,7 +70716,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="97552">
+<interface name="corenet_udp_bind_zabbix_port" lineno="97675">
 <summary>
 Bind UDP sockets to the zabbix port.
 </summary>
@@ -70910,7 +70727,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="97571">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="97694">
 <summary>
 Make a TCP connection to the zabbix port.
 </summary>
@@ -70920,7 +70737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="97591">
+<interface name="corenet_send_zabbix_client_packets" lineno="97714">
 <summary>
 Send zabbix_client packets.
 </summary>
@@ -70931,7 +70748,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97610">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97733">
 <summary>
 Do not audit attempts to send zabbix_client packets.
 </summary>
@@ -70942,7 +70759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="97629">
+<interface name="corenet_receive_zabbix_client_packets" lineno="97752">
 <summary>
 Receive zabbix_client packets.
 </summary>
@@ -70953,7 +70770,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97648">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97771">
 <summary>
 Do not audit attempts to receive zabbix_client packets.
 </summary>
@@ -70964,7 +70781,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97667">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97790">
 <summary>
 Send and receive zabbix_client packets.
 </summary>
@@ -70975,7 +70792,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97683">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97806">
 <summary>
 Do not audit attempts to send and receive zabbix_client packets.
 </summary>
@@ -70986,7 +70803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="97698">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="97821">
 <summary>
 Relabel packets to zabbix_client the packet type.
 </summary>
@@ -70996,7 +70813,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="97718">
+<interface name="corenet_send_zabbix_server_packets" lineno="97841">
 <summary>
 Send zabbix_server packets.
 </summary>
@@ -71007,7 +70824,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97737">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97860">
 <summary>
 Do not audit attempts to send zabbix_server packets.
 </summary>
@@ -71018,7 +70835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="97756">
+<interface name="corenet_receive_zabbix_server_packets" lineno="97879">
 <summary>
 Receive zabbix_server packets.
 </summary>
@@ -71029,7 +70846,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97775">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97898">
 <summary>
 Do not audit attempts to receive zabbix_server packets.
 </summary>
@@ -71040,7 +70857,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97794">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97917">
 <summary>
 Send and receive zabbix_server packets.
 </summary>
@@ -71051,7 +70868,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97810">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97933">
 <summary>
 Do not audit attempts to send and receive zabbix_server packets.
 </summary>
@@ -71062,7 +70879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="97825">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="97948">
 <summary>
 Relabel packets to zabbix_server the packet type.
 </summary>
@@ -71072,7 +70889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97847">
+<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97970">
 <summary>
 Send and receive TCP traffic on the zabbix_agent port.
 </summary>
@@ -71083,7 +70900,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="97862">
+<interface name="corenet_udp_send_zabbix_agent_port" lineno="97985">
 <summary>
 Send UDP traffic on the zabbix_agent port.
 </summary>
@@ -71094,7 +70911,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="97877">
+<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98000">
 <summary>
 Do not audit attempts to send UDP traffic on the zabbix_agent port.
 </summary>
@@ -71105,7 +70922,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="97892">
+<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98015">
 <summary>
 Receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71116,7 +70933,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="97907">
+<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98030">
 <summary>
 Do not audit attempts to receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71127,7 +70944,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="97922">
+<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98045">
 <summary>
 Send and receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71138,7 +70955,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="97938">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98061">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zabbix_agent port.
@@ -71150,7 +70967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="97953">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98076">
 <summary>
 Bind TCP sockets to the zabbix_agent port.
 </summary>
@@ -71161,7 +70978,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="97973">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98096">
 <summary>
 Bind UDP sockets to the zabbix_agent port.
 </summary>
@@ -71172,7 +70989,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="97992">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98115">
 <summary>
 Make a TCP connection to the zabbix_agent port.
 </summary>
@@ -71182,7 +70999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98012">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="98135">
 <summary>
 Send zabbix_agent_client packets.
 </summary>
@@ -71193,7 +71010,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98031">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98154">
 <summary>
 Do not audit attempts to send zabbix_agent_client packets.
 </summary>
@@ -71204,7 +71021,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98050">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98173">
 <summary>
 Receive zabbix_agent_client packets.
 </summary>
@@ -71215,7 +71032,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98069">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98192">
 <summary>
 Do not audit attempts to receive zabbix_agent_client packets.
 </summary>
@@ -71226,7 +71043,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98088">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98211">
 <summary>
 Send and receive zabbix_agent_client packets.
 </summary>
@@ -71237,7 +71054,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98104">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98227">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_client packets.
 </summary>
@@ -71248,7 +71065,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98119">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98242">
 <summary>
 Relabel packets to zabbix_agent_client the packet type.
 </summary>
@@ -71258,7 +71075,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98139">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="98262">
 <summary>
 Send zabbix_agent_server packets.
 </summary>
@@ -71269,7 +71086,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98158">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98281">
 <summary>
 Do not audit attempts to send zabbix_agent_server packets.
 </summary>
@@ -71280,7 +71097,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98177">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98300">
 <summary>
 Receive zabbix_agent_server packets.
 </summary>
@@ -71291,7 +71108,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98196">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98319">
 <summary>
 Do not audit attempts to receive zabbix_agent_server packets.
 </summary>
@@ -71302,7 +71119,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98215">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98338">
 <summary>
 Send and receive zabbix_agent_server packets.
 </summary>
@@ -71313,7 +71130,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98231">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98354">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_server packets.
 </summary>
@@ -71324,7 +71141,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98246">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98369">
 <summary>
 Relabel packets to zabbix_agent_server the packet type.
 </summary>
@@ -71334,7 +71151,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98268">
+<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98391">
 <summary>
 Send and receive TCP traffic on the zookeeper_client port.
 </summary>
@@ -71345,7 +71162,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98283">
+<interface name="corenet_udp_send_zookeeper_client_port" lineno="98406">
 <summary>
 Send UDP traffic on the zookeeper_client port.
 </summary>
@@ -71356,7 +71173,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98298">
+<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98421">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_client port.
 </summary>
@@ -71367,7 +71184,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98313">
+<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98436">
 <summary>
 Receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71378,7 +71195,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98328">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98451">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71389,7 +71206,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98343">
+<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98466">
 <summary>
 Send and receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71400,7 +71217,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98359">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98482">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_client port.
@@ -71412,7 +71229,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98374">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98497">
 <summary>
 Bind TCP sockets to the zookeeper_client port.
 </summary>
@@ -71423,7 +71240,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98394">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98517">
 <summary>
 Bind UDP sockets to the zookeeper_client port.
 </summary>
@@ -71434,7 +71251,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98413">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98536">
 <summary>
 Make a TCP connection to the zookeeper_client port.
 </summary>
@@ -71444,7 +71261,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98433">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="98556">
 <summary>
 Send zookeeper_client_client packets.
 </summary>
@@ -71455,7 +71272,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98452">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98575">
 <summary>
 Do not audit attempts to send zookeeper_client_client packets.
 </summary>
@@ -71466,7 +71283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98471">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98594">
 <summary>
 Receive zookeeper_client_client packets.
 </summary>
@@ -71477,7 +71294,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98490">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98613">
 <summary>
 Do not audit attempts to receive zookeeper_client_client packets.
 </summary>
@@ -71488,7 +71305,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98509">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98632">
 <summary>
 Send and receive zookeeper_client_client packets.
 </summary>
@@ -71499,7 +71316,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98525">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98648">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_client packets.
 </summary>
@@ -71510,7 +71327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98540">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98663">
 <summary>
 Relabel packets to zookeeper_client_client the packet type.
 </summary>
@@ -71520,7 +71337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="98560">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="98683">
 <summary>
 Send zookeeper_client_server packets.
 </summary>
@@ -71531,7 +71348,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98579">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98702">
 <summary>
 Do not audit attempts to send zookeeper_client_server packets.
 </summary>
@@ -71542,7 +71359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98598">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98721">
 <summary>
 Receive zookeeper_client_server packets.
 </summary>
@@ -71553,7 +71370,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98617">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98740">
 <summary>
 Do not audit attempts to receive zookeeper_client_server packets.
 </summary>
@@ -71564,7 +71381,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98636">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98759">
 <summary>
 Send and receive zookeeper_client_server packets.
 </summary>
@@ -71575,7 +71392,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98652">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98775">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_server packets.
 </summary>
@@ -71586,7 +71403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98667">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98790">
 <summary>
 Relabel packets to zookeeper_client_server the packet type.
 </summary>
@@ -71596,7 +71413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98689">
+<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98812">
 <summary>
 Send and receive TCP traffic on the zookeeper_election port.
 </summary>
@@ -71607,7 +71424,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="98704">
+<interface name="corenet_udp_send_zookeeper_election_port" lineno="98827">
 <summary>
 Send UDP traffic on the zookeeper_election port.
 </summary>
@@ -71618,7 +71435,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98719">
+<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98842">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_election port.
 </summary>
@@ -71629,7 +71446,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98734">
+<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98857">
 <summary>
 Receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -71640,7 +71457,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98749">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98872">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -71651,7 +71468,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98764">
+<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98887">
 <summary>
 Send and receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -71662,7 +71479,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98780">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98903">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_election port.
@@ -71674,7 +71491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98795">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98918">
 <summary>
 Bind TCP sockets to the zookeeper_election port.
 </summary>
@@ -71685,7 +71502,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98815">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98938">
 <summary>
 Bind UDP sockets to the zookeeper_election port.
 </summary>
@@ -71696,7 +71513,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98834">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98957">
 <summary>
 Make a TCP connection to the zookeeper_election port.
 </summary>
@@ -71706,7 +71523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="98854">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="98977">
 <summary>
 Send zookeeper_election_client packets.
 </summary>
@@ -71717,7 +71534,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98873">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98996">
 <summary>
 Do not audit attempts to send zookeeper_election_client packets.
 </summary>
@@ -71728,7 +71545,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="98892">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99015">
 <summary>
 Receive zookeeper_election_client packets.
 </summary>
@@ -71739,7 +71556,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="98911">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99034">
 <summary>
 Do not audit attempts to receive zookeeper_election_client packets.
 </summary>
@@ -71750,7 +71567,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="98930">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99053">
 <summary>
 Send and receive zookeeper_election_client packets.
 </summary>
@@ -71761,7 +71578,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="98946">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99069">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_client packets.
 </summary>
@@ -71772,7 +71589,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="98961">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99084">
 <summary>
 Relabel packets to zookeeper_election_client the packet type.
 </summary>
@@ -71782,7 +71599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="98981">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="99104">
 <summary>
 Send zookeeper_election_server packets.
 </summary>
@@ -71793,7 +71610,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99000">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99123">
 <summary>
 Do not audit attempts to send zookeeper_election_server packets.
 </summary>
@@ -71804,7 +71621,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99019">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99142">
 <summary>
 Receive zookeeper_election_server packets.
 </summary>
@@ -71815,7 +71632,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99038">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99161">
 <summary>
 Do not audit attempts to receive zookeeper_election_server packets.
 </summary>
@@ -71826,7 +71643,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99057">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99180">
 <summary>
 Send and receive zookeeper_election_server packets.
 </summary>
@@ -71837,7 +71654,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99073">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99196">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_server packets.
 </summary>
@@ -71848,7 +71665,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99088">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99211">
 <summary>
 Relabel packets to zookeeper_election_server the packet type.
 </summary>
@@ -71858,7 +71675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99110">
+<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99233">
 <summary>
 Send and receive TCP traffic on the zookeeper_leader port.
 </summary>
@@ -71869,7 +71686,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99125">
+<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99248">
 <summary>
 Send UDP traffic on the zookeeper_leader port.
 </summary>
@@ -71880,7 +71697,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99140">
+<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99263">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_leader port.
 </summary>
@@ -71891,7 +71708,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99155">
+<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99278">
 <summary>
 Receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -71902,7 +71719,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99170">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99293">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -71913,7 +71730,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99185">
+<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99308">
 <summary>
 Send and receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -71924,7 +71741,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99201">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99324">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_leader port.
@@ -71936,7 +71753,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99216">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99339">
 <summary>
 Bind TCP sockets to the zookeeper_leader port.
 </summary>
@@ -71947,7 +71764,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99236">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99359">
 <summary>
 Bind UDP sockets to the zookeeper_leader port.
 </summary>
@@ -71958,7 +71775,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99255">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99378">
 <summary>
 Make a TCP connection to the zookeeper_leader port.
 </summary>
@@ -71968,7 +71785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99275">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99398">
 <summary>
 Send zookeeper_leader_client packets.
 </summary>
@@ -71979,7 +71796,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99294">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99417">
 <summary>
 Do not audit attempts to send zookeeper_leader_client packets.
 </summary>
@@ -71990,7 +71807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99313">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99436">
 <summary>
 Receive zookeeper_leader_client packets.
 </summary>
@@ -72001,7 +71818,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99332">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99455">
 <summary>
 Do not audit attempts to receive zookeeper_leader_client packets.
 </summary>
@@ -72012,7 +71829,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99351">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99474">
 <summary>
 Send and receive zookeeper_leader_client packets.
 </summary>
@@ -72023,7 +71840,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99367">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99490">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_client packets.
 </summary>
@@ -72034,7 +71851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99382">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99505">
 <summary>
 Relabel packets to zookeeper_leader_client the packet type.
 </summary>
@@ -72044,7 +71861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99402">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99525">
 <summary>
 Send zookeeper_leader_server packets.
 </summary>
@@ -72055,7 +71872,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99421">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99544">
 <summary>
 Do not audit attempts to send zookeeper_leader_server packets.
 </summary>
@@ -72066,7 +71883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99440">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99563">
 <summary>
 Receive zookeeper_leader_server packets.
 </summary>
@@ -72077,7 +71894,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99459">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99582">
 <summary>
 Do not audit attempts to receive zookeeper_leader_server packets.
 </summary>
@@ -72088,7 +71905,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99478">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99601">
 <summary>
 Send and receive zookeeper_leader_server packets.
 </summary>
@@ -72099,7 +71916,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99494">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99617">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_server packets.
 </summary>
@@ -72110,7 +71927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99509">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99632">
 <summary>
 Relabel packets to zookeeper_leader_server the packet type.
 </summary>
@@ -72120,7 +71937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99531">
+<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99654">
 <summary>
 Send and receive TCP traffic on the zebra port.
 </summary>
@@ -72131,7 +71948,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zebra_port" lineno="99546">
+<interface name="corenet_udp_send_zebra_port" lineno="99669">
 <summary>
 Send UDP traffic on the zebra port.
 </summary>
@@ -72142,7 +71959,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99561">
+<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99684">
 <summary>
 Do not audit attempts to send UDP traffic on the zebra port.
 </summary>
@@ -72153,7 +71970,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="99576">
+<interface name="corenet_udp_receive_zebra_port" lineno="99699">
 <summary>
 Receive UDP traffic on the zebra port.
 </summary>
@@ -72164,7 +71981,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99591">
+<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99714">
 <summary>
 Do not audit attempts to receive UDP traffic on the zebra port.
 </summary>
@@ -72175,7 +71992,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="99606">
+<interface name="corenet_udp_sendrecv_zebra_port" lineno="99729">
 <summary>
 Send and receive UDP traffic on the zebra port.
 </summary>
@@ -72186,7 +72003,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99622">
+<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99745">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zebra port.
@@ -72198,7 +72015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="99637">
+<interface name="corenet_tcp_bind_zebra_port" lineno="99760">
 <summary>
 Bind TCP sockets to the zebra port.
 </summary>
@@ -72209,7 +72026,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="99657">
+<interface name="corenet_udp_bind_zebra_port" lineno="99780">
 <summary>
 Bind UDP sockets to the zebra port.
 </summary>
@@ -72220,7 +72037,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="99676">
+<interface name="corenet_tcp_connect_zebra_port" lineno="99799">
 <summary>
 Make a TCP connection to the zebra port.
 </summary>
@@ -72230,7 +72047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_client_packets" lineno="99696">
+<interface name="corenet_send_zebra_client_packets" lineno="99819">
 <summary>
 Send zebra_client packets.
 </summary>
@@ -72241,7 +72058,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99715">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99838">
 <summary>
 Do not audit attempts to send zebra_client packets.
 </summary>
@@ -72252,7 +72069,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="99734">
+<interface name="corenet_receive_zebra_client_packets" lineno="99857">
 <summary>
 Receive zebra_client packets.
 </summary>
@@ -72263,7 +72080,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99753">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99876">
 <summary>
 Do not audit attempts to receive zebra_client packets.
 </summary>
@@ -72274,7 +72091,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="99772">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="99895">
 <summary>
 Send and receive zebra_client packets.
 </summary>
@@ -72285,7 +72102,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99788">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99911">
 <summary>
 Do not audit attempts to send and receive zebra_client packets.
 </summary>
@@ -72296,7 +72113,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="99803">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="99926">
 <summary>
 Relabel packets to zebra_client the packet type.
 </summary>
@@ -72306,7 +72123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_server_packets" lineno="99823">
+<interface name="corenet_send_zebra_server_packets" lineno="99946">
 <summary>
 Send zebra_server packets.
 </summary>
@@ -72317,7 +72134,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99842">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99965">
 <summary>
 Do not audit attempts to send zebra_server packets.
 </summary>
@@ -72328,7 +72145,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="99861">
+<interface name="corenet_receive_zebra_server_packets" lineno="99984">
 <summary>
 Receive zebra_server packets.
 </summary>
@@ -72339,7 +72156,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="99880">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100003">
 <summary>
 Do not audit attempts to receive zebra_server packets.
 </summary>
@@ -72350,7 +72167,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="99899">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="100022">
 <summary>
 Send and receive zebra_server packets.
 </summary>
@@ -72361,7 +72178,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="99915">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100038">
 <summary>
 Do not audit attempts to send and receive zebra_server packets.
 </summary>
@@ -72372,7 +72189,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="99930">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="100053">
 <summary>
 Relabel packets to zebra_server the packet type.
 </summary>
@@ -72382,7 +72199,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="99952">
+<interface name="corenet_tcp_sendrecv_zented_port" lineno="100075">
 <summary>
 Send and receive TCP traffic on the zented port.
 </summary>
@@ -72393,7 +72210,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zented_port" lineno="99967">
+<interface name="corenet_udp_send_zented_port" lineno="100090">
 <summary>
 Send UDP traffic on the zented port.
 </summary>
@@ -72404,7 +72221,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="99982">
+<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100105">
 <summary>
 Do not audit attempts to send UDP traffic on the zented port.
 </summary>
@@ -72415,7 +72232,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zented_port" lineno="99997">
+<interface name="corenet_udp_receive_zented_port" lineno="100120">
 <summary>
 Receive UDP traffic on the zented port.
 </summary>
@@ -72426,7 +72243,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100012">
+<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100135">
 <summary>
 Do not audit attempts to receive UDP traffic on the zented port.
 </summary>
@@ -72437,7 +72254,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100027">
+<interface name="corenet_udp_sendrecv_zented_port" lineno="100150">
 <summary>
 Send and receive UDP traffic on the zented port.
 </summary>
@@ -72448,7 +72265,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100043">
+<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100166">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zented port.
@@ -72460,7 +72277,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100058">
+<interface name="corenet_tcp_bind_zented_port" lineno="100181">
 <summary>
 Bind TCP sockets to the zented port.
 </summary>
@@ -72471,7 +72288,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100078">
+<interface name="corenet_udp_bind_zented_port" lineno="100201">
 <summary>
 Bind UDP sockets to the zented port.
 </summary>
@@ -72482,7 +72299,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100097">
+<interface name="corenet_tcp_connect_zented_port" lineno="100220">
 <summary>
 Make a TCP connection to the zented port.
 </summary>
@@ -72492,7 +72309,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_client_packets" lineno="100117">
+<interface name="corenet_send_zented_client_packets" lineno="100240">
 <summary>
 Send zented_client packets.
 </summary>
@@ -72503,7 +72320,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100136">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100259">
 <summary>
 Do not audit attempts to send zented_client packets.
 </summary>
@@ -72514,7 +72331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100155">
+<interface name="corenet_receive_zented_client_packets" lineno="100278">
 <summary>
 Receive zented_client packets.
 </summary>
@@ -72525,7 +72342,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100174">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100297">
 <summary>
 Do not audit attempts to receive zented_client packets.
 </summary>
@@ -72536,7 +72353,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100193">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="100316">
 <summary>
 Send and receive zented_client packets.
 </summary>
@@ -72547,7 +72364,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100209">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100332">
 <summary>
 Do not audit attempts to send and receive zented_client packets.
 </summary>
@@ -72558,7 +72375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100224">
+<interface name="corenet_relabelto_zented_client_packets" lineno="100347">
 <summary>
 Relabel packets to zented_client the packet type.
 </summary>
@@ -72568,7 +72385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_server_packets" lineno="100244">
+<interface name="corenet_send_zented_server_packets" lineno="100367">
 <summary>
 Send zented_server packets.
 </summary>
@@ -72579,7 +72396,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100263">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100386">
 <summary>
 Do not audit attempts to send zented_server packets.
 </summary>
@@ -72590,7 +72407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100282">
+<interface name="corenet_receive_zented_server_packets" lineno="100405">
 <summary>
 Receive zented_server packets.
 </summary>
@@ -72601,7 +72418,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100301">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100424">
 <summary>
 Do not audit attempts to receive zented_server packets.
 </summary>
@@ -72612,7 +72429,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100320">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="100443">
 <summary>
 Send and receive zented_server packets.
 </summary>
@@ -72623,7 +72440,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100336">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100459">
 <summary>
 Do not audit attempts to send and receive zented_server packets.
 </summary>
@@ -72634,7 +72451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100351">
+<interface name="corenet_relabelto_zented_server_packets" lineno="100474">
 <summary>
 Relabel packets to zented_server the packet type.
 </summary>
@@ -72644,7 +72461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100373">
+<interface name="corenet_tcp_sendrecv_zope_port" lineno="100496">
 <summary>
 Send and receive TCP traffic on the zope port.
 </summary>
@@ -72655,7 +72472,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zope_port" lineno="100388">
+<interface name="corenet_udp_send_zope_port" lineno="100511">
 <summary>
 Send UDP traffic on the zope port.
 </summary>
@@ -72666,7 +72483,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100403">
+<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100526">
 <summary>
 Do not audit attempts to send UDP traffic on the zope port.
 </summary>
@@ -72677,7 +72494,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100418">
+<interface name="corenet_udp_receive_zope_port" lineno="100541">
 <summary>
 Receive UDP traffic on the zope port.
 </summary>
@@ -72688,7 +72505,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100433">
+<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100556">
 <summary>
 Do not audit attempts to receive UDP traffic on the zope port.
 </summary>
@@ -72699,7 +72516,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="100448">
+<interface name="corenet_udp_sendrecv_zope_port" lineno="100571">
 <summary>
 Send and receive UDP traffic on the zope port.
 </summary>
@@ -72710,7 +72527,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100464">
+<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100587">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zope port.
@@ -72722,7 +72539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="100479">
+<interface name="corenet_tcp_bind_zope_port" lineno="100602">
 <summary>
 Bind TCP sockets to the zope port.
 </summary>
@@ -72733,7 +72550,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zope_port" lineno="100499">
+<interface name="corenet_udp_bind_zope_port" lineno="100622">
 <summary>
 Bind UDP sockets to the zope port.
 </summary>
@@ -72744,7 +72561,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="100518">
+<interface name="corenet_tcp_connect_zope_port" lineno="100641">
 <summary>
 Make a TCP connection to the zope port.
 </summary>
@@ -72754,7 +72571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_client_packets" lineno="100538">
+<interface name="corenet_send_zope_client_packets" lineno="100661">
 <summary>
 Send zope_client packets.
 </summary>
@@ -72765,7 +72582,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100557">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100680">
 <summary>
 Do not audit attempts to send zope_client packets.
 </summary>
@@ -72776,7 +72593,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_client_packets" lineno="100576">
+<interface name="corenet_receive_zope_client_packets" lineno="100699">
 <summary>
 Receive zope_client packets.
 </summary>
@@ -72787,7 +72604,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100595">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100718">
 <summary>
 Do not audit attempts to receive zope_client packets.
 </summary>
@@ -72798,7 +72615,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="100614">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="100737">
 <summary>
 Send and receive zope_client packets.
 </summary>
@@ -72809,7 +72626,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100630">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100753">
 <summary>
 Do not audit attempts to send and receive zope_client packets.
 </summary>
@@ -72820,7 +72637,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="100645">
+<interface name="corenet_relabelto_zope_client_packets" lineno="100768">
 <summary>
 Relabel packets to zope_client the packet type.
 </summary>
@@ -72830,7 +72647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_server_packets" lineno="100665">
+<interface name="corenet_send_zope_server_packets" lineno="100788">
 <summary>
 Send zope_server packets.
 </summary>
@@ -72841,7 +72658,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100684">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100807">
 <summary>
 Do not audit attempts to send zope_server packets.
 </summary>
@@ -72852,7 +72669,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_server_packets" lineno="100703">
+<interface name="corenet_receive_zope_server_packets" lineno="100826">
 <summary>
 Receive zope_server packets.
 </summary>
@@ -72863,7 +72680,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100722">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100845">
 <summary>
 Do not audit attempts to receive zope_server packets.
 </summary>
@@ -72874,7 +72691,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="100741">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="100864">
 <summary>
 Send and receive zope_server packets.
 </summary>
@@ -72885,7 +72702,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100757">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100880">
 <summary>
 Do not audit attempts to send and receive zope_server packets.
 </summary>
@@ -72896,7 +72713,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="100772">
+<interface name="corenet_relabelto_zope_server_packets" lineno="100895">
 <summary>
 Relabel packets to zope_server the packet type.
 </summary>
@@ -72906,7 +72723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="100795">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="100918">
 <summary>
 Send and receive TCP network traffic on the lo interface.
 </summary>
@@ -72917,7 +72734,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lo_if" lineno="100814">
+<interface name="corenet_udp_send_lo_if" lineno="100937">
 <summary>
 Send UDP network traffic on the lo interface.
 </summary>
@@ -72928,7 +72745,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_udp_receive_lo_if" lineno="100833">
+<interface name="corenet_udp_receive_lo_if" lineno="100956">
 <summary>
 Receive UDP network traffic on the lo interface.
 </summary>
@@ -72939,7 +72756,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="100852">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="100975">
 <summary>
 Send and receive UDP network traffic on the lo interface.
 </summary>
@@ -72950,7 +72767,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_raw_send_lo_if" lineno="100868">
+<interface name="corenet_raw_send_lo_if" lineno="100991">
 <summary>
 Send raw IP packets on the lo interface.
 </summary>
@@ -72961,7 +72778,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_raw_receive_lo_if" lineno="100887">
+<interface name="corenet_raw_receive_lo_if" lineno="101010">
 <summary>
 Receive raw IP packets on the lo interface.
 </summary>
@@ -72972,7 +72789,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="100906">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="101029">
 <summary>
 Send and receive raw IP packets on the lo interface.
 </summary>
@@ -74220,7 +74037,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_framebuffer_dev" lineno="2200">
+<interface name="dev_ioctl_input_dev" lineno="2200">
+<summary>
+IOCTL the input event devices (/dev/input).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_ipmi_dev" lineno="2218">
+<summary>
+Read and write ipmi devices (/dev/ipmi*).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_framebuffer_dev" lineno="2236">
 <summary>
 Get the attributes of the framebuffer device node.
 </summary>
@@ -74230,7 +74067,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_framebuffer_dev" lineno="2218">
+<interface name="dev_setattr_framebuffer_dev" lineno="2254">
 <summary>
 Set the attributes of the framebuffer device node.
 </summary>
@@ -74240,7 +74077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2237">
+<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2273">
 <summary>
 Dot not audit attempts to set the attributes
 of the framebuffer device node.
@@ -74251,7 +74088,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_framebuffer" lineno="2255">
+<interface name="dev_read_framebuffer" lineno="2291">
 <summary>
 Read the framebuffer.
 </summary>
@@ -74261,7 +74098,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_framebuffer" lineno="2273">
+<interface name="dev_dontaudit_read_framebuffer" lineno="2309">
 <summary>
 Do not audit attempts to read the framebuffer.
 </summary>
@@ -74271,7 +74108,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_framebuffer" lineno="2291">
+<interface name="dev_write_framebuffer" lineno="2327">
 <summary>
 Write the framebuffer.
 </summary>
@@ -74281,7 +74118,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_framebuffer" lineno="2309">
+<interface name="dev_rw_framebuffer" lineno="2345">
 <summary>
 Read and write the framebuffer.
 </summary>
@@ -74291,7 +74128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kmsg" lineno="2327">
+<interface name="dev_read_kmsg" lineno="2363">
 <summary>
 Read the kernel messages
 </summary>
@@ -74301,7 +74138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2345">
+<interface name="dev_dontaudit_read_kmsg" lineno="2381">
 <summary>
 Do not audit attempts to read the kernel messages
 </summary>
@@ -74311,7 +74148,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_kmsg" lineno="2363">
+<interface name="dev_write_kmsg" lineno="2399">
 <summary>
 Write to the kernel messages device
 </summary>
@@ -74321,7 +74158,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kmsg" lineno="2381">
+<interface name="dev_rw_kmsg" lineno="2417">
 <summary>
 Read and write to the kernel messages device
 </summary>
@@ -74331,7 +74168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_kmsg" lineno="2399">
+<interface name="dev_mounton_kmsg" lineno="2435">
 <summary>
 Mount on the kernel messages device
 </summary>
@@ -74341,7 +74178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_ksm_dev" lineno="2417">
+<interface name="dev_getattr_ksm_dev" lineno="2453">
 <summary>
 Get the attributes of the ksm devices.
 </summary>
@@ -74351,7 +74188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_ksm_dev" lineno="2435">
+<interface name="dev_setattr_ksm_dev" lineno="2471">
 <summary>
 Set the attributes of the ksm devices.
 </summary>
@@ -74361,7 +74198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_ksm" lineno="2453">
+<interface name="dev_read_ksm" lineno="2489">
 <summary>
 Read the ksm devices.
 </summary>
@@ -74371,7 +74208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_ksm" lineno="2471">
+<interface name="dev_rw_ksm" lineno="2507">
 <summary>
 Read and write to ksm devices.
 </summary>
@@ -74381,7 +74218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_kvm_dev" lineno="2489">
+<interface name="dev_getattr_kvm_dev" lineno="2525">
 <summary>
 Get the attributes of the kvm devices.
 </summary>
@@ -74391,7 +74228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_kvm_dev" lineno="2507">
+<interface name="dev_setattr_kvm_dev" lineno="2543">
 <summary>
 Set the attributes of the kvm devices.
 </summary>
@@ -74401,7 +74238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kvm" lineno="2525">
+<interface name="dev_read_kvm" lineno="2561">
 <summary>
 Read the kvm devices.
 </summary>
@@ -74411,7 +74248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kvm" lineno="2543">
+<interface name="dev_rw_kvm" lineno="2579">
 <summary>
 Read and write to kvm devices.
 </summary>
@@ -74421,7 +74258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lirc" lineno="2561">
+<interface name="dev_read_lirc" lineno="2597">
 <summary>
 Read the lirc device.
 </summary>
@@ -74431,7 +74268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lirc" lineno="2579">
+<interface name="dev_rw_lirc" lineno="2615">
 <summary>
 Read and write the lirc device.
 </summary>
@@ -74441,7 +74278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_lirc" lineno="2603">
+<interface name="dev_filetrans_lirc" lineno="2639">
 <summary>
 Automatic type transition to the type
 for lirc device nodes when created in /dev.
@@ -74457,7 +74294,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_loop_control" lineno="2621">
+<interface name="dev_rw_loop_control" lineno="2657">
 <summary>
 Read and write the loop-control device.
 </summary>
@@ -74467,7 +74304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_lvm_control" lineno="2639">
+<interface name="dev_getattr_lvm_control" lineno="2675">
 <summary>
 Get the attributes of the lvm comtrol device.
 </summary>
@@ -74477,7 +74314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lvm_control" lineno="2657">
+<interface name="dev_read_lvm_control" lineno="2693">
 <summary>
 Read the lvm comtrol device.
 </summary>
@@ -74487,7 +74324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lvm_control" lineno="2675">
+<interface name="dev_rw_lvm_control" lineno="2711">
 <summary>
 Read and write the lvm control device.
 </summary>
@@ -74497,7 +74334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2693">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2729">
 <summary>
 Do not audit attempts to read and write lvm control device.
 </summary>
@@ -74507,7 +74344,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2711">
+<interface name="dev_delete_lvm_control_dev" lineno="2747">
 <summary>
 Delete the lvm control device.
 </summary>
@@ -74517,7 +74354,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2729">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2765">
 <summary>
 dontaudit getattr raw memory devices (e.g. /dev/mem).
 </summary>
@@ -74527,9 +74364,12 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_raw_memory" lineno="2747">
+<interface name="dev_read_raw_memory" lineno="2786">
 <summary>
 Read raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
 </summary>
 <param name="domain">
 <summary>
@@ -74537,10 +74377,31 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2770">
+<interface name="dev_read_raw_memory_cond" lineno="2816">
+<summary>
+Read raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
+</interface>
+<interface name="dev_dontaudit_read_raw_memory" lineno="2843">
 <summary>
 Do not audit attempts to read raw memory devices
 (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
 </summary>
 <param name="domain">
 <summary>
@@ -74548,9 +74409,12 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_raw_memory" lineno="2788">
+<interface name="dev_write_raw_memory" lineno="2864">
 <summary>
 Write raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
 </summary>
 <param name="domain">
 <summary>
@@ -74558,9 +74422,30 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rx_raw_memory" lineno="2810">
+<interface name="dev_write_raw_memory_cond" lineno="2894">
+<summary>
+Write raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
+</interface>
+<interface name="dev_rx_raw_memory" lineno="2920">
 <summary>
 Read and execute raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
 </summary>
 <param name="domain">
 <summary>
@@ -74568,9 +74453,12 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_wx_raw_memory" lineno="2829">
+<interface name="dev_wx_raw_memory" lineno="2942">
 <summary>
 Write and execute raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
 </summary>
 <param name="domain">
 <summary>
@@ -74578,7 +74466,25 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_misc_dev" lineno="2848">
+<interface name="dev_wx_raw_memory_cond" lineno="2969">
+<summary>
+Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_misc_dev" lineno="2992">
 <summary>
 Get the attributes of miscellaneous devices.
 </summary>
@@ -74588,7 +74494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="2867">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3011">
 <summary>
 Do not audit attempts to get the attributes
 of miscellaneous devices.
@@ -74599,7 +74505,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_misc_dev" lineno="2885">
+<interface name="dev_setattr_misc_dev" lineno="3029">
 <summary>
 Set the attributes of miscellaneous devices.
 </summary>
@@ -74609,7 +74515,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="2904">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3048">
 <summary>
 Do not audit attempts to set the attributes
 of miscellaneous devices.
@@ -74620,7 +74526,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_misc" lineno="2922">
+<interface name="dev_read_misc" lineno="3066">
 <summary>
 Read miscellaneous devices.
 </summary>
@@ -74630,7 +74536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_misc" lineno="2940">
+<interface name="dev_write_misc" lineno="3084">
 <summary>
 Write miscellaneous devices.
 </summary>
@@ -74640,7 +74546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_misc" lineno="2958">
+<interface name="dev_dontaudit_rw_misc" lineno="3102">
 <summary>
 Do not audit attempts to read and write miscellaneous devices.
 </summary>
@@ -74650,7 +74556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_modem_dev" lineno="2976">
+<interface name="dev_getattr_modem_dev" lineno="3120">
 <summary>
 Get the attributes of the modem devices.
 </summary>
@@ -74660,7 +74566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_modem_dev" lineno="2994">
+<interface name="dev_setattr_modem_dev" lineno="3138">
 <summary>
 Set the attributes of the modem devices.
 </summary>
@@ -74670,7 +74576,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_modem" lineno="3012">
+<interface name="dev_read_modem" lineno="3156">
 <summary>
 Read the modem devices.
 </summary>
@@ -74680,7 +74586,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_modem" lineno="3030">
+<interface name="dev_rw_modem" lineno="3174">
 <summary>
 Read and write to modem devices.
 </summary>
@@ -74690,7 +74596,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mouse_dev" lineno="3048">
+<interface name="dev_getattr_mouse_dev" lineno="3192">
 <summary>
 Get the attributes of the mouse devices.
 </summary>
@@ -74700,7 +74606,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_mouse_dev" lineno="3066">
+<interface name="dev_setattr_mouse_dev" lineno="3210">
 <summary>
 Set the attributes of the mouse devices.
 </summary>
@@ -74710,7 +74616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_mouse" lineno="3084">
+<interface name="dev_read_mouse" lineno="3228">
 <summary>
 Read the mouse devices.
 </summary>
@@ -74720,7 +74626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mouse" lineno="3102">
+<interface name="dev_rw_mouse" lineno="3246">
 <summary>
 Read and write to mouse devices.
 </summary>
@@ -74730,7 +74636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3121">
+<interface name="dev_getattr_mtrr_dev" lineno="3265">
 <summary>
 Get the attributes of the memory type range
 registers (MTRR) device.
@@ -74741,7 +74647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3141">
+<interface name="dev_dontaudit_write_mtrr" lineno="3285">
 <summary>
 Do not audit attempts to write the memory type
 range registers (MTRR).
@@ -74752,7 +74658,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mtrr" lineno="3160">
+<interface name="dev_rw_mtrr" lineno="3304">
 <summary>
 Read and write the memory type range registers (MTRR).
 </summary>
@@ -74762,7 +74668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3179">
+<interface name="dev_getattr_netcontrol_dev" lineno="3323">
 <summary>
 Get the attributes of the network control device  (Deprecated)
 </summary>
@@ -74772,7 +74678,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_netcontrol" lineno="3194">
+<interface name="dev_read_netcontrol" lineno="3338">
 <summary>
 Read the network control identity.  (Deprecated)
 </summary>
@@ -74782,7 +74688,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_netcontrol" lineno="3209">
+<interface name="dev_rw_netcontrol" lineno="3353">
 <summary>
 Read and write the the network control device.  (Deprecated)
 </summary>
@@ -74792,7 +74698,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_null_dev" lineno="3224">
+<interface name="dev_getattr_null_dev" lineno="3368">
 <summary>
 Get the attributes of the null device nodes.
 </summary>
@@ -74802,7 +74708,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_null_dev" lineno="3242">
+<interface name="dev_setattr_null_dev" lineno="3386">
 <summary>
 Set the attributes of the null device nodes.
 </summary>
@@ -74812,7 +74718,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_null" lineno="3260">
+<interface name="dev_delete_null" lineno="3404">
 <summary>
 Delete the null device (/dev/null).
 </summary>
@@ -74822,7 +74728,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_null" lineno="3278">
+<interface name="dev_rw_null" lineno="3422">
 <summary>
 Read and write to the null device (/dev/null).
 </summary>
@@ -74832,7 +74738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_null_dev" lineno="3296">
+<interface name="dev_create_null_dev" lineno="3440">
 <summary>
 Create the null device (/dev/null).
 </summary>
@@ -74842,7 +74748,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_null_service" lineno="3315">
+<interface name="dev_manage_null_service" lineno="3459">
 <summary>
 Manage services with script type null_device_t for when
 /lib/systemd/system/something.service is a link to /dev/null
@@ -74853,7 +74759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3335">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3479">
 <summary>
 Do not audit attempts to get the attributes
 of the BIOS non-volatile RAM device.
@@ -74864,7 +74770,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_nvram" lineno="3353">
+<interface name="dev_rw_nvram" lineno="3497">
 <summary>
 Read and write BIOS non-volatile RAM.
 </summary>
@@ -74874,7 +74780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_printer_dev" lineno="3371">
+<interface name="dev_getattr_printer_dev" lineno="3515">
 <summary>
 Get the attributes of the printer device nodes.
 </summary>
@@ -74884,7 +74790,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_printer_dev" lineno="3389">
+<interface name="dev_setattr_printer_dev" lineno="3533">
 <summary>
 Set the attributes of the printer device nodes.
 </summary>
@@ -74894,7 +74800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_append_printer" lineno="3408">
+<interface name="dev_append_printer" lineno="3552">
 <summary>
 Append the printer device.
 </summary>
@@ -74904,7 +74810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_printer" lineno="3426">
+<interface name="dev_rw_printer" lineno="3570">
 <summary>
 Read and write the printer device.
 </summary>
@@ -74914,7 +74820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3444">
+<interface name="dev_getattr_pmqos_dev" lineno="3588">
 <summary>
 Get the attributes of PM QoS devices
 </summary>
@@ -74924,7 +74830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_pmqos" lineno="3462">
+<interface name="dev_read_pmqos" lineno="3606">
 <summary>
 Read the PM QoS devices.
 </summary>
@@ -74934,7 +74840,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_pmqos" lineno="3480">
+<interface name="dev_rw_pmqos" lineno="3624">
 <summary>
 Read and write the the PM QoS devices.
 </summary>
@@ -74944,17 +74850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_printk" lineno="3498">
-<summary>
-Read printk devices (e.g., /dev/kmsg /dev/mcelog)
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3513">
+<interface name="dev_getattr_qemu_dev" lineno="3643">
 <summary>
 Get the attributes of the QEMU
 microcode and id interfaces.
@@ -74965,7 +74861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_qemu_dev" lineno="3532">
+<interface name="dev_setattr_qemu_dev" lineno="3662">
 <summary>
 Set the attributes of the QEMU
 microcode and id interfaces.
@@ -74976,7 +74872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_qemu" lineno="3550">
+<interface name="dev_read_qemu" lineno="3680">
 <summary>
 Read the QEMU device
 </summary>
@@ -74986,7 +74882,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_qemu" lineno="3568">
+<interface name="dev_rw_qemu" lineno="3698">
 <summary>
 Read and write the the QEMU device.
 </summary>
@@ -74996,7 +74892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_rand" lineno="3602">
+<interface name="dev_read_rand" lineno="3732">
 <summary>
 Read from random number generator
 devices (e.g., /dev/random).
@@ -75022,7 +74918,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_rand" lineno="3621">
+<interface name="dev_dontaudit_read_rand" lineno="3751">
 <summary>
 Do not audit attempts to read from random
 number generator devices (e.g., /dev/random)
@@ -75033,7 +74929,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_append_rand" lineno="3640">
+<interface name="dev_dontaudit_append_rand" lineno="3770">
 <summary>
 Do not audit attempts to append to random
 number generator devices (e.g., /dev/random)
@@ -75044,7 +74940,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_rand" lineno="3660">
+<interface name="dev_write_rand" lineno="3790">
 <summary>
 Write to the random device (e.g., /dev/random). This adds
 entropy used to generate the random data read from the
@@ -75056,7 +74952,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_realtime_clock" lineno="3678">
+<interface name="dev_create_rand_dev" lineno="3808">
+<summary>
+Create the random device (/dev/random).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_realtime_clock" lineno="3826">
 <summary>
 Read the realtime clock (/dev/rtc).
 </summary>
@@ -75066,7 +74972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_realtime_clock" lineno="3696">
+<interface name="dev_write_realtime_clock" lineno="3844">
 <summary>
 Set the realtime clock (/dev/rtc).
 </summary>
@@ -75076,7 +74982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_realtime_clock" lineno="3716">
+<interface name="dev_rw_realtime_clock" lineno="3864">
 <summary>
 Read and set the realtime clock (/dev/rtc).
 </summary>
@@ -75086,7 +74992,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_scanner_dev" lineno="3731">
+<interface name="dev_getattr_scanner_dev" lineno="3879">
 <summary>
 Get the attributes of the scanner device.
 </summary>
@@ -75096,7 +75002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3750">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3898">
 <summary>
 Do not audit attempts to get the attributes of
 the scanner device.
@@ -75107,7 +75013,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_scanner_dev" lineno="3768">
+<interface name="dev_setattr_scanner_dev" lineno="3916">
 <summary>
 Set the attributes of the scanner device.
 </summary>
@@ -75117,7 +75023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3787">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3935">
 <summary>
 Do not audit attempts to set the attributes of
 the scanner device.
@@ -75128,7 +75034,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_scanner" lineno="3805">
+<interface name="dev_rw_scanner" lineno="3953">
 <summary>
 Read and write the scanner device.
 </summary>
@@ -75138,7 +75044,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sound_dev" lineno="3823">
+<interface name="dev_getattr_sound_dev" lineno="3971">
 <summary>
 Get the attributes of the sound devices.
 </summary>
@@ -75148,7 +75054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_sound_dev" lineno="3841">
+<interface name="dev_setattr_sound_dev" lineno="3989">
 <summary>
 Set the attributes of the sound devices.
 </summary>
@@ -75158,7 +75064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound" lineno="3859">
+<interface name="dev_read_sound" lineno="4007">
 <summary>
 Read the sound devices.
 </summary>
@@ -75168,7 +75074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound" lineno="3878">
+<interface name="dev_write_sound" lineno="4026">
 <summary>
 Write the sound devices.
 </summary>
@@ -75178,7 +75084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound_mixer" lineno="3897">
+<interface name="dev_read_sound_mixer" lineno="4045">
 <summary>
 Read the sound mixer devices.
 </summary>
@@ -75188,7 +75094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound_mixer" lineno="3916">
+<interface name="dev_write_sound_mixer" lineno="4064">
 <summary>
 Write the sound mixer devices.
 </summary>
@@ -75198,7 +75104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="3935">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4083">
 <summary>
 Get the attributes of the the power management device.
 </summary>
@@ -75208,7 +75114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="3953">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4101">
 <summary>
 Set the attributes of the the power management device.
 </summary>
@@ -75218,7 +75124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_power_management" lineno="3971">
+<interface name="dev_rw_power_management" lineno="4119">
 <summary>
 Read and write the the power management device.
 </summary>
@@ -75228,7 +75134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_smartcard_dev" lineno="3989">
+<interface name="dev_getattr_smartcard_dev" lineno="4137">
 <summary>
 Getattr on smartcard devices
 </summary>
@@ -75238,7 +75144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4008">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4156">
 <summary>
 dontaudit getattr on smartcard devices
 </summary>
@@ -75248,7 +75154,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_smartcard" lineno="4027">
+<interface name="dev_rw_smartcard" lineno="4175">
 <summary>
 Read and write smartcard devices.
 </summary>
@@ -75258,7 +75164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_smartcard" lineno="4045">
+<interface name="dev_manage_smartcard" lineno="4193">
 <summary>
 Create, read, write, and delete smartcard devices.
 </summary>
@@ -75268,7 +75174,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs" lineno="4063">
+<interface name="dev_rw_sysdig" lineno="4211">
+<summary>
+Read, write and map the sysdig device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_mounton_sysfs" lineno="4230">
 <summary>
 Mount a filesystem on sysfs.
 </summary>
@@ -75278,7 +75194,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_sysfs" lineno="4081">
+<interface name="dev_associate_sysfs" lineno="4248">
 <summary>
 Associate a file to a sysfs filesystem.
 </summary>
@@ -75288,7 +75204,7 @@ The type of the file to be associated to sysfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4099">
+<interface name="dev_getattr_sysfs_dirs" lineno="4266">
 <summary>
 Get the attributes of sysfs directories.
 </summary>
@@ -75298,7 +75214,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs" lineno="4117">
+<interface name="dev_getattr_sysfs" lineno="4284">
 <summary>
 Get the attributes of sysfs filesystem
 </summary>
@@ -75308,7 +75224,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_sysfs" lineno="4135">
+<interface name="dev_mount_sysfs" lineno="4302">
 <summary>
 mount a sysfs filesystem
 </summary>
@@ -75318,7 +75234,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4153">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4320">
 <summary>
 Do not audit getting the attributes of sysfs filesystem
 </summary>
@@ -75328,7 +75244,7 @@ Domain to dontaudit access from
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4171">
+<interface name="dev_dontaudit_read_sysfs" lineno="4338">
 <summary>
 Dont audit attempts to read hardware state information
 </summary>
@@ -75338,7 +75254,7 @@ Domain for which the attempts do not need to be audited
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4191">
+<interface name="dev_mounton_sysfs_dirs" lineno="4358">
 <summary>
 mounton sysfs directories.
 </summary>
@@ -75348,7 +75264,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_sysfs" lineno="4209">
+<interface name="dev_search_sysfs" lineno="4376">
 <summary>
 Search the sysfs directories.
 </summary>
@@ -75358,7 +75274,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4227">
+<interface name="dev_dontaudit_search_sysfs" lineno="4394">
 <summary>
 Do not audit attempts to search sysfs.
 </summary>
@@ -75368,7 +75284,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_sysfs" lineno="4245">
+<interface name="dev_list_sysfs" lineno="4412">
 <summary>
 List the contents of the sysfs directories.
 </summary>
@@ -75378,7 +75294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sysfs_dirs" lineno="4264">
+<interface name="dev_write_sysfs_dirs" lineno="4431">
 <summary>
 Write in a sysfs directories.
 </summary>
@@ -75388,7 +75304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4282">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4449">
 <summary>
 Do not audit attempts to write in a sysfs directory.
 </summary>
@@ -75398,7 +75314,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4301">
+<interface name="dev_manage_sysfs_dirs" lineno="4468">
 <summary>
 Create, read, write, and delete sysfs
 directories.
@@ -75409,7 +75325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sysfs" lineno="4328">
+<interface name="dev_read_sysfs" lineno="4495">
 <summary>
 Read hardware state information.
 </summary>
@@ -75428,7 +75344,24 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_rw_sysfs" lineno="4349">
+<interface name="dev_write_sysfs" lineno="4523">
+<summary>
+Write to hardware state information.
+</summary>
+<desc>
+<p>
+Allow the specified domain to write to the sysfs
+filesystem.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="dev_rw_sysfs" lineno="4542">
 <summary>
 Allow caller to modify hardware state information.
 </summary>
@@ -75438,7 +75371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_sysfs_files" lineno="4370">
+<interface name="dev_create_sysfs_files" lineno="4563">
 <summary>
 Add a sysfs file
 </summary>
@@ -75448,7 +75381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4388">
+<interface name="dev_relabel_sysfs_dirs" lineno="4581">
 <summary>
 Relabel hardware state directories.
 </summary>
@@ -75458,7 +75391,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_all_sysfs" lineno="4406">
+<interface name="dev_relabel_all_sysfs" lineno="4599">
 <summary>
 Relabel from/to all sysfs types.
 </summary>
@@ -75468,7 +75401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_all_sysfs" lineno="4426">
+<interface name="dev_setattr_all_sysfs" lineno="4619">
 <summary>
 Set the attributes of sysfs files, directories and symlinks.
 </summary>
@@ -75478,7 +75411,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_tpm" lineno="4446">
+<interface name="dev_rw_tpm" lineno="4639">
 <summary>
 Read and write the TPM device.
 </summary>
@@ -75488,7 +75421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_urand" lineno="4487">
+<interface name="dev_read_urand" lineno="4680">
 <summary>
 Read from pseudo random number generator devices (e.g., /dev/urandom).
 </summary>
@@ -75521,7 +75454,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_urand" lineno="4506">
+<interface name="dev_dontaudit_read_urand" lineno="4699">
 <summary>
 Do not audit attempts to read from pseudo
 random devices (e.g., /dev/urandom)
@@ -75532,7 +75465,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_urand" lineno="4525">
+<interface name="dev_write_urand" lineno="4718">
 <summary>
 Write to the pseudo random device (e.g., /dev/urandom). This
 sets the random number generator seed.
@@ -75543,7 +75476,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4543">
+<interface name="dev_create_urand_dev" lineno="4736">
+<summary>
+Create the urandom device (/dev/urandom).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_generic_usb_dev" lineno="4754">
 <summary>
 Getattr generic the USB devices.
 </summary>
@@ -75553,7 +75496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4561">
+<interface name="dev_setattr_generic_usb_dev" lineno="4772">
 <summary>
 Setattr generic the USB devices.
 </summary>
@@ -75563,7 +75506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_generic_usb_dev" lineno="4579">
+<interface name="dev_read_generic_usb_dev" lineno="4790">
 <summary>
 Read generic the USB devices.
 </summary>
@@ -75573,7 +75516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4597">
+<interface name="dev_rw_generic_usb_dev" lineno="4808">
 <summary>
 Read and write generic the USB devices.
 </summary>
@@ -75583,7 +75526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4615">
+<interface name="dev_relabel_generic_usb_dev" lineno="4826">
 <summary>
 Relabel generic the USB devices.
 </summary>
@@ -75593,7 +75536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbmon_dev" lineno="4633">
+<interface name="dev_read_usbmon_dev" lineno="4844">
 <summary>
 Read USB monitor devices.
 </summary>
@@ -75603,7 +75546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_usbmon_dev" lineno="4651">
+<interface name="dev_write_usbmon_dev" lineno="4862">
 <summary>
 Write USB monitor devices.
 </summary>
@@ -75613,7 +75556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_usbfs" lineno="4669">
+<interface name="dev_mount_usbfs" lineno="4880">
 <summary>
 Mount a usbfs filesystem.
 </summary>
@@ -75623,7 +75566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_usbfs" lineno="4687">
+<interface name="dev_associate_usbfs" lineno="4898">
 <summary>
 Associate a file to a usbfs filesystem.
 </summary>
@@ -75633,7 +75576,7 @@ The type of the file to be associated to usbfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="4705">
+<interface name="dev_getattr_usbfs_dirs" lineno="4916">
 <summary>
 Get the attributes of a directory in the usb filesystem.
 </summary>
@@ -75643,7 +75586,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4724">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4935">
 <summary>
 Do not audit attempts to get the attributes
 of a directory in the usb filesystem.
@@ -75654,7 +75597,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_usbfs" lineno="4742">
+<interface name="dev_search_usbfs" lineno="4953">
 <summary>
 Search the directory containing USB hardware information.
 </summary>
@@ -75664,7 +75607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_usbfs" lineno="4760">
+<interface name="dev_list_usbfs" lineno="4971">
 <summary>
 Allow caller to get a list of usb hardware.
 </summary>
@@ -75674,7 +75617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_usbfs_files" lineno="4781">
+<interface name="dev_setattr_usbfs_files" lineno="4992">
 <summary>
 Set the attributes of usbfs filesystem.
 </summary>
@@ -75684,7 +75627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbfs" lineno="4801">
+<interface name="dev_read_usbfs" lineno="5012">
 <summary>
 Read USB hardware information using
 the usbfs filesystem interface.
@@ -75695,7 +75638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_usbfs" lineno="4821">
+<interface name="dev_rw_usbfs" lineno="5032">
 <summary>
 Allow caller to modify usb hardware configuration files.
 </summary>
@@ -75705,7 +75648,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_video_dev" lineno="4841">
+<interface name="dev_getattr_video_dev" lineno="5052">
 <summary>
 Get the attributes of video4linux devices.
 </summary>
@@ -75715,7 +75658,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_userio_dev" lineno="4859">
+<interface name="dev_rw_userio_dev" lineno="5070">
 <summary>
 Read and write userio device.
 </summary>
@@ -75725,7 +75668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="4878">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5089">
 <summary>
 Do not audit attempts to get the attributes
 of video4linux device nodes.
@@ -75736,7 +75679,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_video_dev" lineno="4896">
+<interface name="dev_setattr_video_dev" lineno="5107">
 <summary>
 Set the attributes of video4linux device nodes.
 </summary>
@@ -75746,7 +75689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="4915">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5126">
 <summary>
 Do not audit attempts to set the attributes
 of video4linux device nodes.
@@ -75757,7 +75700,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_video_dev" lineno="4933">
+<interface name="dev_read_video_dev" lineno="5144">
 <summary>
 Read the video4linux devices.
 </summary>
@@ -75767,7 +75710,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_video_dev" lineno="4951">
+<interface name="dev_write_video_dev" lineno="5162">
 <summary>
 Write the video4linux devices.
 </summary>
@@ -75777,7 +75720,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vfio_dev" lineno="4969">
+<interface name="dev_rw_vfio_dev" lineno="5180">
 <summary>
 Read and write vfio devices.
 </summary>
@@ -75787,7 +75730,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="4987">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5198">
 <summary>
 Relabel vfio devices.
 </summary>
@@ -75797,7 +75740,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vhost" lineno="5005">
+<interface name="dev_rw_vhost" lineno="5216">
 <summary>
 Allow read/write the vhost devices
 </summary>
@@ -75807,7 +75750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vmware" lineno="5023">
+<interface name="dev_rw_vmware" lineno="5234">
 <summary>
 Read and write VMWare devices.
 </summary>
@@ -75817,7 +75760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_vmware" lineno="5041">
+<interface name="dev_rwx_vmware" lineno="5252">
 <summary>
 Read, write, and mmap VMWare devices.
 </summary>
@@ -75827,7 +75770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_watchdog" lineno="5060">
+<interface name="dev_read_watchdog" lineno="5271">
 <summary>
 Read from watchdog devices.
 </summary>
@@ -75837,7 +75780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_watchdog" lineno="5078">
+<interface name="dev_write_watchdog" lineno="5289">
 <summary>
 Write to watchdog devices.
 </summary>
@@ -75847,7 +75790,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_wireless" lineno="5096">
+<interface name="dev_read_wireless" lineno="5307">
+<summary>
+Read the wireless device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_wireless" lineno="5325">
 <summary>
 Read and write the the wireless device.
 </summary>
@@ -75857,7 +75810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_wireless" lineno="5114">
+<interface name="dev_manage_wireless" lineno="5343">
 <summary>
 manage the wireless device.
 </summary>
@@ -75867,7 +75820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xen" lineno="5132">
+<interface name="dev_rw_xen" lineno="5361">
 <summary>
 Read and write Xen devices.
 </summary>
@@ -75877,7 +75830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_xen" lineno="5151">
+<interface name="dev_manage_xen" lineno="5380">
 <summary>
 Create, read, write, and delete Xen devices.
 </summary>
@@ -75887,7 +75840,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_xen" lineno="5175">
+<interface name="dev_filetrans_xen" lineno="5404">
 <summary>
 Automatic type transition to the type
 for xen device nodes when created in /dev.
@@ -75903,7 +75856,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5193">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5422">
 <summary>
 Get the attributes of X server miscellaneous devices.
 </summary>
@@ -75913,7 +75866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5211">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5440">
 <summary>
 Set the attributes of X server miscellaneous devices.
 </summary>
@@ -75923,7 +75876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xserver_misc" lineno="5229">
+<interface name="dev_rw_xserver_misc" lineno="5458">
 <summary>
 Read and write X server miscellaneous devices.
 </summary>
@@ -75933,7 +75886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_map_xserver_misc" lineno="5247">
+<interface name="dev_map_xserver_misc" lineno="5476">
 <summary>
 Map X server miscellaneous devices.
 </summary>
@@ -75943,7 +75896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_zero" lineno="5265">
+<interface name="dev_rw_zero" lineno="5494">
 <summary>
 Read and write to the zero device (/dev/zero).
 </summary>
@@ -75953,7 +75906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_zero" lineno="5283">
+<interface name="dev_rwx_zero" lineno="5512">
 <summary>
 Read, write, and execute the zero device (/dev/zero).
 </summary>
@@ -75963,7 +75916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_execmod_zero" lineno="5302">
+<interface name="dev_execmod_zero" lineno="5531">
 <summary>
 Execmod the zero device (/dev/zero).
 </summary>
@@ -75973,7 +75926,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_zero_dev" lineno="5321">
+<interface name="dev_create_zero_dev" lineno="5550">
 <summary>
 Create the zero device (/dev/zero).
 </summary>
@@ -75983,7 +75936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_cpu_online" lineno="5344">
+<interface name="dev_read_cpu_online" lineno="5573">
 <summary>
 Read cpu online hardware state information
 </summary>
@@ -75998,7 +75951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_unconfined" lineno="5364">
+<interface name="dev_unconfined" lineno="5593">
 <summary>
 Unconfined access to devices.
 </summary>
@@ -76008,7 +75961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_cpu_online" lineno="5384">
+<interface name="dev_relabel_cpu_online" lineno="5613">
 <summary>
 Relabel cpu online hardware state information.
 </summary>
@@ -76018,7 +75971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5403">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5632">
 <summary>
 Dont audit attempts to read usbmon devices
 </summary>
@@ -76146,7 +76099,7 @@ Domain allowed access.
 </interface>
 <interface name="domain_system_change_exemption" lineno="198">
 <summary>
-Makes caller and execption to the constraint
+Makes caller and exception to the constraint
 preventing changing to the system user
 identity and system role.
 </summary>
@@ -76669,7 +76622,7 @@ Domain to not audit.
 </interface>
 <interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1052">
 <summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
 all domains IPSEC key management sockets.
 </summary>
 <param name="domain">
@@ -76680,7 +76633,7 @@ Domain to not audit.
 </interface>
 <interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1071">
 <summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
 all domains packet sockets.
 </summary>
 <param name="domain">
@@ -76691,7 +76644,7 @@ Domain to not audit.
 </interface>
 <interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1090">
 <summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
 all domains raw sockets.
 </summary>
 <param name="domain">
@@ -76928,7 +76881,25 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="domain_unconfined_signal" lineno="1500">
+<interface name="domain_public_key" lineno="1508">
+<summary>
+Allow all domains to search specified type keys.
+</summary>
+<desc>
+<p>
+When setting up IMA/EVM key(s) are added to the
+kernel keyring but the type of the key is the domain
+adding the key.  This interface will allow all domains
+search the key so IMA/EVM validation can happen.
+</p>
+</desc>
+<param name="type">
+<summary>
+Type of key to be searched.
+</summary>
+</param>
+</interface>
+<interface name="domain_unconfined_signal" lineno="1526">
 <summary>
 Send generic signals to the unconfined domain.
 </summary>
@@ -76938,7 +76909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="domain_unconfined" lineno="1518">
+<interface name="domain_unconfined" lineno="1544">
 <summary>
 Unconfined access to domains.
 </summary>
@@ -76948,7 +76919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="domain_dontaudit_getsched_all_domains" lineno="1546">
+<interface name="domain_dontaudit_getsched_all_domains" lineno="1572">
 <summary>
 Do not audit getting the scheduler information of all domains.
 </summary>
@@ -77021,7 +76992,7 @@ Related interfaces:
 <li>files_config_files()</li>
 <li>files_lock_file()</li>
 <li>files_mountpoint()</li>
-<li>files_pid_file()</li>
+<li>files_runtime_file()</li>
 <li>files_security_file()</li>
 <li>files_security_mountpoint()</li>
 <li>files_tmp_file()</li>
@@ -77106,6 +77077,45 @@ Type to be used for mount points.
 <interface name="files_pid_file" lineno="231">
 <summary>
 Make the specified type usable for
+runtime process ID files.  (Deprecated)
+</summary>
+<desc>
+<p>
+Make the specified type usable for runtime process ID files,
+typically found in /var/run.
+This will also make the type usable for files, making
+calls to files_type() redundant.  Failure to use this interface
+for a PID file type may result in problems with starting
+or stopping services.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>files_runtime_filetrans()</li>
+</ul>
+<p>
+Example usage with a domain that can create and
+write its PID file with a private PID file type in the
+/var/run directory:
+</p>
+<p>
+type mypidfile_t;
+files_runtime_file(mypidfile_t)
+allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
+</p>
+</desc>
+<param name="type">
+<summary>
+Type to be used for PID files.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="files_runtime_file" lineno="275">
+<summary>
+Make the specified type usable for
 runtime process ID files.
 </summary>
 <desc>
@@ -77121,7 +77131,7 @@ or stopping services.
 Related interfaces:
 </p>
 <ul>
-<li>files_pid_filetrans()</li>
+<li>files_runtime_filetrans()</li>
 </ul>
 <p>
 Example usage with a domain that can create and
@@ -77130,9 +77140,9 @@ write its PID file with a private PID file type in the
 </p>
 <p>
 type mypidfile_t;
-files_pid_file(mypidfile_t)
+files_runtime_file(mypidfile_t)
 allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_pid_filetrans(mydomain_t, mypidfile_t, file)
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
 </p>
 </desc>
 <param name="type">
@@ -77142,7 +77152,7 @@ Type to be used for PID files.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_config_file" lineno="271">
+<interface name="files_config_file" lineno="315">
 <summary>
 Make the specified type a
 configuration file.
@@ -77173,7 +77183,7 @@ Type to be used as a configuration file.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_poly" lineno="291">
+<interface name="files_poly" lineno="335">
 <summary>
 Make the specified type a
 polyinstantiated directory.
@@ -77185,7 +77195,7 @@ polyinstantiated directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_parent" lineno="312">
+<interface name="files_poly_parent" lineno="356">
 <summary>
 Make the specified type a parent
 of a polyinstantiated directory.
@@ -77197,7 +77207,7 @@ parent directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_member" lineno="333">
+<interface name="files_poly_member" lineno="377">
 <summary>
 Make the specified type a
 polyinstantiation member directory.
@@ -77209,7 +77219,7 @@ member directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_member_tmp" lineno="360">
+<interface name="files_poly_member_tmp" lineno="404">
 <summary>
 Make the domain use the specified
 type of polyinstantiated directory.
@@ -77227,7 +77237,7 @@ member directory.
 </summary>
 </param>
 </interface>
-<interface name="files_tmp_file" lineno="407">
+<interface name="files_tmp_file" lineno="451">
 <summary>
 Make the specified type a file
 used for temporary files.
@@ -77266,7 +77276,7 @@ temporary file.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_tmpfs_file" lineno="428">
+<interface name="files_tmpfs_file" lineno="472">
 <summary>
 Transform the type into a file, for use on a
 virtual memory filesystem (tmpfs).
@@ -77277,7 +77287,7 @@ The type to be transformed.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_dirs" lineno="447">
+<interface name="files_getattr_all_dirs" lineno="491">
 <summary>
 Get the attributes of all directories.
 </summary>
@@ -77287,7 +77297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="510">
 <summary>
 Do not audit attempts to get the attributes
 of all directories.
@@ -77298,7 +77308,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_non_security" lineno="484">
+<interface name="files_list_non_security" lineno="528">
 <summary>
 List all non-security directories.
 </summary>
@@ -77308,7 +77318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_non_security" lineno="503">
+<interface name="files_dontaudit_list_non_security" lineno="547">
 <summary>
 Do not audit attempts to list all
 non-security directories.
@@ -77319,7 +77329,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_non_security" lineno="522">
+<interface name="files_mounton_non_security" lineno="566">
 <summary>
 Mount a filesystem on all non-security
 directories and files.
@@ -77330,7 +77340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_non_security_dirs" lineno="541">
+<interface name="files_write_non_security_dirs" lineno="585">
 <summary>
 Allow attempts to modify any directory
 </summary>
@@ -77340,7 +77350,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_security_dirs" lineno="559">
+<interface name="files_manage_non_security_dirs" lineno="603">
 <summary>
 Allow attempts to manage non-security directories
 </summary>
@@ -77350,7 +77360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_non_security_dirs" lineno="577">
+<interface name="files_relabel_non_security_dirs" lineno="621">
 <summary>
 Relabel from/to non-security directories.
 </summary>
@@ -77360,7 +77370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_files" lineno="595">
+<interface name="files_getattr_all_files" lineno="639">
 <summary>
 Get the attributes of all files.
 </summary>
@@ -77370,7 +77380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="615">
+<interface name="files_dontaudit_getattr_all_files" lineno="659">
 <summary>
 Do not audit attempts to get the attributes
 of all files.
@@ -77381,7 +77391,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="634">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="678">
 <summary>
 Do not audit attempts to get the attributes
 of non security files.
@@ -77392,7 +77402,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_security_files" lineno="653">
+<interface name="files_manage_non_security_files" lineno="697">
 <summary>
 Create, read, write, and delete all non-security files.
 </summary>
@@ -77403,7 +77413,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_non_security_files" lineno="672">
+<interface name="files_relabel_non_security_files" lineno="716">
 <summary>
 Relabel from/to all non-security files.
 </summary>
@@ -77414,7 +77424,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_files" lineno="690">
+<interface name="files_read_all_files" lineno="734">
 <summary>
 Read all files.
 </summary>
@@ -77424,7 +77434,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_execmod_all_files" lineno="721">
+<interface name="files_execmod_all_files" lineno="765">
 <summary>
 Allow shared library text relocations in all files.
 </summary>
@@ -77442,7 +77452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_security_files" lineno="740">
+<interface name="files_read_non_security_files" lineno="784">
 <summary>
 Read all non-security files.
 </summary>
@@ -77453,7 +77463,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_dirs_except" lineno="766">
+<interface name="files_read_all_dirs_except" lineno="810">
 <summary>
 Read all directories on the filesystem, except
 the listed exceptions.
@@ -77470,7 +77480,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_files_except" lineno="791">
+<interface name="files_read_all_files_except" lineno="835">
 <summary>
 Read all files on the filesystem, except
 the listed exceptions.
@@ -77487,7 +77497,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_symlinks_except" lineno="816">
+<interface name="files_read_all_symlinks_except" lineno="860">
 <summary>
 Read all symbolic links on the filesystem, except
 the listed exceptions.
@@ -77504,7 +77514,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_symlinks" lineno="834">
+<interface name="files_getattr_all_symlinks" lineno="878">
 <summary>
 Get the attributes of all symbolic links.
 </summary>
@@ -77514,7 +77524,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="853">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="897">
 <summary>
 Do not audit attempts to get the attributes
 of all symbolic links.
@@ -77525,7 +77535,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="871">
+<interface name="files_dontaudit_read_all_symlinks" lineno="915">
 <summary>
 Do not audit attempts to read all symbolic links.
 </summary>
@@ -77535,7 +77545,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="890">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934">
 <summary>
 Do not audit attempts to get the attributes
 of non security symbolic links.
@@ -77546,7 +77556,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="909">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953">
 <summary>
 Do not audit attempts to get the attributes
 of non security block devices.
@@ -77557,7 +77567,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="928">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972">
 <summary>
 Do not audit attempts to get the attributes
 of non security character devices.
@@ -77568,7 +77578,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_symlinks" lineno="947">
+<interface name="files_read_all_symlinks" lineno="991">
 <summary>
 Read all symbolic links.
 </summary>
@@ -77579,7 +77589,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_all_pipes" lineno="966">
+<interface name="files_getattr_all_pipes" lineno="1010">
 <summary>
 Get the attributes of all named pipes.
 </summary>
@@ -77589,7 +77599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="986">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="1030">
 <summary>
 Do not audit attempts to get the attributes
 of all named pipes.
@@ -77600,7 +77610,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1005">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049">
 <summary>
 Do not audit attempts to get the attributes
 of non security named pipes.
@@ -77611,7 +77621,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_sockets" lineno="1023">
+<interface name="files_getattr_all_sockets" lineno="1067">
 <summary>
 Get the attributes of all named sockets.
 </summary>
@@ -77621,7 +77631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1043">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1087">
 <summary>
 Do not audit attempts to get the attributes
 of all named sockets.
@@ -77632,7 +77642,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1062">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106">
 <summary>
 Do not audit attempts to get the attributes
 of non security named sockets.
@@ -77643,7 +77653,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_blk_files" lineno="1080">
+<interface name="files_read_all_blk_files" lineno="1124">
 <summary>
 Read all block nodes with file types.
 </summary>
@@ -77653,7 +77663,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_chr_files" lineno="1098">
+<interface name="files_read_all_chr_files" lineno="1142">
 <summary>
 Read all character nodes with file types.
 </summary>
@@ -77663,7 +77673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_files" lineno="1124">
+<interface name="files_relabel_all_files" lineno="1168">
 <summary>
 Relabel all files on the filesystem, except
 the listed exceptions.
@@ -77681,7 +77691,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_rw_all_files" lineno="1162">
+<interface name="files_rw_all_files" lineno="1206">
 <summary>
 rw all files on the filesystem, except
 the listed exceptions.
@@ -77699,7 +77709,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_files" lineno="1188">
+<interface name="files_manage_all_files" lineno="1232">
 <summary>
 Manage all files on the filesystem, except
 the listed exceptions.
@@ -77717,7 +77727,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_all" lineno="1215">
+<interface name="files_search_all" lineno="1259">
 <summary>
 Search the contents of all directories on
 extended attribute filesystems.
@@ -77728,7 +77738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all" lineno="1234">
+<interface name="files_list_all" lineno="1278">
 <summary>
 List the contents of all directories on
 extended attribute filesystems.
@@ -77739,7 +77749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_files_as" lineno="1252">
+<interface name="files_create_all_files_as" lineno="1296">
 <summary>
 Create all files as is.
 </summary>
@@ -77749,7 +77759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1272">
+<interface name="files_dontaudit_search_all_dirs" lineno="1316">
 <summary>
 Do not audit attempts to search the
 contents of any directories on extended
@@ -77761,7 +77771,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1295">
+<interface name="files_getattr_all_file_type_fs" lineno="1339">
 <summary>
 Get the attributes of all filesystems
 with the type of a file.
@@ -77772,7 +77782,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1313">
+<interface name="files_relabelto_all_file_type_fs" lineno="1357">
 <summary>
 Relabel a filesystem to the type of a file.
 </summary>
@@ -77782,7 +77792,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1331">
+<interface name="files_relabel_all_file_type_fs" lineno="1375">
 <summary>
 Relabel a filesystem to and from the type of a file.
 </summary>
@@ -77792,7 +77802,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mount_all_file_type_fs" lineno="1349">
+<interface name="files_mount_all_file_type_fs" lineno="1393">
 <summary>
 Mount all filesystems with the type of a file.
 </summary>
@@ -77802,7 +77812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1367">
+<interface name="files_unmount_all_file_type_fs" lineno="1411">
 <summary>
 Unmount all filesystems with the type of a file.
 </summary>
@@ -77812,7 +77822,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_non_auth_dirs" lineno="1386">
+<interface name="files_list_non_auth_dirs" lineno="1430">
 <summary>
 Read all non-authentication related
 directories.
@@ -77823,7 +77833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_files" lineno="1405">
+<interface name="files_read_non_auth_files" lineno="1449">
 <summary>
 Read all non-authentication related
 files.
@@ -77834,7 +77844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_symlinks" lineno="1424">
+<interface name="files_read_non_auth_symlinks" lineno="1468">
 <summary>
 Read all non-authentication related
 symbolic links.
@@ -77845,7 +77855,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_non_auth_files" lineno="1442">
+<interface name="files_rw_non_auth_files" lineno="1486">
 <summary>
 rw non-authentication related files.
 </summary>
@@ -77855,7 +77865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_auth_files" lineno="1462">
+<interface name="files_manage_non_auth_files" lineno="1506">
 <summary>
 Manage non-authentication related
 files.
@@ -77867,7 +77877,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_map_non_auth_files" lineno="1490">
+<interface name="files_map_non_auth_files" lineno="1534">
 <summary>
 Mmap non-authentication related
 files.
@@ -77879,7 +77889,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_non_auth_files" lineno="1510">
+<interface name="files_relabel_non_auth_files" lineno="1554">
 <summary>
 Relabel all non-authentication related
 files.
@@ -77891,7 +77901,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_config_dirs" lineno="1543">
+<interface name="files_manage_config_dirs" lineno="1587">
 <summary>
 Manage all configuration directories on filesystem
 </summary>
@@ -77902,7 +77912,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_dirs" lineno="1562">
+<interface name="files_relabel_config_dirs" lineno="1606">
 <summary>
 Relabel configuration directories
 </summary>
@@ -77913,7 +77923,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_read_config_files" lineno="1580">
+<interface name="files_read_config_files" lineno="1624">
 <summary>
 Read config files in /etc.
 </summary>
@@ -77923,7 +77933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_config_files" lineno="1601">
+<interface name="files_manage_config_files" lineno="1645">
 <summary>
 Manage all configuration files on filesystem
 </summary>
@@ -77934,7 +77944,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_files" lineno="1620">
+<interface name="files_relabel_config_files" lineno="1664">
 <summary>
 Relabel configuration files
 </summary>
@@ -77945,7 +77955,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_mounton_all_mountpoints" lineno="1638">
+<interface name="files_mounton_all_mountpoints" lineno="1682">
 <summary>
 Mount a filesystem on all mount points.
 </summary>
@@ -77955,7 +77965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_mountpoints" lineno="1657">
+<interface name="files_getattr_all_mountpoints" lineno="1703">
 <summary>
 Get the attributes of all mount points.
 </summary>
@@ -77965,7 +77975,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_mountpoints" lineno="1675">
+<interface name="files_setattr_all_mountpoints" lineno="1721">
 <summary>
 Set the attributes of all mount points.
 </summary>
@@ -77975,7 +77985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1693">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1739">
 <summary>
 Do not audit attempts to set the attributes on all mount points.
 </summary>
@@ -77985,7 +77995,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_all_mountpoints" lineno="1711">
+<interface name="files_search_all_mountpoints" lineno="1757">
 <summary>
 Search all mount points.
 </summary>
@@ -77995,7 +78005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1729">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1775">
 <summary>
 Do not audit searching of all mount points.
 </summary>
@@ -78005,7 +78015,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_mountpoints" lineno="1747">
+<interface name="files_list_all_mountpoints" lineno="1793">
 <summary>
 List all mount points.
 </summary>
@@ -78015,7 +78025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1765">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1811">
 <summary>
 Do not audit listing of all mount points.
 </summary>
@@ -78025,7 +78035,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1783">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1829">
 <summary>
 Do not audit attempts to write to mount points.
 </summary>
@@ -78035,7 +78045,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_root" lineno="1801">
+<interface name="files_list_root" lineno="1847">
 <summary>
 List the contents of the root directory.
 </summary>
@@ -78045,7 +78055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_symlinks" lineno="1821">
+<interface name="files_delete_root_symlinks" lineno="1867">
 <summary>
 Delete symbolic links in the
 root directory.
@@ -78056,7 +78066,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1839">
+<interface name="files_dontaudit_write_root_dirs" lineno="1885">
 <summary>
 Do not audit attempts to write to / dirs.
 </summary>
@@ -78066,7 +78076,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1858">
+<interface name="files_dontaudit_rw_root_dir" lineno="1904">
 <summary>
 Do not audit attempts to write
 files in the root directory.
@@ -78077,7 +78087,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_root_dirs" lineno="1876">
+<interface name="files_watch_root_dirs" lineno="1922">
 <summary>
 Watch the root directory.
 </summary>
@@ -78087,7 +78097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_root_filetrans" lineno="1910">
+<interface name="files_root_filetrans" lineno="1956">
 <summary>
 Create an object in the root directory, with a private
 type using a type transition.
@@ -78113,7 +78123,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_root_files" lineno="1929">
+<interface name="files_dontaudit_read_root_files" lineno="1975">
 <summary>
 Do not audit attempts to read files in
 the root directory.
@@ -78124,7 +78134,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_files" lineno="1948">
+<interface name="files_dontaudit_rw_root_files" lineno="1994">
 <summary>
 Do not audit attempts to read or write
 files in the root directory.
@@ -78135,7 +78145,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="1967">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2013">
 <summary>
 Do not audit attempts to read or write
 character device nodes in the root directory.
@@ -78146,7 +78156,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_chr_files" lineno="1986">
+<interface name="files_delete_root_chr_files" lineno="2032">
 <summary>
 Delete character device nodes in
 the root directory.
@@ -78157,7 +78167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_files" lineno="2004">
+<interface name="files_delete_root_files" lineno="2050">
 <summary>
 Delete files in the root directory.
 </summary>
@@ -78167,7 +78177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_root_files" lineno="2022">
+<interface name="files_exec_root_files" lineno="2068">
 <summary>
 Execute files in the root directory.
 </summary>
@@ -78177,7 +78187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_dir_entry" lineno="2040">
+<interface name="files_delete_root_dir_entry" lineno="2086">
 <summary>
 Remove entries from the root directory.
 </summary>
@@ -78187,7 +78197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_root_dir" lineno="2058">
+<interface name="files_manage_root_dir" lineno="2104">
 <summary>
 Manage the root directory.
 </summary>
@@ -78197,7 +78207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_rootfs" lineno="2077">
+<interface name="files_getattr_rootfs" lineno="2123">
 <summary>
 Get the attributes of a rootfs
 file system.
@@ -78208,7 +78218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_rootfs" lineno="2095">
+<interface name="files_associate_rootfs" lineno="2141">
 <summary>
 Associate to root file system.
 </summary>
@@ -78218,7 +78228,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_rootfs" lineno="2113">
+<interface name="files_relabel_rootfs" lineno="2159">
 <summary>
 Relabel to and from rootfs file system.
 </summary>
@@ -78228,7 +78238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_rootfs" lineno="2131">
+<interface name="files_unmount_rootfs" lineno="2177">
 <summary>
 Unmount a rootfs filesystem.
 </summary>
@@ -78238,7 +78248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_root" lineno="2149">
+<interface name="files_mounton_root" lineno="2195">
 <summary>
 Mount on the root directory (/)
 </summary>
@@ -78248,7 +78258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_boot_dirs" lineno="2167">
+<interface name="files_getattr_boot_dirs" lineno="2213">
 <summary>
 Get attributes of the /boot directory.
 </summary>
@@ -78258,7 +78268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2186">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2232">
 <summary>
 Do not audit attempts to get attributes
 of the /boot directory.
@@ -78269,7 +78279,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_boot" lineno="2204">
+<interface name="files_search_boot" lineno="2250">
 <summary>
 Search the /boot directory.
 </summary>
@@ -78279,7 +78289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_boot" lineno="2222">
+<interface name="files_dontaudit_search_boot" lineno="2268">
 <summary>
 Do not audit attempts to search the /boot directory.
 </summary>
@@ -78289,7 +78299,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_boot" lineno="2240">
+<interface name="files_list_boot" lineno="2286">
 <summary>
 List the /boot directory.
 </summary>
@@ -78299,7 +78309,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_boot" lineno="2258">
+<interface name="files_dontaudit_list_boot" lineno="2304">
 <summary>
 Do not audit attempts to list the /boot directory.
 </summary>
@@ -78309,7 +78319,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_dirs" lineno="2276">
+<interface name="files_create_boot_dirs" lineno="2322">
 <summary>
 Create directories in /boot
 </summary>
@@ -78319,7 +78329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_dirs" lineno="2295">
+<interface name="files_manage_boot_dirs" lineno="2341">
 <summary>
 Create, read, write, and delete
 directories in /boot.
@@ -78330,7 +78340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_boot_filetrans" lineno="2329">
+<interface name="files_boot_filetrans" lineno="2375">
 <summary>
 Create a private type object in boot
 with an automatic type transition
@@ -78356,7 +78366,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_files" lineno="2348">
+<interface name="files_read_boot_files" lineno="2394">
 <summary>
 read files in the /boot directory.
 </summary>
@@ -78367,7 +78377,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_boot_files" lineno="2368">
+<interface name="files_manage_boot_files" lineno="2414">
 <summary>
 Create, read, write, and delete files
 in the /boot directory.
@@ -78379,7 +78389,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelfrom_boot_files" lineno="2386">
+<interface name="files_relabelfrom_boot_files" lineno="2432">
 <summary>
 Relabel from files in the /boot directory.
 </summary>
@@ -78389,7 +78399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_symlinks" lineno="2404">
+<interface name="files_read_boot_symlinks" lineno="2450">
 <summary>
 Read symbolic links in the /boot directory.
 </summary>
@@ -78399,7 +78409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_boot_symlinks" lineno="2423">
+<interface name="files_rw_boot_symlinks" lineno="2469">
 <summary>
 Read and write symbolic links
 in the /boot directory.
@@ -78410,7 +78420,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_symlinks" lineno="2443">
+<interface name="files_manage_boot_symlinks" lineno="2489">
 <summary>
 Create, read, write, and delete symbolic links
 in the /boot directory.
@@ -78421,7 +78431,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_img" lineno="2461">
+<interface name="files_read_kernel_img" lineno="2507">
 <summary>
 Read kernel files in the /boot directory.
 </summary>
@@ -78431,7 +78441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_img" lineno="2482">
+<interface name="files_create_kernel_img" lineno="2528">
 <summary>
 Install a kernel into the /boot directory.
 </summary>
@@ -78442,7 +78452,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_kernel" lineno="2502">
+<interface name="files_delete_kernel" lineno="2548">
 <summary>
 Delete a kernel from /boot.
 </summary>
@@ -78453,7 +78463,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_default_dirs" lineno="2520">
+<interface name="files_getattr_default_dirs" lineno="2566">
 <summary>
 Getattr of directories with the default file type.
 </summary>
@@ -78463,7 +78473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2539">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2585">
 <summary>
 Do not audit attempts to get the attributes of
 directories with the default file type.
@@ -78474,7 +78484,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_default" lineno="2557">
+<interface name="files_search_default" lineno="2603">
 <summary>
 Search the contents of directories with the default file type.
 </summary>
@@ -78484,7 +78494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_default" lineno="2575">
+<interface name="files_list_default" lineno="2621">
 <summary>
 List contents of directories with the default file type.
 </summary>
@@ -78494,7 +78504,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_default" lineno="2594">
+<interface name="files_dontaudit_list_default" lineno="2640">
 <summary>
 Do not audit attempts to list contents of
 directories with the default file type.
@@ -78505,7 +78515,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_dirs" lineno="2613">
+<interface name="files_manage_default_dirs" lineno="2659">
 <summary>
 Create, read, write, and delete directories with
 the default file type.
@@ -78516,7 +78526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_default" lineno="2631">
+<interface name="files_mounton_default" lineno="2677">
 <summary>
 Mount a filesystem on a directory with the default file type.
 </summary>
@@ -78526,7 +78536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2650">
+<interface name="files_dontaudit_getattr_default_files" lineno="2696">
 <summary>
 Do not audit attempts to get the attributes of
 files with the default file type.
@@ -78537,7 +78547,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_files" lineno="2668">
+<interface name="files_read_default_files" lineno="2714">
 <summary>
 Read files with the default file type.
 </summary>
@@ -78547,7 +78557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_default_files" lineno="2687">
+<interface name="files_dontaudit_read_default_files" lineno="2733">
 <summary>
 Do not audit attempts to read files
 with the default file type.
@@ -78558,7 +78568,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_files" lineno="2706">
+<interface name="files_manage_default_files" lineno="2752">
 <summary>
 Create, read, write, and delete files with
 the default file type.
@@ -78569,7 +78579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_symlinks" lineno="2724">
+<interface name="files_read_default_symlinks" lineno="2770">
 <summary>
 Read symbolic links with the default file type.
 </summary>
@@ -78579,7 +78589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_sockets" lineno="2742">
+<interface name="files_read_default_sockets" lineno="2788">
 <summary>
 Read sockets with the default file type.
 </summary>
@@ -78589,7 +78599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_pipes" lineno="2760">
+<interface name="files_read_default_pipes" lineno="2806">
 <summary>
 Read named pipes with the default file type.
 </summary>
@@ -78599,7 +78609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_etc" lineno="2778">
+<interface name="files_search_etc" lineno="2824">
 <summary>
 Search the contents of /etc directories.
 </summary>
@@ -78609,7 +78619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_etc_dirs" lineno="2796">
+<interface name="files_setattr_etc_dirs" lineno="2842">
 <summary>
 Set the attributes of the /etc directories.
 </summary>
@@ -78619,7 +78629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_etc" lineno="2814">
+<interface name="files_list_etc" lineno="2860">
 <summary>
 List the contents of /etc directories.
 </summary>
@@ -78629,7 +78639,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2832">
+<interface name="files_dontaudit_write_etc_dirs" lineno="2878">
 <summary>
 Do not audit attempts to write to /etc dirs.
 </summary>
@@ -78639,7 +78649,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_dirs" lineno="2850">
+<interface name="files_rw_etc_dirs" lineno="2896">
 <summary>
 Add and remove entries from /etc directories.
 </summary>
@@ -78649,7 +78659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_dirs" lineno="2869">
+<interface name="files_manage_etc_dirs" lineno="2915">
 <summary>
 Manage generic directories in /etc
 </summary>
@@ -78660,7 +78670,7 @@ Domain allowed access
 </param>
 
 </interface>
-<interface name="files_relabelto_etc_dirs" lineno="2887">
+<interface name="files_relabelto_etc_dirs" lineno="2933">
 <summary>
 Relabel directories to etc_t.
 </summary>
@@ -78670,7 +78680,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_dirs" lineno="2906">
+<interface name="files_mounton_etc_dirs" lineno="2952">
 <summary>
 Mount a filesystem on the
 etc directories.
@@ -78681,7 +78691,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_dirs" lineno="2924">
+<interface name="files_watch_etc_dirs" lineno="2970">
 <summary>
 Watch /etc directories
 </summary>
@@ -78691,7 +78701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_files" lineno="2976">
+<interface name="files_read_etc_files" lineno="3022">
 <summary>
 Read generic files in /etc.
 </summary>
@@ -78735,7 +78745,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_map_etc_files" lineno="3008">
+<interface name="files_map_etc_files" lineno="3054">
 <summary>
 Map generic files in /etc.
 </summary>
@@ -78757,7 +78767,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3026">
+<interface name="files_dontaudit_write_etc_files" lineno="3072">
 <summary>
 Do not audit attempts to write generic files in /etc.
 </summary>
@@ -78767,7 +78777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_files" lineno="3045">
+<interface name="files_rw_etc_files" lineno="3091">
 <summary>
 Read and write generic files in /etc.
 </summary>
@@ -78778,7 +78788,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_files" lineno="3067">
+<interface name="files_manage_etc_files" lineno="3113">
 <summary>
 Create, read, write, and delete generic
 files in /etc.
@@ -78790,7 +78800,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_etc_files" lineno="3086">
+<interface name="files_delete_etc_files" lineno="3132">
 <summary>
 Delete system configuration files in /etc.
 </summary>
@@ -78800,7 +78810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_etc_files" lineno="3104">
+<interface name="files_exec_etc_files" lineno="3150">
 <summary>
 Execute generic files in /etc.
 </summary>
@@ -78810,7 +78820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_get_etc_unit_status" lineno="3124">
+<interface name="files_get_etc_unit_status" lineno="3170">
 <summary>
 Get etc_t service status.
 </summary>
@@ -78820,7 +78830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_start_etc_service" lineno="3142">
+<interface name="files_start_etc_service" lineno="3188">
 <summary>
 start etc_t service
 </summary>
@@ -78830,7 +78840,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_stop_etc_service" lineno="3160">
+<interface name="files_stop_etc_service" lineno="3206">
 <summary>
 stop etc_t service
 </summary>
@@ -78840,7 +78850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_etc_files" lineno="3178">
+<interface name="files_relabel_etc_files" lineno="3224">
 <summary>
 Relabel from and to generic files in /etc.
 </summary>
@@ -78850,7 +78860,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_symlinks" lineno="3197">
+<interface name="files_read_etc_symlinks" lineno="3243">
 <summary>
 Read symbolic links in /etc.
 </summary>
@@ -78860,7 +78870,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_symlinks" lineno="3215">
+<interface name="files_watch_etc_symlinks" lineno="3261">
+<summary>
+Watch /etc symlinks
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_manage_etc_symlinks" lineno="3279">
 <summary>
 Create, read, write, and delete symbolic links in /etc.
 </summary>
@@ -78870,7 +78890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans" lineno="3249">
+<interface name="files_etc_filetrans" lineno="3313">
 <summary>
 Create objects in /etc with a private
 type using a type_transition.
@@ -78896,7 +78916,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_flag" lineno="3279">
+<interface name="files_create_boot_flag" lineno="3343">
 <summary>
 Create a boot flag.
 </summary>
@@ -78918,7 +78938,7 @@ The name of the object being created.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_boot_flag" lineno="3305">
+<interface name="files_delete_boot_flag" lineno="3369">
 <summary>
 Delete a boot flag.
 </summary>
@@ -78935,7 +78955,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3324">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3388">
 <summary>
 Get the attributes of the
 etc_runtime directories.
@@ -78946,7 +78966,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3343">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3407">
 <summary>
 Mount a filesystem on the
 etc_runtime directories.
@@ -78957,7 +78977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3361">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3425">
 <summary>
 Relabel to etc_runtime_t dirs.
 </summary>
@@ -78967,7 +78987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3379">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3443">
 <summary>
 Do not audit attempts to set the attributes of the etc_runtime files
 </summary>
@@ -78977,7 +78997,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime_files" lineno="3417">
+<interface name="files_read_etc_runtime_files" lineno="3481">
 <summary>
 Read files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79007,7 +79027,7 @@ Domain allowed access.
 <infoflow type="read" weight="10" />
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3439">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3503">
 <summary>
 Do not audit attempts to read files
 in /etc that are dynamically
@@ -79019,7 +79039,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3458">
+<interface name="files_dontaudit_read_etc_files" lineno="3522">
 <summary>
 Do not audit attempts to read files
 in /etc
@@ -79030,7 +79050,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3477">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3541">
 <summary>
 Do not audit attempts to write
 etc runtime files.
@@ -79041,7 +79061,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_runtime_files" lineno="3497">
+<interface name="files_rw_etc_runtime_files" lineno="3561">
 <summary>
 Read and write files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79053,7 +79073,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_runtime_files" lineno="3519">
+<interface name="files_manage_etc_runtime_files" lineno="3583">
 <summary>
 Create, read, write, and delete files in
 /etc that are dynamically created on boot,
@@ -79066,7 +79086,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3537">
+<interface name="files_relabelto_etc_runtime_files" lineno="3601">
 <summary>
 Relabel to etc_runtime_t files.
 </summary>
@@ -79076,7 +79096,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3566">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3630">
 <summary>
 Create, etc runtime objects with an automatic
 type transition.
@@ -79097,7 +79117,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_home_dir" lineno="3585">
+<interface name="files_getattr_home_dir" lineno="3649">
 <summary>
 Get the attributes of the home directories root
 (/home).
@@ -79108,7 +79128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3606">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3670">
 <summary>
 Do not audit attempts to get the
 attributes of the home directories root
@@ -79120,7 +79140,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_home" lineno="3625">
+<interface name="files_search_home" lineno="3689">
 <summary>
 Search home directories root (/home).
 </summary>
@@ -79130,7 +79150,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_home" lineno="3645">
+<interface name="files_dontaudit_search_home" lineno="3709">
 <summary>
 Do not audit attempts to search
 home directories root (/home).
@@ -79141,7 +79161,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_home" lineno="3665">
+<interface name="files_dontaudit_list_home" lineno="3729">
 <summary>
 Do not audit attempts to list
 home directories root (/home).
@@ -79152,7 +79172,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_home" lineno="3684">
+<interface name="files_list_home" lineno="3748">
 <summary>
 Get listing of home directories.
 </summary>
@@ -79162,7 +79182,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_home" lineno="3703">
+<interface name="files_relabelto_home" lineno="3767">
 <summary>
 Relabel to user home root (/home).
 </summary>
@@ -79172,7 +79192,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_home" lineno="3721">
+<interface name="files_relabelfrom_home" lineno="3785">
 <summary>
 Relabel from user home root (/home).
 </summary>
@@ -79182,7 +79202,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_home_filetrans" lineno="3754">
+<interface name="files_home_filetrans" lineno="3818">
 <summary>
 Create objects in /home.
 </summary>
@@ -79207,7 +79227,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3772">
+<interface name="files_getattr_lost_found_dirs" lineno="3836">
 <summary>
 Get the attributes of lost+found directories.
 </summary>
@@ -79217,7 +79237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3791">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3855">
 <summary>
 Do not audit attempts to get the attributes of
 lost+found directories.
@@ -79228,7 +79248,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_lost_found" lineno="3809">
+<interface name="files_list_lost_found" lineno="3873">
 <summary>
 List the contents of lost+found directories.
 </summary>
@@ -79238,7 +79258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_lost_found" lineno="3829">
+<interface name="files_manage_lost_found" lineno="3893">
 <summary>
 Create, read, write, and delete objects in
 lost+found directories.
@@ -79250,7 +79270,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_mnt" lineno="3851">
+<interface name="files_search_mnt" lineno="3915">
 <summary>
 Search the contents of /mnt.
 </summary>
@@ -79260,7 +79280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_mnt" lineno="3869">
+<interface name="files_dontaudit_search_mnt" lineno="3933">
 <summary>
 Do not audit attempts to search /mnt.
 </summary>
@@ -79270,7 +79290,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_mnt" lineno="3887">
+<interface name="files_list_mnt" lineno="3951">
 <summary>
 List the contents of /mnt.
 </summary>
@@ -79280,7 +79300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_mnt" lineno="3905">
+<interface name="files_dontaudit_list_mnt" lineno="3969">
 <summary>
 Do not audit attempts to list the contents of /mnt.
 </summary>
@@ -79290,7 +79310,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_mnt" lineno="3923">
+<interface name="files_mounton_mnt" lineno="3987">
 <summary>
 Mount a filesystem on /mnt.
 </summary>
@@ -79300,7 +79320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_dirs" lineno="3942">
+<interface name="files_manage_mnt_dirs" lineno="4006">
 <summary>
 Create, read, write, and delete directories in /mnt.
 </summary>
@@ -79311,7 +79331,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_mnt_files" lineno="3960">
+<interface name="files_manage_mnt_files" lineno="4024">
 <summary>
 Create, read, write, and delete files in /mnt.
 </summary>
@@ -79321,7 +79341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_files" lineno="3978">
+<interface name="files_read_mnt_files" lineno="4042">
 <summary>
 read files in /mnt.
 </summary>
@@ -79331,7 +79351,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_symlinks" lineno="3996">
+<interface name="files_read_mnt_symlinks" lineno="4060">
 <summary>
 Read symbolic links in /mnt.
 </summary>
@@ -79341,7 +79361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_symlinks" lineno="4014">
+<interface name="files_manage_mnt_symlinks" lineno="4078">
 <summary>
 Create, read, write, and delete symbolic links in /mnt.
 </summary>
@@ -79351,7 +79371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_kernel_modules" lineno="4032">
+<interface name="files_search_kernel_modules" lineno="4096">
 <summary>
 Search the contents of the kernel module directories.
 </summary>
@@ -79361,7 +79381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_kernel_modules" lineno="4051">
+<interface name="files_list_kernel_modules" lineno="4115">
 <summary>
 List the contents of the kernel module directories.
 </summary>
@@ -79371,7 +79391,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_kernel_modules" lineno="4070">
+<interface name="files_getattr_kernel_modules" lineno="4134">
 <summary>
 Get the attributes of kernel module files.
 </summary>
@@ -79381,7 +79401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_modules" lineno="4088">
+<interface name="files_read_kernel_modules" lineno="4152">
 <summary>
 Read kernel module files.
 </summary>
@@ -79391,7 +79411,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_kernel_modules" lineno="4108">
+<interface name="files_mmap_read_kernel_modules" lineno="4172">
+<summary>
+Read and mmap kernel module files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_write_kernel_modules" lineno="4193">
 <summary>
 Write kernel module files.
 </summary>
@@ -79401,7 +79431,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_modules" lineno="4127">
+<interface name="files_delete_kernel_modules" lineno="4212">
 <summary>
 Delete kernel module files.
 </summary>
@@ -79411,7 +79441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_kernel_modules" lineno="4147">
+<interface name="files_manage_kernel_modules" lineno="4232">
 <summary>
 Create, read, write, and delete
 kernel module files.
@@ -79423,7 +79453,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_kernel_modules" lineno="4166">
+<interface name="files_relabel_kernel_modules" lineno="4252">
 <summary>
 Relabel from and to kernel module files.
 </summary>
@@ -79433,7 +79463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_kernel_modules_filetrans" lineno="4201">
+<interface name="files_kernel_modules_filetrans" lineno="4287">
 <summary>
 Create objects in the kernel module directories
 with a private type via an automatic type transition.
@@ -79459,7 +79489,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_load_kernel_modules" lineno="4219">
+<interface name="files_load_kernel_modules" lineno="4305">
 <summary>
 Load kernel module files.
 </summary>
@@ -79469,7 +79499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_world_readable" lineno="4239">
+<interface name="files_list_world_readable" lineno="4325">
 <summary>
 List world-readable directories.
 </summary>
@@ -79480,7 +79510,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_files" lineno="4258">
+<interface name="files_read_world_readable_files" lineno="4344">
 <summary>
 Read world-readable files.
 </summary>
@@ -79491,7 +79521,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_symlinks" lineno="4277">
+<interface name="files_read_world_readable_symlinks" lineno="4363">
 <summary>
 Read world-readable symbolic links.
 </summary>
@@ -79502,7 +79532,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_pipes" lineno="4295">
+<interface name="files_read_world_readable_pipes" lineno="4381">
 <summary>
 Read world-readable named pipes.
 </summary>
@@ -79512,7 +79542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_world_readable_sockets" lineno="4313">
+<interface name="files_read_world_readable_sockets" lineno="4399">
 <summary>
 Read world-readable sockets.
 </summary>
@@ -79522,7 +79552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_tmp" lineno="4333">
+<interface name="files_associate_tmp" lineno="4419">
 <summary>
 Allow the specified type to associate
 to a filesystem with the type of the
@@ -79534,7 +79564,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_tmp_dirs" lineno="4351">
+<interface name="files_getattr_tmp_dirs" lineno="4437">
 <summary>
 Get the	attributes of the tmp directory (/tmp).
 </summary>
@@ -79544,7 +79574,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4370">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4456">
 <summary>
 Do not audit attempts to get the
 attributes of the tmp directory (/tmp).
@@ -79555,7 +79585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_tmp" lineno="4388">
+<interface name="files_search_tmp" lineno="4474">
 <summary>
 Search the tmp directory (/tmp).
 </summary>
@@ -79565,7 +79595,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_tmp" lineno="4406">
+<interface name="files_dontaudit_search_tmp" lineno="4492">
 <summary>
 Do not audit attempts to search the tmp directory (/tmp).
 </summary>
@@ -79575,7 +79605,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_tmp" lineno="4424">
+<interface name="files_list_tmp" lineno="4510">
 <summary>
 Read the tmp directory (/tmp).
 </summary>
@@ -79585,7 +79615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_tmp" lineno="4442">
+<interface name="files_dontaudit_list_tmp" lineno="4528">
 <summary>
 Do not audit listing of the tmp directory (/tmp).
 </summary>
@@ -79595,7 +79625,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4460">
+<interface name="files_delete_tmp_dir_entry" lineno="4546">
 <summary>
 Remove entries from the tmp directory.
 </summary>
@@ -79605,7 +79635,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_files" lineno="4478">
+<interface name="files_read_generic_tmp_files" lineno="4564">
 <summary>
 Read files in the tmp directory (/tmp).
 </summary>
@@ -79615,7 +79645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4496">
+<interface name="files_manage_generic_tmp_dirs" lineno="4582">
 <summary>
 Manage temporary directories in /tmp.
 </summary>
@@ -79625,7 +79655,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_files" lineno="4514">
+<interface name="files_manage_generic_tmp_files" lineno="4600">
 <summary>
 Manage temporary files and directories in /tmp.
 </summary>
@@ -79635,7 +79665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4532">
+<interface name="files_read_generic_tmp_symlinks" lineno="4618">
 <summary>
 Read symbolic links in the tmp directory (/tmp).
 </summary>
@@ -79645,7 +79675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4550">
+<interface name="files_rw_generic_tmp_sockets" lineno="4636">
 <summary>
 Read and write generic named sockets in the tmp directory (/tmp).
 </summary>
@@ -79655,7 +79685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_tmp" lineno="4568">
+<interface name="files_mounton_tmp" lineno="4654">
 <summary>
 Mount filesystems in the tmp directory (/tmp)
 </summary>
@@ -79665,7 +79695,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4586">
+<interface name="files_setattr_all_tmp_dirs" lineno="4672">
 <summary>
 Set the attributes of all tmp directories.
 </summary>
@@ -79675,7 +79705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_tmp" lineno="4604">
+<interface name="files_list_all_tmp" lineno="4690">
 <summary>
 List all tmp directories.
 </summary>
@@ -79685,7 +79715,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4624">
+<interface name="files_relabel_all_tmp_dirs" lineno="4710">
 <summary>
 Relabel to and from all temporary
 directory types.
@@ -79697,7 +79727,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4645">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4731">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp files.
@@ -79708,7 +79738,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_tmp_files" lineno="4664">
+<interface name="files_getattr_all_tmp_files" lineno="4750">
 <summary>
 Allow attempts to get the attributes
 of all tmp files.
@@ -79719,7 +79749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_files" lineno="4684">
+<interface name="files_relabel_all_tmp_files" lineno="4770">
 <summary>
 Relabel to and from all temporary
 file types.
@@ -79731,7 +79761,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4705">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4791">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp sock_file.
@@ -79742,7 +79772,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_tmp_files" lineno="4723">
+<interface name="files_read_all_tmp_files" lineno="4809">
 <summary>
 Read all tmp files.
 </summary>
@@ -79752,7 +79782,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_tmp_filetrans" lineno="4757">
+<interface name="files_tmp_filetrans" lineno="4843">
 <summary>
 Create an object in the tmp directories, with a private
 type using a type transition.
@@ -79778,7 +79808,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_purge_tmp" lineno="4775">
+<interface name="files_purge_tmp" lineno="4861">
 <summary>
 Delete the contents of /tmp.
 </summary>
@@ -79788,7 +79818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_usr_dirs" lineno="4798">
+<interface name="files_setattr_usr_dirs" lineno="4884">
 <summary>
 Set the attributes of the /usr directory.
 </summary>
@@ -79798,7 +79828,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_usr" lineno="4816">
+<interface name="files_search_usr" lineno="4902">
 <summary>
 Search the content of /usr.
 </summary>
@@ -79808,7 +79838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_usr" lineno="4835">
+<interface name="files_list_usr" lineno="4921">
 <summary>
 List the contents of generic
 directories in /usr.
@@ -79819,7 +79849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="4853">
+<interface name="files_dontaudit_write_usr_dirs" lineno="4939">
 <summary>
 Do not audit write of /usr dirs
 </summary>
@@ -79829,7 +79859,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_usr_dirs" lineno="4871">
+<interface name="files_rw_usr_dirs" lineno="4957">
 <summary>
 Add and remove entries from /usr directories.
 </summary>
@@ -79839,7 +79869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="4890">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="4976">
 <summary>
 Do not audit attempts to add and remove
 entries from /usr directories.
@@ -79850,7 +79880,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_dirs" lineno="4908">
+<interface name="files_delete_usr_dirs" lineno="4994">
 <summary>
 Delete generic directories in /usr in the caller domain.
 </summary>
@@ -79860,7 +79890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_usr_dirs" lineno="4926">
+<interface name="files_watch_usr_dirs" lineno="5012">
 <summary>
 Watch generic directories in /usr.
 </summary>
@@ -79870,7 +79900,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_files" lineno="4944">
+<interface name="files_delete_usr_files" lineno="5030">
 <summary>
 Delete generic files in /usr in the caller domain.
 </summary>
@@ -79880,7 +79910,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_files" lineno="4962">
+<interface name="files_getattr_usr_files" lineno="5048">
 <summary>
 Get the attributes of files in /usr.
 </summary>
@@ -79890,7 +79920,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_map_usr_files" lineno="4981">
+<interface name="files_map_usr_files" lineno="5067">
 <summary>
 Map generic files in /usr.
 </summary>
@@ -79901,7 +79931,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_read_usr_files" lineno="5017">
+<interface name="files_read_usr_files" lineno="5103">
 <summary>
 Read generic files in /usr.
 </summary>
@@ -79929,7 +79959,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_exec_usr_files" lineno="5037">
+<interface name="files_exec_usr_files" lineno="5123">
 <summary>
 Execute generic programs in /usr in the caller domain.
 </summary>
@@ -79939,7 +79969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5057">
+<interface name="files_dontaudit_write_usr_files" lineno="5143">
 <summary>
 dontaudit write of /usr files
 </summary>
@@ -79949,7 +79979,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_usr_files" lineno="5075">
+<interface name="files_manage_usr_files" lineno="5161">
 <summary>
 Create, read, write, and delete files in the /usr directory.
 </summary>
@@ -79959,7 +79989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_usr_files" lineno="5093">
+<interface name="files_relabelto_usr_files" lineno="5179">
 <summary>
 Relabel a file to the type used in /usr.
 </summary>
@@ -79969,7 +79999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_usr_files" lineno="5111">
+<interface name="files_relabelfrom_usr_files" lineno="5197">
 <summary>
 Relabel a file from the type used in /usr.
 </summary>
@@ -79979,7 +80009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_symlinks" lineno="5129">
+<interface name="files_read_usr_symlinks" lineno="5215">
 <summary>
 Read symbolic links in /usr.
 </summary>
@@ -79989,7 +80019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_usr_filetrans" lineno="5162">
+<interface name="files_usr_filetrans" lineno="5248">
 <summary>
 Create objects in the /usr directory
 </summary>
@@ -80014,7 +80044,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_search_src" lineno="5180">
+<interface name="files_search_src" lineno="5266">
 <summary>
 Search directories in /usr/src.
 </summary>
@@ -80024,7 +80054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_src" lineno="5198">
+<interface name="files_dontaudit_search_src" lineno="5284">
 <summary>
 Do not audit attempts to search /usr/src.
 </summary>
@@ -80034,7 +80064,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_src_files" lineno="5216">
+<interface name="files_getattr_usr_src_files" lineno="5302">
 <summary>
 Get the attributes of files in /usr/src.
 </summary>
@@ -80044,7 +80074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_src_files" lineno="5237">
+<interface name="files_read_usr_src_files" lineno="5323">
 <summary>
 Read files in /usr/src.
 </summary>
@@ -80054,7 +80084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_usr_src_files" lineno="5258">
+<interface name="files_exec_usr_src_files" lineno="5344">
 <summary>
 Execute programs in /usr/src in the caller domain.
 </summary>
@@ -80064,7 +80094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_symbol_table" lineno="5278">
+<interface name="files_create_kernel_symbol_table" lineno="5364">
 <summary>
 Install a system.map into the /boot directory.
 </summary>
@@ -80074,7 +80104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_symbol_table" lineno="5297">
+<interface name="files_read_kernel_symbol_table" lineno="5383">
 <summary>
 Read system.map in the /boot directory.
 </summary>
@@ -80084,7 +80114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5316">
+<interface name="files_delete_kernel_symbol_table" lineno="5402">
 <summary>
 Delete a system.map in the /boot directory.
 </summary>
@@ -80094,7 +80124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var" lineno="5335">
+<interface name="files_search_var" lineno="5421">
 <summary>
 Search the contents of /var.
 </summary>
@@ -80104,7 +80134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5353">
+<interface name="files_dontaudit_write_var_dirs" lineno="5439">
 <summary>
 Do not audit attempts to write to /var.
 </summary>
@@ -80114,7 +80144,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_write_var_dirs" lineno="5371">
+<interface name="files_write_var_dirs" lineno="5457">
 <summary>
 Allow attempts to write to /var.dirs
 </summary>
@@ -80124,7 +80154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_var" lineno="5390">
+<interface name="files_dontaudit_search_var" lineno="5476">
 <summary>
 Do not audit attempts to search
 the contents of /var.
@@ -80135,7 +80165,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_var" lineno="5408">
+<interface name="files_list_var" lineno="5494">
 <summary>
 List the contents of /var.
 </summary>
@@ -80145,7 +80175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_var" lineno="5427">
+<interface name="files_dontaudit_list_var" lineno="5513">
 <summary>
 Do not audit attempts to list
 the contents of /var.
@@ -80156,7 +80186,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_dirs" lineno="5446">
+<interface name="files_manage_var_dirs" lineno="5532">
 <summary>
 Create, read, write, and delete directories
 in the /var directory.
@@ -80167,7 +80197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_dirs" lineno="5464">
+<interface name="files_relabel_var_dirs" lineno="5550">
 <summary>
 relabelto/from var directories
 </summary>
@@ -80177,7 +80207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_files" lineno="5482">
+<interface name="files_read_var_files" lineno="5568">
 <summary>
 Read files in the /var directory.
 </summary>
@@ -80187,7 +80217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_append_var_files" lineno="5500">
+<interface name="files_append_var_files" lineno="5586">
 <summary>
 Append files in the /var directory.
 </summary>
@@ -80197,7 +80227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_files" lineno="5518">
+<interface name="files_rw_var_files" lineno="5604">
 <summary>
 Read and write files in the /var directory.
 </summary>
@@ -80207,7 +80237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5537">
+<interface name="files_dontaudit_rw_var_files" lineno="5623">
 <summary>
 Do not audit attempts to read and write
 files in the /var directory.
@@ -80218,7 +80248,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_files" lineno="5555">
+<interface name="files_manage_var_files" lineno="5641">
 <summary>
 Create, read, write, and delete files in the /var directory.
 </summary>
@@ -80228,7 +80258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_symlinks" lineno="5573">
+<interface name="files_read_var_symlinks" lineno="5659">
 <summary>
 Read symbolic links in the /var directory.
 </summary>
@@ -80238,7 +80268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_symlinks" lineno="5592">
+<interface name="files_manage_var_symlinks" lineno="5678">
 <summary>
 Create, read, write, and delete symbolic
 links in the /var directory.
@@ -80249,7 +80279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_filetrans" lineno="5625">
+<interface name="files_var_filetrans" lineno="5711">
 <summary>
 Create objects in the /var directory
 </summary>
@@ -80274,7 +80304,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5643">
+<interface name="files_getattr_var_lib_dirs" lineno="5729">
 <summary>
 Get the attributes of the /var/lib directory.
 </summary>
@@ -80284,7 +80314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var_lib" lineno="5675">
+<interface name="files_search_var_lib" lineno="5761">
 <summary>
 Search the /var/lib directory.
 </summary>
@@ -80308,7 +80338,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5695">
+<interface name="files_dontaudit_search_var_lib" lineno="5781">
 <summary>
 Do not audit attempts to search the
 contents of /var/lib.
@@ -80320,7 +80350,7 @@ Domain to not audit.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_list_var_lib" lineno="5713">
+<interface name="files_list_var_lib" lineno="5799">
 <summary>
 List the contents of the /var/lib directory.
 </summary>
@@ -80330,7 +80360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_lib_dirs" lineno="5731">
+<interface name="files_rw_var_lib_dirs" lineno="5817">
 <summary>
 Read-write /var/lib directories
 </summary>
@@ -80340,7 +80370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_lib_dirs" lineno="5749">
+<interface name="files_manage_var_lib_dirs" lineno="5835">
 <summary>
 manage var_lib_t dirs
 </summary>
@@ -80350,7 +80380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_lib_dirs" lineno="5768">
+<interface name="files_relabel_var_lib_dirs" lineno="5854">
 <summary>
 relabel var_lib_t dirs
 </summary>
@@ -80360,7 +80390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_lib_filetrans" lineno="5802">
+<interface name="files_var_lib_filetrans" lineno="5888">
 <summary>
 Create objects in the /var/lib directory
 </summary>
@@ -80385,7 +80415,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_files" lineno="5821">
+<interface name="files_read_var_lib_files" lineno="5907">
 <summary>
 Read generic files in /var/lib.
 </summary>
@@ -80395,7 +80425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_symlinks" lineno="5840">
+<interface name="files_read_var_lib_symlinks" lineno="5926">
 <summary>
 Read generic symbolic links in /var/lib
 </summary>
@@ -80405,7 +80435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_urandom_seed" lineno="5862">
+<interface name="files_manage_urandom_seed" lineno="5948">
 <summary>
 Create, read, write, and delete the
 pseudorandom number generator seed.
@@ -80416,7 +80446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mounttab" lineno="5882">
+<interface name="files_manage_mounttab" lineno="5968">
 <summary>
 Allow domain to manage mount tables
 necessary for rpcd, nfsd, etc.
@@ -80427,7 +80457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_lock_dirs" lineno="5901">
+<interface name="files_setattr_lock_dirs" lineno="5987">
 <summary>
 Set the attributes of the generic lock directories.
 </summary>
@@ -80437,7 +80467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_locks" lineno="5919">
+<interface name="files_search_locks" lineno="6005">
 <summary>
 Search the locks directory (/var/lock).
 </summary>
@@ -80447,7 +80477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_locks" lineno="5939">
+<interface name="files_dontaudit_search_locks" lineno="6025">
 <summary>
 Do not audit attempts to search the
 locks directory (/var/lock).
@@ -80458,7 +80488,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_locks" lineno="5958">
+<interface name="files_list_locks" lineno="6044">
 <summary>
 List generic lock directories.
 </summary>
@@ -80468,7 +80498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_lock_dirs" lineno="5977">
+<interface name="files_check_write_lock_dirs" lineno="6063">
 <summary>
 Test write access on lock directories.
 </summary>
@@ -80478,7 +80508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_add_entry_lock_dirs" lineno="5996">
+<interface name="files_add_entry_lock_dirs" lineno="6082">
 <summary>
 Add entries in the /var/lock directories.
 </summary>
@@ -80488,7 +80518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_lock_dirs" lineno="6016">
+<interface name="files_rw_lock_dirs" lineno="6102">
 <summary>
 Add and remove entries in the /var/lock
 directories.
@@ -80499,7 +80529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_lock_dirs" lineno="6035">
+<interface name="files_create_lock_dirs" lineno="6121">
 <summary>
 Create lock directories
 </summary>
@@ -80509,7 +80539,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6056">
+<interface name="files_relabel_all_lock_dirs" lineno="6142">
 <summary>
 Relabel to and from all lock directory types.
 </summary>
@@ -80520,7 +80550,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_generic_locks" lineno="6077">
+<interface name="files_getattr_generic_locks" lineno="6163">
 <summary>
 Get the attributes of generic lock files.
 </summary>
@@ -80530,7 +80560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_generic_locks" lineno="6098">
+<interface name="files_delete_generic_locks" lineno="6184">
 <summary>
 Delete generic lock files.
 </summary>
@@ -80540,7 +80570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_locks" lineno="6119">
+<interface name="files_manage_generic_locks" lineno="6205">
 <summary>
 Create, read, write, and delete generic
 lock files.
@@ -80551,7 +80581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_locks" lineno="6141">
+<interface name="files_delete_all_locks" lineno="6227">
 <summary>
 Delete all lock files.
 </summary>
@@ -80562,7 +80592,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_locks" lineno="6162">
+<interface name="files_read_all_locks" lineno="6248">
 <summary>
 Read all lock files.
 </summary>
@@ -80572,7 +80602,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_locks" lineno="6185">
+<interface name="files_manage_all_locks" lineno="6271">
 <summary>
 manage all lock files.
 </summary>
@@ -80582,7 +80612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_locks" lineno="6208">
+<interface name="files_relabel_all_locks" lineno="6294">
 <summary>
 Relabel from/to all lock files.
 </summary>
@@ -80592,7 +80622,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_lock_filetrans" lineno="6247">
+<interface name="files_lock_filetrans" lineno="6333">
 <summary>
 Create an object in the locks directory, with a private
 type using a type transition.
@@ -80618,7 +80648,91 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6268">
+<interface name="files_dontaudit_getattr_pid_dirs" lineno="6354">
+<summary>
+Do not audit attempts to get the attributes
+of the /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_mounton_pid_dirs" lineno="6369">
+<summary>
+mounton a /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_setattr_pid_dirs" lineno="6384">
+<summary>
+Set the attributes of the /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_search_pids" lineno="6400">
+<summary>
+Search the contents of runtime process
+ID directories (/var/run).  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_search_pids" lineno="6416">
+<summary>
+Do not audit attempts to search
+the /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_list_pids" lineno="6432">
+<summary>
+List the contents of the runtime process
+ID directories (/var/run).  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_check_write_pid_dirs" lineno="6447">
+<summary>
+Check write access on /var/run directories.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_pid_dirs" lineno="6462">
+<summary>
+Create a /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6478">
 <summary>
 Do not audit attempts to get the attributes
 of the /var/run directory.
@@ -80629,7 +80743,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_pid_dirs" lineno="6287">
+<interface name="files_mounton_runtime_dirs" lineno="6497">
 <summary>
 mounton a /var/run directory.
 </summary>
@@ -80639,7 +80753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_pid_dirs" lineno="6305">
+<interface name="files_setattr_runtime_dirs" lineno="6515">
 <summary>
 Set the attributes of the /var/run directory.
 </summary>
@@ -80649,7 +80763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_pids" lineno="6325">
+<interface name="files_search_runtime" lineno="6535">
 <summary>
 Search the contents of runtime process
 ID directories (/var/run).
@@ -80660,7 +80774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_pids" lineno="6345">
+<interface name="files_dontaudit_search_runtime" lineno="6555">
 <summary>
 Do not audit attempts to search
 the /var/run directory.
@@ -80671,7 +80785,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_pids" lineno="6365">
+<interface name="files_list_runtime" lineno="6575">
 <summary>
 List the contents of the runtime process
 ID directories (/var/run).
@@ -80682,7 +80796,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_pid_dirs" lineno="6384">
+<interface name="files_check_write_runtime_dirs" lineno="6594">
 <summary>
 Check write access on /var/run directories.
 </summary>
@@ -80692,7 +80806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_pid_dirs" lineno="6402">
+<interface name="files_create_runtime_dirs" lineno="6612">
 <summary>
 Create a /var/run directory.
 </summary>
@@ -80702,7 +80816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_runtime_dirs" lineno="6420">
+<interface name="files_watch_runtime_dirs" lineno="6630">
 <summary>
 Watch /var/run directories.
 </summary>
@@ -80712,9 +80826,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_pids" lineno="6438">
+<interface name="files_read_generic_pids" lineno="6648">
 <summary>
-Read generic process ID files.
+Read generic process ID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80722,9 +80836,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_generic_pid_pipes" lineno="6458">
+<interface name="files_write_generic_pid_pipes" lineno="6663">
 <summary>
-Write named generic process ID pipes
+Write named generic process ID pipes.   (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80732,9 +80846,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_pid_filetrans" lineno="6519">
+<interface name="files_pid_filetrans" lineno="6720">
 <summary>
-Create an object in the process ID directory, with a private type.
+Create an object in the process ID directory, with a private type.  (Deprecated)
 </summary>
 <desc>
 <p>
@@ -80748,7 +80862,7 @@ either the program must be SELinux-aware, or use this interface.
 Related interfaces:
 </p>
 <ul>
-<li>files_pid_file()</li>
+<li>files_runtime_file()</li>
 </ul>
 <p>
 Example usage with a domain that can create and
@@ -80757,9 +80871,9 @@ write its PID file with a private PID file type in the
 </p>
 <p>
 type mypidfile_t;
-files_pid_file(mypidfile_t)
+files_runtime_file(mypidfile_t)
 allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_pid_filetrans(mydomain_t, mypidfile_t, file)
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
 </p>
 </desc>
 <param name="domain">
@@ -80784,9 +80898,9 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6544">
+<interface name="files_pid_filetrans_lock_dir" lineno="6740">
 <summary>
-Create a generic lock directory within the run directories
+Create a generic lock directory within the run directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80799,9 +80913,9 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_generic_pids" lineno="6562">
+<interface name="files_rw_generic_pids" lineno="6755">
 <summary>
-Read and write generic process ID files.
+Read and write generic process ID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80809,10 +80923,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6583">
+<interface name="files_dontaudit_getattr_all_pids" lineno="6771">
 <summary>
 Do not audit attempts to get the attributes of
-daemon runtime data files.
+daemon runtime data files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80820,9 +80934,9 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6603">
+<interface name="files_dontaudit_write_all_pids" lineno="6786">
 <summary>
-Do not audit attempts to write to daemon runtime data files.
+Do not audit attempts to write to daemon runtime data files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80830,9 +80944,9 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="6623">
+<interface name="files_dontaudit_ioctl_all_pids" lineno="6801">
 <summary>
-Do not audit attempts to ioctl daemon runtime data files.
+Do not audit attempts to ioctl daemon runtime data files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80840,10 +80954,41 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_pid_dirs" lineno="6644">
+<interface name="files_manage_all_pid_dirs" lineno="6817">
 <summary>
 manage all pidfile directories
-in the /var/run directory.
+in the /var/run directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_read_all_pids" lineno="6833">
+<summary>
+Read all process ID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_exec_generic_pid_files" lineno="6848">
+<summary>
+Execute generic programs in /var/run in the caller domain.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_pid_files" lineno="6863">
+<summary>
+Relabel all pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80851,9 +80996,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_pids" lineno="6663">
+<interface name="files_delete_all_pids" lineno="6879">
 <summary>
-Read all process ID files.
+Delete all process IDs.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80862,7 +81007,37 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_exec_generic_pid_files" lineno="6684">
+<interface name="files_create_all_pid_sockets" lineno="6898">
+<summary>
+Create all pid sockets.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_pid_pipes" lineno="6913">
+<summary>
+Create all pid named pipes.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_read_runtime_files" lineno="6928">
+<summary>
+Read generic runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_exec_runtime" lineno="6948">
 <summary>
 Execute generic programs in /var/run in the caller domain.
 </summary>
@@ -80872,9 +81047,134 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_files" lineno="6702">
+<interface name="files_rw_runtime_files" lineno="6966">
+<summary>
+Read and write generic runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_runtime_symlinks" lineno="6986">
+<summary>
+Delete generic runtime symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_write_runtime_pipes" lineno="7004">
+<summary>
+Write named generic runtime pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_dirs" lineno="7024">
+<summary>
+Delete all runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_manage_all_runtime_dirs" lineno="7042">
+<summary>
+Create, read, write, and delete all runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_dirs" lineno="7060">
+<summary>
+Relabel all runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7079">
+<summary>
+Do not audit attempts to get the attributes of
+all runtime data files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_read_all_runtime_files" lineno="7100">
+<summary>
+Read all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7121">
+<summary>
+Do not audit attempts to ioctl all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7141">
+<summary>
+Do not audit attempts to write to all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_files" lineno="7162">
+<summary>
+Delete all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_manage_all_runtime_files" lineno="7181">
+<summary>
+Create, read, write and delete all
+var_run (pid) files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_files" lineno="7199">
 <summary>
-Relable all pid files
+Relabel all runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -80882,9 +81182,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_pids" lineno="6721">
+<interface name="files_delete_all_runtime_symlinks" lineno="7218">
 <summary>
-Delete all process IDs.
+Delete all runtime symlinks.
 </summary>
 <param name="domain">
 <summary>
@@ -80893,9 +81193,10 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_create_all_pid_sockets" lineno="6746">
+<interface name="files_manage_all_runtime_symlinks" lineno="7237">
 <summary>
-Create all pid sockets
+Create, read, write and delete all
+var_run (pid) symbolic links.
 </summary>
 <param name="domain">
 <summary>
@@ -80903,9 +81204,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_pid_pipes" lineno="6764">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7255">
 <summary>
-Create all pid named pipes
+Relabel all runtime symbolic links.
 </summary>
 <param name="domain">
 <summary>
@@ -80913,7 +81214,124 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_spool_sockets" lineno="6782">
+<interface name="files_create_all_runtime_pipes" lineno="7273">
+<summary>
+Create all runtime named pipes
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_pipes" lineno="7292">
+<summary>
+Delete all runtime named pipes
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_runtime_sockets" lineno="7311">
+<summary>
+Create all runtime sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_sockets" lineno="7329">
+<summary>
+Delete all runtime sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_sockets" lineno="7347">
+<summary>
+Relabel all runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_runtime_filetrans" lineno="7407">
+<summary>
+Create an object in the /run directory, with a private type.
+</summary>
+<desc>
+<p>
+Create an object in the process ID directory (e.g., /var/run)
+with a private type.  Typically this is used for creating
+private PID files in /var/run with the private type instead
+of the general PID file type. To accomplish this goal,
+either the program must be SELinux-aware, or use this interface.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>files_runtime_file()</li>
+</ul>
+<p>
+Example usage with a domain that can create and
+write its PID file with a private PID file type in the
+/var/run directory:
+</p>
+<p>
+type mypidfile_t;
+files_runtime_file(mypidfile_t)
+allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="files_runtime_filetrans_lock_dir" lineno="7432">
+<summary>
+Create a generic lock directory within the run directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_spool_sockets" lineno="7450">
 <summary>
 Create all spool sockets
 </summary>
@@ -80923,7 +81341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_spool_sockets" lineno="6800">
+<interface name="files_delete_all_spool_sockets" lineno="7468">
 <summary>
 Delete all spool sockets
 </summary>
@@ -80933,9 +81351,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_pid_dirs" lineno="6818">
+<interface name="files_delete_all_pid_dirs" lineno="7486">
 <summary>
-Delete all process ID directories.
+Delete all process ID directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -80943,48 +81361,48 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_pids" lineno="6840">
+<interface name="files_manage_all_pids" lineno="7502">
 <summary>
 Create, read, write and delete all
-var_run (pid) content
+var_run (pid) content  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
-Domain alloed access.
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_dirs" lineno="6860">
+<interface name="files_relabel_all_pid_dirs" lineno="7519">
 <summary>
-Relabel to/from all var_run (pid) directories
+Relabel to/from all var_run (pid) directories  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
-Domain alloed access.
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="6878">
+<interface name="files_relabel_all_pid_sock_files" lineno="7534">
 <summary>
-Relabel to/from all var_run (pid) socket files
+Relabel to/from all var_run (pid) socket files  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
-Domain alloed access.
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pids" lineno="6896">
+<interface name="files_relabel_all_pids" lineno="7549">
 <summary>
-Relabel to/from all var_run (pid) files and directories
+Relabel to/from all var_run (pid) files and directories  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
-Domain alloed access.
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_all_poly_members" lineno="6917">
+<interface name="files_mounton_all_poly_members" lineno="7567">
 <summary>
 Mount filesystems on all polyinstantiation
 member directories.
@@ -80995,7 +81413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_spool" lineno="6936">
+<interface name="files_search_spool" lineno="7586">
 <summary>
 Search the contents of generic spool
 directories (/var/spool).
@@ -81006,7 +81424,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_spool" lineno="6955">
+<interface name="files_dontaudit_search_spool" lineno="7605">
 <summary>
 Do not audit attempts to search generic
 spool directories.
@@ -81017,7 +81435,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_spool" lineno="6974">
+<interface name="files_list_spool" lineno="7624">
 <summary>
 List the contents of generic spool
 (/var/spool) directories.
@@ -81028,7 +81446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool_dirs" lineno="6993">
+<interface name="files_manage_generic_spool_dirs" lineno="7643">
 <summary>
 Create, read, write, and delete generic
 spool directories (/var/spool).
@@ -81039,7 +81457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_spool" lineno="7012">
+<interface name="files_read_generic_spool" lineno="7662">
 <summary>
 Read generic spool files.
 </summary>
@@ -81049,7 +81467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool" lineno="7032">
+<interface name="files_manage_generic_spool" lineno="7682">
 <summary>
 Create, read, write, and delete generic
 spool files.
@@ -81060,7 +81478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_spool_filetrans" lineno="7068">
+<interface name="files_spool_filetrans" lineno="7718">
 <summary>
 Create objects in the spool directory
 with a private type with a type transition.
@@ -81087,7 +81505,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_polyinstantiate_all" lineno="7088">
+<interface name="files_polyinstantiate_all" lineno="7738">
 <summary>
 Allow access to manage all polyinstantiated
 directories on the system.
@@ -81098,7 +81516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unconfined" lineno="7142">
+<interface name="files_unconfined" lineno="7792">
 <summary>
 Unconfined access to files.
 </summary>
@@ -81108,7 +81526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7164">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7814">
 <summary>
 Create, read, write, and delete symbolic links in
 /etc that are dynamically created on boot.
@@ -81120,7 +81538,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7182">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7832">
 <summary>
 Do not audit attempts to read etc_runtime resources
 </summary>
@@ -81130,7 +81548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_src" lineno="7200">
+<interface name="files_list_src" lineno="7850">
 <summary>
 List usr/src files
 </summary>
@@ -81140,7 +81558,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_read_src_files" lineno="7218">
+<interface name="files_read_src_files" lineno="7868">
 <summary>
 Read usr/src files
 </summary>
@@ -81150,7 +81568,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_manage_src_files" lineno="7236">
+<interface name="files_manage_src_files" lineno="7886">
 <summary>
 Manage /usr/src files
 </summary>
@@ -81160,7 +81578,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="7267">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7917">
 <summary>
 Create a resource in the generic lib location
 with an automatic type transition towards the kernel modules
@@ -81182,7 +81600,7 @@ Optional name of the resource
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime" lineno="7285">
+<interface name="files_read_etc_runtime" lineno="7935">
 <summary>
 Read etc runtime resources
 </summary>
@@ -81192,7 +81610,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="7307">
+<interface name="files_relabel_all_non_security_file_types" lineno="7957">
 <summary>
 Allow relabel from and to non-security types
 </summary>
@@ -81203,7 +81621,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_non_security_file_types" lineno="7337">
+<interface name="files_manage_all_non_security_file_types" lineno="7987">
 <summary>
 Manage non-security-sensitive resource types
 </summary>
@@ -81214,7 +81632,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_all_pidfiles" lineno="7359">
+<interface name="files_relabel_all_pidfiles" lineno="8009">
 <summary>
 Allow relabeling from and to any pidfile associated type
 </summary>
@@ -81252,7 +81670,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate" lineno="59">
+<interface name="fs_image_file" lineno="57">
+<summary>
+Transform specified type into a filesystem
+image file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_associate" lineno="80">
 <summary>
 Associate the specified file type to persistent
 filesystems with extended attributes.  This
@@ -81265,7 +81694,7 @@ The type of the to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_noxattr" lineno="81">
+<interface name="fs_associate_noxattr" lineno="102">
 <summary>
 Associate the specified file type to
 filesystems which lack extended attributes
@@ -81279,7 +81708,7 @@ The type of the to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_noxattr" lineno="101">
+<interface name="fs_exec_noxattr" lineno="122">
 <summary>
 Execute files on a filesystem that does
 not support extended attributes.
@@ -81291,7 +81720,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_xattr_type" lineno="121">
+<interface name="fs_xattr_type" lineno="142">
 <summary>
 Transform specified type into a filesystem
 type which has extended attribute
@@ -81303,7 +81732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_xattr_fs" lineno="159">
+<interface name="fs_getattr_all_xattr_fs" lineno="180">
 <summary>
 Get the attributes of all the
 filesystems which have extended
@@ -81331,7 +81760,7 @@ Domain allowed access.
 <infoflow type="read" weight="5"/>
 <rolecap/>
 </interface>
-<interface name="fs_mount_xattr_fs" lineno="179">
+<interface name="fs_mount_xattr_fs" lineno="200">
 <summary>
 Mount a persistent filesystem which
 has extended attributes, such as
@@ -81343,7 +81772,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_xattr_fs" lineno="200">
+<interface name="fs_remount_xattr_fs" lineno="221">
 <summary>
 Remount a persistent filesystem which
 has extended attributes, such as
@@ -81356,7 +81785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_xattr_fs" lineno="220">
+<interface name="fs_unmount_xattr_fs" lineno="241">
 <summary>
 Unmount a persistent filesystem which
 has extended attributes, such as
@@ -81368,7 +81797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_xattr_fs" lineno="256">
+<interface name="fs_getattr_xattr_fs" lineno="277">
 <summary>
 Get the attributes of persistent
 filesystems which have extended
@@ -81396,7 +81825,7 @@ Domain allowed access.
 <infoflow type="read" weight="5"/>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_getattr_xattr_fs" lineno="277">
+<interface name="fs_dontaudit_getattr_xattr_fs" lineno="298">
 <summary>
 Do not audit attempts to
 get the attributes of a persistent
@@ -81409,7 +81838,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_xattr_fs" lineno="297">
+<interface name="fs_relabelfrom_xattr_fs" lineno="318">
 <summary>
 Allow changing of the label of a
 filesystem with extended attributes
@@ -81421,7 +81850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_get_xattr_fs_quotas" lineno="317">
+<interface name="fs_get_xattr_fs_quotas" lineno="338">
 <summary>
 Get the filesystem quotas of a filesystem
 with extended attributes.
@@ -81433,7 +81862,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_set_xattr_fs_quotas" lineno="337">
+<interface name="fs_set_xattr_fs_quotas" lineno="358">
 <summary>
 Set the filesystem quotas of a filesystem
 with extended attributes.
@@ -81445,7 +81874,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_read_anon_inodefs_files" lineno="355">
+<interface name="fs_read_anon_inodefs_files" lineno="376">
 <summary>
 Read files on anon_inodefs file systems.
 </summary>
@@ -81455,7 +81884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_anon_inodefs_files" lineno="375">
+<interface name="fs_rw_anon_inodefs_files" lineno="396">
 <summary>
 Read and write files on anon_inodefs
 file systems.
@@ -81466,7 +81895,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="395">
+<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="416">
 <summary>
 Do not audit attempts to read or write files on
 anon_inodefs file systems.
@@ -81477,7 +81906,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_autofs" lineno="414">
+<interface name="fs_mount_autofs" lineno="435">
 <summary>
 Mount an automount pseudo filesystem.
 </summary>
@@ -81487,7 +81916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_autofs" lineno="433">
+<interface name="fs_remount_autofs" lineno="454">
 <summary>
 Remount an automount pseudo filesystem
 This allows some mount options to be changed.
@@ -81498,7 +81927,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_autofs" lineno="451">
+<interface name="fs_unmount_autofs" lineno="472">
 <summary>
 Unmount an automount pseudo filesystem.
 </summary>
@@ -81508,7 +81937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_autofs" lineno="470">
+<interface name="fs_getattr_autofs" lineno="491">
 <summary>
 Get the attributes of an automount
 pseudo filesystem.
@@ -81519,7 +81948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_auto_mountpoints" lineno="497">
+<interface name="fs_search_auto_mountpoints" lineno="518">
 <summary>
 Search automount filesystem to use automatically
 mounted filesystems.
@@ -81538,7 +81967,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="fs_list_auto_mountpoints" lineno="517">
+<interface name="fs_list_auto_mountpoints" lineno="538">
 <summary>
 Read directories of automatically
 mounted filesystems.
@@ -81550,7 +81979,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_list_auto_mountpoints" lineno="536">
+<interface name="fs_dontaudit_list_auto_mountpoints" lineno="557">
 <summary>
 Do not audit attempts to list directories of automatically
 mounted filesystems.
@@ -81561,7 +81990,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_autofs_symlinks" lineno="555">
+<interface name="fs_manage_autofs_symlinks" lineno="576">
 <summary>
 Create, read, write, and delete symbolic links
 on an autofs filesystem.
@@ -81572,7 +82001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_binfmt_misc_dirs" lineno="574">
+<interface name="fs_getattr_binfmt_misc_dirs" lineno="595">
 <summary>
 Get the attributes of directories on
 binfmt_misc filesystems.
@@ -81583,7 +82012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_register_binary_executable_type" lineno="610">
+<interface name="fs_register_binary_executable_type" lineno="631">
 <summary>
 Register an interpreter for new binary
 file types, using the kernel binfmt_misc
@@ -81610,7 +82039,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mount_cgroup" lineno="630">
+<interface name="fs_mount_cgroup" lineno="651">
 <summary>
 Mount cgroup filesystems.
 </summary>
@@ -81620,7 +82049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_cgroup" lineno="648">
+<interface name="fs_remount_cgroup" lineno="669">
 <summary>
 Remount cgroup filesystems.
 </summary>
@@ -81630,7 +82059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_cgroup" lineno="666">
+<interface name="fs_unmount_cgroup" lineno="687">
 <summary>
 Unmount cgroup filesystems.
 </summary>
@@ -81640,7 +82069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cgroup" lineno="684">
+<interface name="fs_getattr_cgroup" lineno="705">
 <summary>
 Get attributes of cgroup filesystems.
 </summary>
@@ -81650,7 +82079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_cgroup_dirs" lineno="702">
+<interface name="fs_search_cgroup_dirs" lineno="723">
 <summary>
 Search cgroup directories.
 </summary>
@@ -81660,7 +82089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_cgroup_dirs" lineno="722">
+<interface name="fs_list_cgroup_dirs" lineno="743">
 <summary>
 list cgroup directories.
 </summary>
@@ -81670,7 +82099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_cgroup_dirs" lineno="741">
+<interface name="fs_delete_cgroup_dirs" lineno="762">
 <summary>
 Delete cgroup directories.
 </summary>
@@ -81680,7 +82109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_dirs" lineno="760">
+<interface name="fs_manage_cgroup_dirs" lineno="781">
 <summary>
 Manage cgroup directories.
 </summary>
@@ -81690,7 +82119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="780">
+<interface name="fs_relabel_cgroup_dirs" lineno="801">
 <summary>
 Relabel cgroup directories.
 </summary>
@@ -81700,7 +82129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cgroup_files" lineno="798">
+<interface name="fs_getattr_cgroup_files" lineno="819">
 <summary>
 Get attributes of cgroup files.
 </summary>
@@ -81710,7 +82139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cgroup_files" lineno="818">
+<interface name="fs_read_cgroup_files" lineno="839">
 <summary>
 Read cgroup files.
 </summary>
@@ -81720,7 +82149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_watch_cgroup_files" lineno="839">
+<interface name="fs_watch_cgroup_files" lineno="860">
 <summary>
 Watch cgroup files.
 </summary>
@@ -81730,7 +82159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_create_cgroup_links" lineno="858">
+<interface name="fs_create_cgroup_links" lineno="879">
 <summary>
 Create cgroup lnk_files.
 </summary>
@@ -81740,7 +82169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_cgroup_files" lineno="878">
+<interface name="fs_write_cgroup_files" lineno="899">
 <summary>
 Write cgroup files.
 </summary>
@@ -81750,7 +82179,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_cgroup_files" lineno="897">
+<interface name="fs_rw_cgroup_files" lineno="918">
 <summary>
 Read and write cgroup files.
 </summary>
@@ -81760,7 +82189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="919">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="940">
 <summary>
 Do not audit attempts to open,
 get attributes, read and write
@@ -81772,7 +82201,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_files" lineno="937">
+<interface name="fs_manage_cgroup_files" lineno="958">
 <summary>
 Manage cgroup files.
 </summary>
@@ -81782,7 +82211,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="957">
+<interface name="fs_relabel_cgroup_symlinks" lineno="978">
 <summary>
 Relabel cgroup symbolic links.
 </summary>
@@ -81792,7 +82221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cgroup" lineno="975">
+<interface name="fs_mounton_cgroup" lineno="996">
 <summary>
 Mount on cgroup directories.
 </summary>
@@ -81802,7 +82231,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cgroup_filetrans" lineno="1009">
+<interface name="fs_cgroup_filetrans" lineno="1030">
 <summary>
 Create an object in a cgroup tmpfs filesystem, with a private
 type using a type transition.
@@ -81828,7 +82257,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1030">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1051">
 <summary>
 Do not audit attempts to read
 dirs on a CIFS or SMB filesystem.
@@ -81839,7 +82268,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_cifs" lineno="1048">
+<interface name="fs_mount_cifs" lineno="1069">
 <summary>
 Mount a CIFS or SMB network filesystem.
 </summary>
@@ -81849,7 +82278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_cifs" lineno="1067">
+<interface name="fs_remount_cifs" lineno="1088">
 <summary>
 Remount a CIFS or SMB network filesystem.
 This allows some mount options to be changed.
@@ -81860,7 +82289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_cifs" lineno="1085">
+<interface name="fs_unmount_cifs" lineno="1106">
 <summary>
 Unmount a CIFS or SMB network filesystem.
 </summary>
@@ -81870,7 +82299,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cifs" lineno="1105">
+<interface name="fs_getattr_cifs" lineno="1126">
 <summary>
 Get the attributes of a CIFS or
 SMB network filesystem.
@@ -81882,7 +82311,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_cifs" lineno="1123">
+<interface name="fs_search_cifs" lineno="1144">
 <summary>
 Search directories on a CIFS or SMB filesystem.
 </summary>
@@ -81892,7 +82321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_cifs" lineno="1142">
+<interface name="fs_list_cifs" lineno="1163">
 <summary>
 List the contents of directories on a
 CIFS or SMB filesystem.
@@ -81903,7 +82332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1161">
+<interface name="fs_dontaudit_list_cifs" lineno="1182">
 <summary>
 Do not audit attempts to list the contents
 of directories on a CIFS or SMB filesystem.
@@ -81914,7 +82343,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cifs" lineno="1179">
+<interface name="fs_mounton_cifs" lineno="1200">
 <summary>
 Mounton a CIFS filesystem.
 </summary>
@@ -81924,7 +82353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_files" lineno="1198">
+<interface name="fs_read_cifs_files" lineno="1219">
 <summary>
 Read files on a CIFS or SMB filesystem.
 </summary>
@@ -81935,7 +82364,73 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1219">
+<interface name="fs_read_all_inherited_image_files" lineno="1239">
+<summary>
+Read all inherited filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_all_image_files" lineno="1258">
+<summary>
+Read all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_mmap_read_all_image_files" lineno="1277">
+<summary>
+Mmap-read all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_rw_all_image_files" lineno="1296">
+<summary>
+Read and write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_mmap_rw_all_image_files" lineno="1315">
+<summary>
+Mmap-Read-write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_dontaudit_write_all_image_files" lineno="1334">
+<summary>
+Do not audit attempts to write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_noxattr_fs" lineno="1354">
 <summary>
 Get the attributes of filesystems that
 do not have extended attribute support.
@@ -81947,7 +82442,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_list_noxattr_fs" lineno="1237">
+<interface name="fs_list_noxattr_fs" lineno="1372">
 <summary>
 Read all noxattrfs directories.
 </summary>
@@ -81957,7 +82452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1256">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1391">
 <summary>
 Do not audit attempts to list all
 noxattrfs directories.
@@ -81968,7 +82463,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1274">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1409">
 <summary>
 Create, read, write, and delete all noxattrfs directories.
 </summary>
@@ -81978,7 +82473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1292">
+<interface name="fs_read_noxattr_fs_files" lineno="1427">
 <summary>
 Read all noxattrfs files.
 </summary>
@@ -81988,7 +82483,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1312">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1447">
 <summary>
 Do not audit attempts to read all
 noxattrfs files.
@@ -81999,7 +82494,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1330">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1465">
 <summary>
 Dont audit attempts to write to noxattrfs files.
 </summary>
@@ -82009,7 +82504,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1348">
+<interface name="fs_manage_noxattr_fs_files" lineno="1483">
 <summary>
 Create, read, write, and delete all noxattrfs files.
 </summary>
@@ -82019,7 +82514,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1367">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1502">
 <summary>
 Read all noxattrfs symbolic links.
 </summary>
@@ -82029,7 +82524,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1386">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1521">
 <summary>
 Manage all noxattrfs symbolic links.
 </summary>
@@ -82039,9 +82534,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1406">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1541">
 <summary>
-Relabel all objets from filesystems that
+Relabel all objects from filesystems that
 do not support extended attributes.
 </summary>
 <param name="domain">
@@ -82050,7 +82545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1432">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1567">
 <summary>
 Do not audit attempts to read
 files on a CIFS or SMB filesystem.
@@ -82061,7 +82556,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_append_cifs_files" lineno="1452">
+<interface name="fs_append_cifs_files" lineno="1587">
 <summary>
 Append files
 on a CIFS filesystem.
@@ -82073,7 +82568,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1472">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1607">
 <summary>
 dontaudit Append files
 on a CIFS filesystem.
@@ -82085,7 +82580,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1491">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1626">
 <summary>
 Do not audit attempts to read or
 write files on a CIFS or SMB filesystem.
@@ -82096,7 +82591,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_symlinks" lineno="1509">
+<interface name="fs_read_cifs_symlinks" lineno="1644">
 <summary>
 Read symbolic links on a CIFS or SMB filesystem.
 </summary>
@@ -82106,7 +82601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1529">
+<interface name="fs_read_cifs_named_pipes" lineno="1664">
 <summary>
 Read named pipes
 on a CIFS or SMB network filesystem.
@@ -82117,7 +82612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1548">
+<interface name="fs_read_cifs_named_sockets" lineno="1683">
 <summary>
 Read named sockets
 on a CIFS or SMB network filesystem.
@@ -82128,7 +82623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_cifs_files" lineno="1569">
+<interface name="fs_exec_cifs_files" lineno="1704">
 <summary>
 Execute files on a CIFS or SMB
 network filesystem, in the caller
@@ -82141,7 +82636,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_cifs_dirs" lineno="1590">
+<interface name="fs_manage_cifs_dirs" lineno="1725">
 <summary>
 Create, read, write, and delete directories
 on a CIFS or SMB network filesystem.
@@ -82153,7 +82648,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1610">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1745">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -82165,7 +82660,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_files" lineno="1630">
+<interface name="fs_manage_cifs_files" lineno="1765">
 <summary>
 Create, read, write, and delete files
 on a CIFS or SMB network filesystem.
@@ -82177,7 +82672,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1650">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1785">
 <summary>
 Do not audit attempts to create, read,
 write, and delete files
@@ -82189,7 +82684,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1669">
+<interface name="fs_manage_cifs_symlinks" lineno="1804">
 <summary>
 Create, read, write, and delete symbolic links
 on a CIFS or SMB network filesystem.
@@ -82200,7 +82695,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1688">
+<interface name="fs_manage_cifs_named_pipes" lineno="1823">
 <summary>
 Create, read, write, and delete named pipes
 on a CIFS or SMB network filesystem.
@@ -82211,7 +82706,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1707">
+<interface name="fs_manage_cifs_named_sockets" lineno="1842">
 <summary>
 Create, read, write, and delete named sockets
 on a CIFS or SMB network filesystem.
@@ -82222,7 +82717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cifs_domtrans" lineno="1750">
+<interface name="fs_cifs_domtrans" lineno="1885">
 <summary>
 Execute a file on a CIFS or SMB filesystem
 in the specified domain.
@@ -82257,7 +82752,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_dirs" lineno="1770">
+<interface name="fs_manage_configfs_dirs" lineno="1905">
 <summary>
 Create, read, write, and delete dirs
 on a configfs filesystem.
@@ -82268,7 +82763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_files" lineno="1789">
+<interface name="fs_manage_configfs_files" lineno="1924">
 <summary>
 Create, read, write, and delete files
 on a configfs filesystem.
@@ -82279,7 +82774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_dos_fs" lineno="1808">
+<interface name="fs_mount_dos_fs" lineno="1943">
 <summary>
 Mount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -82290,7 +82785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_dos_fs" lineno="1828">
+<interface name="fs_remount_dos_fs" lineno="1963">
 <summary>
 Remount a DOS filesystem, such as
 FAT32 or NTFS.  This allows
@@ -82302,7 +82797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_dos_fs" lineno="1847">
+<interface name="fs_unmount_dos_fs" lineno="1982">
 <summary>
 Unmount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -82313,7 +82808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_fs" lineno="1867">
+<interface name="fs_getattr_dos_fs" lineno="2002">
 <summary>
 Get the attributes of a DOS
 filesystem, such as FAT32 or NTFS.
@@ -82325,7 +82820,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="1886">
+<interface name="fs_relabelfrom_dos_fs" lineno="2021">
 <summary>
 Allow changing of the label of a
 DOS filesystem using the context= mount option.
@@ -82336,7 +82831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_dirs" lineno="1904">
+<interface name="fs_getattr_dos_dirs" lineno="2039">
 <summary>
 Get attributes of directories on a dosfs filesystem.
 </summary>
@@ -82346,7 +82841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_dos" lineno="1922">
+<interface name="fs_search_dos" lineno="2057">
 <summary>
 Search dosfs filesystem.
 </summary>
@@ -82356,7 +82851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_dos" lineno="1940">
+<interface name="fs_list_dos" lineno="2075">
 <summary>
 List dirs DOS filesystem.
 </summary>
@@ -82366,7 +82861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_dirs" lineno="1959">
+<interface name="fs_manage_dos_dirs" lineno="2094">
 <summary>
 Create, read, write, and delete dirs
 on a DOS filesystem.
@@ -82377,7 +82872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_dos_files" lineno="1977">
+<interface name="fs_read_dos_files" lineno="2112">
 <summary>
 Read files on a DOS filesystem.
 </summary>
@@ -82387,7 +82882,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_files" lineno="1996">
+<interface name="fs_mmap_read_dos_files" lineno="2130">
+<summary>
+Read and map files on a DOS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_dos_files" lineno="2150">
 <summary>
 Create, read, write, and delete files
 on a DOS filesystem.
@@ -82398,7 +82903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_efivars" lineno="2014">
+<interface name="fs_list_efivars" lineno="2168">
 <summary>
 List dirs in efivarfs filesystem.
 </summary>
@@ -82408,7 +82913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_efivarfs_files" lineno="2034">
+<interface name="fs_read_efivarfs_files" lineno="2188">
 <summary>
 Read files in efivarfs
 - contains Linux Kernel configuration options for UEFI systems
@@ -82420,7 +82925,19 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_fusefs" lineno="2052">
+<interface name="fs_manage_efivarfs_files" lineno="2208">
+<summary>
+Create, read, write, and delete files
+on a efivarfs filesystem.
+- contains Linux Kernel configuration options for UEFI systems
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_fusefs" lineno="2226">
 <summary>
 stat a FUSE filesystem
 </summary>
@@ -82430,7 +82947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_fusefs" lineno="2070">
+<interface name="fs_mount_fusefs" lineno="2244">
 <summary>
 Mount a FUSE filesystem.
 </summary>
@@ -82440,7 +82957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_fusefs" lineno="2088">
+<interface name="fs_unmount_fusefs" lineno="2262">
 <summary>
 Unmount a FUSE filesystem.
 </summary>
@@ -82450,7 +82967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_fusefs" lineno="2106">
+<interface name="fs_mounton_fusefs" lineno="2280">
 <summary>
 Mounton a FUSEFS filesystem.
 </summary>
@@ -82460,7 +82977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_fusefs" lineno="2126">
+<interface name="fs_search_fusefs" lineno="2300">
 <summary>
 Search directories
 on a FUSEFS filesystem.
@@ -82472,7 +82989,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2145">
+<interface name="fs_dontaudit_list_fusefs" lineno="2319">
 <summary>
 Do not audit attempts to list the contents
 of directories on a FUSEFS filesystem.
@@ -82483,7 +83000,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2165">
+<interface name="fs_manage_fusefs_dirs" lineno="2339">
 <summary>
 Create, read, write, and delete directories
 on a FUSEFS filesystem.
@@ -82495,7 +83012,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2185">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2359">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -82507,7 +83024,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_files" lineno="2204">
+<interface name="fs_read_fusefs_files" lineno="2378">
 <summary>
 Read, a FUSEFS filesystem.
 </summary>
@@ -82518,7 +83035,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_exec_fusefs_files" lineno="2223">
+<interface name="fs_exec_fusefs_files" lineno="2397">
 <summary>
 Execute files on a FUSEFS filesystem.
 </summary>
@@ -82529,7 +83046,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_fusefs_files" lineno="2243">
+<interface name="fs_manage_fusefs_files" lineno="2417">
 <summary>
 Create, read, write, and delete files
 on a FUSEFS filesystem.
@@ -82541,7 +83058,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2263">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2437">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -82553,7 +83070,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2281">
+<interface name="fs_read_fusefs_symlinks" lineno="2455">
 <summary>
 Read symbolic links on a FUSEFS filesystem.
 </summary>
@@ -82563,7 +83080,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2301">
+<interface name="fs_getattr_hugetlbfs" lineno="2475">
 <summary>
 Get the attributes of an hugetlbfs
 filesystem.
@@ -82574,7 +83091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_hugetlbfs" lineno="2319">
+<interface name="fs_list_hugetlbfs" lineno="2493">
 <summary>
 List hugetlbfs.
 </summary>
@@ -82584,7 +83101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2337">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="2511">
 <summary>
 Manage hugetlbfs dirs.
 </summary>
@@ -82594,7 +83111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2355">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2529">
 <summary>
 Read and write inherited hugetlbfs files.
 </summary>
@@ -82604,7 +83121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2373">
+<interface name="fs_rw_hugetlbfs_files" lineno="2547">
 <summary>
 Read and write hugetlbfs files.
 </summary>
@@ -82614,7 +83131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2391">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2565">
 <summary>
 Read, map and write hugetlbfs files.
 </summary>
@@ -82624,7 +83141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_hugetlbfs" lineno="2410">
+<interface name="fs_associate_hugetlbfs" lineno="2584">
 <summary>
 Allow the type to associate to hugetlbfs filesystems.
 </summary>
@@ -82634,7 +83151,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_inotifyfs" lineno="2428">
+<interface name="fs_search_inotifyfs" lineno="2602">
 <summary>
 Search inotifyfs filesystem.
 </summary>
@@ -82644,7 +83161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_inotifyfs" lineno="2446">
+<interface name="fs_list_inotifyfs" lineno="2620">
 <summary>
 List inotifyfs filesystem.
 </summary>
@@ -82654,7 +83171,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2464">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="2638">
 <summary>
 Dontaudit List inotifyfs filesystem.
 </summary>
@@ -82664,7 +83181,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2498">
+<interface name="fs_hugetlbfs_filetrans" lineno="2672">
 <summary>
 Create an object in a hugetlbfs filesystem, with a private
 type using a type transition.
@@ -82690,7 +83207,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_iso9660_fs" lineno="2518">
+<interface name="fs_mount_iso9660_fs" lineno="2692">
 <summary>
 Mount an iso9660 filesystem, which
 is usually used on CDs.
@@ -82701,7 +83218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_iso9660_fs" lineno="2538">
+<interface name="fs_remount_iso9660_fs" lineno="2712">
 <summary>
 Remount an iso9660 filesystem, which
 is usually used on CDs.  This allows
@@ -82713,7 +83230,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2557">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="2731">
 <summary>
 Allow changing of the label of a
 filesystem with iso9660 type
@@ -82724,7 +83241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2576">
+<interface name="fs_unmount_iso9660_fs" lineno="2750">
 <summary>
 Unmount an iso9660 filesystem, which
 is usually used on CDs.
@@ -82735,7 +83252,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2596">
+<interface name="fs_getattr_iso9660_fs" lineno="2770">
 <summary>
 Get the attributes of an iso9660
 filesystem, which is usually used on CDs.
@@ -82747,7 +83264,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_iso9660_files" lineno="2615">
+<interface name="fs_getattr_iso9660_files" lineno="2789">
 <summary>
 Get the attributes of files on an iso9660
 filesystem, which is usually used on CDs.
@@ -82758,7 +83275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_iso9660_files" lineno="2635">
+<interface name="fs_read_iso9660_files" lineno="2809">
 <summary>
 Read files on an iso9660 filesystem, which
 is usually used on CDs.
@@ -82769,7 +83286,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfs" lineno="2655">
+<interface name="fs_mount_nfs" lineno="2829">
 <summary>
 Mount a NFS filesystem.
 </summary>
@@ -82779,7 +83296,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfs" lineno="2674">
+<interface name="fs_remount_nfs" lineno="2848">
 <summary>
 Remount a NFS filesystem.  This allows
 some mount options to be changed.
@@ -82790,7 +83307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfs" lineno="2692">
+<interface name="fs_unmount_nfs" lineno="2866">
 <summary>
 Unmount a NFS filesystem.
 </summary>
@@ -82800,7 +83317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfs" lineno="2711">
+<interface name="fs_getattr_nfs" lineno="2885">
 <summary>
 Get the attributes of a NFS filesystem.
 </summary>
@@ -82811,7 +83328,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_nfs" lineno="2729">
+<interface name="fs_search_nfs" lineno="2903">
 <summary>
 Search directories on a NFS filesystem.
 </summary>
@@ -82821,7 +83338,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfs" lineno="2747">
+<interface name="fs_list_nfs" lineno="2921">
 <summary>
 List NFS filesystem.
 </summary>
@@ -82831,7 +83348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_nfs" lineno="2766">
+<interface name="fs_dontaudit_list_nfs" lineno="2940">
 <summary>
 Do not audit attempts to list the contents
 of directories on a NFS filesystem.
@@ -82842,7 +83359,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_nfs" lineno="2784">
+<interface name="fs_mounton_nfs" lineno="2958">
 <summary>
 Mounton a NFS filesystem.
 </summary>
@@ -82852,7 +83369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_files" lineno="2803">
+<interface name="fs_read_nfs_files" lineno="2977">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -82863,7 +83380,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="2823">
+<interface name="fs_dontaudit_read_nfs_files" lineno="2997">
 <summary>
 Do not audit attempts to read
 files on a NFS filesystem.
@@ -82874,7 +83391,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_nfs_files" lineno="2841">
+<interface name="fs_write_nfs_files" lineno="3015">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -82884,7 +83401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_nfs_files" lineno="2861">
+<interface name="fs_exec_nfs_files" lineno="3035">
 <summary>
 Execute files on a NFS filesystem.
 </summary>
@@ -82895,7 +83412,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_append_nfs_files" lineno="2882">
+<interface name="fs_append_nfs_files" lineno="3056">
 <summary>
 Append files
 on a NFS filesystem.
@@ -82907,7 +83424,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="2902">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3076">
 <summary>
 dontaudit Append files
 on a NFS filesystem.
@@ -82919,7 +83436,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="2921">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3095">
 <summary>
 Do not audit attempts to read or
 write files on a NFS filesystem.
@@ -82930,7 +83447,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_symlinks" lineno="2939">
+<interface name="fs_read_nfs_symlinks" lineno="3113">
 <summary>
 Read symbolic links on a NFS filesystem.
 </summary>
@@ -82940,7 +83457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2958">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3132">
 <summary>
 Dontaudit read symbolic links on a NFS filesystem.
 </summary>
@@ -82950,7 +83467,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_sockets" lineno="2976">
+<interface name="fs_read_nfs_named_sockets" lineno="3150">
 <summary>
 Read named sockets on a NFS filesystem.
 </summary>
@@ -82960,7 +83477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_pipes" lineno="2995">
+<interface name="fs_read_nfs_named_pipes" lineno="3169">
 <summary>
 Read named pipes on a NFS network filesystem.
 </summary>
@@ -82971,7 +83488,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3014">
+<interface name="fs_getattr_rpc_dirs" lineno="3188">
 <summary>
 Get the attributes of directories of RPC
 file system pipes.
@@ -82982,7 +83499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_rpc" lineno="3033">
+<interface name="fs_search_rpc" lineno="3207">
 <summary>
 Search directories of RPC file system pipes.
 </summary>
@@ -82992,7 +83509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_removable" lineno="3051">
+<interface name="fs_search_removable" lineno="3225">
 <summary>
 Search removable storage directories.
 </summary>
@@ -83002,7 +83519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_removable" lineno="3069">
+<interface name="fs_dontaudit_list_removable" lineno="3243">
 <summary>
 Do not audit attempts to list removable storage directories.
 </summary>
@@ -83012,7 +83529,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_files" lineno="3087">
+<interface name="fs_read_removable_files" lineno="3261">
 <summary>
 Read removable storage files.
 </summary>
@@ -83022,7 +83539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3105">
+<interface name="fs_dontaudit_read_removable_files" lineno="3279">
 <summary>
 Do not audit attempts to read removable storage files.
 </summary>
@@ -83032,7 +83549,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3123">
+<interface name="fs_dontaudit_write_removable_files" lineno="3297">
 <summary>
 Do not audit attempts to write removable storage files.
 </summary>
@@ -83042,7 +83559,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_symlinks" lineno="3141">
+<interface name="fs_read_removable_symlinks" lineno="3315">
 <summary>
 Read removable storage symbolic links.
 </summary>
@@ -83052,7 +83569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_blk_files" lineno="3159">
+<interface name="fs_read_removable_blk_files" lineno="3333">
 <summary>
 Read block nodes on removable filesystems.
 </summary>
@@ -83062,7 +83579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_removable_blk_files" lineno="3178">
+<interface name="fs_rw_removable_blk_files" lineno="3352">
 <summary>
 Read and write block nodes on removable filesystems.
 </summary>
@@ -83072,7 +83589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_rpc" lineno="3197">
+<interface name="fs_list_rpc" lineno="3371">
 <summary>
 Read directories of RPC file system pipes.
 </summary>
@@ -83082,7 +83599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_files" lineno="3215">
+<interface name="fs_read_rpc_files" lineno="3389">
 <summary>
 Read files of RPC file system pipes.
 </summary>
@@ -83092,7 +83609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_symlinks" lineno="3233">
+<interface name="fs_read_rpc_symlinks" lineno="3407">
 <summary>
 Read symbolic links of RPC file system pipes.
 </summary>
@@ -83102,7 +83619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_sockets" lineno="3251">
+<interface name="fs_read_rpc_sockets" lineno="3425">
 <summary>
 Read sockets of RPC file system pipes.
 </summary>
@@ -83112,7 +83629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_sockets" lineno="3269">
+<interface name="fs_rw_rpc_sockets" lineno="3443">
 <summary>
 Read and write sockets of RPC file system pipes.
 </summary>
@@ -83122,7 +83639,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_dirs" lineno="3289">
+<interface name="fs_manage_nfs_dirs" lineno="3463">
 <summary>
 Create, read, write, and delete directories
 on a NFS filesystem.
@@ -83134,7 +83651,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3309">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3483">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -83146,7 +83663,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_files" lineno="3329">
+<interface name="fs_manage_nfs_files" lineno="3503">
 <summary>
 Create, read, write, and delete files
 on a NFS filesystem.
@@ -83158,7 +83675,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3349">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="3523">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -83170,7 +83687,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3369">
+<interface name="fs_manage_nfs_symlinks" lineno="3543">
 <summary>
 Create, read, write, and delete symbolic links
 on a NFS network filesystem.
@@ -83182,7 +83699,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3388">
+<interface name="fs_manage_nfs_named_pipes" lineno="3562">
 <summary>
 Create, read, write, and delete named pipes
 on a NFS filesystem.
@@ -83193,7 +83710,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3407">
+<interface name="fs_manage_nfs_named_sockets" lineno="3581">
 <summary>
 Create, read, write, and delete named sockets
 on a NFS filesystem.
@@ -83204,7 +83721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_nfs_domtrans" lineno="3450">
+<interface name="fs_nfs_domtrans" lineno="3624">
 <summary>
 Execute a file on a NFS filesystem
 in the specified domain.
@@ -83239,7 +83756,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfsd_fs" lineno="3469">
+<interface name="fs_mount_nfsd_fs" lineno="3643">
 <summary>
 Mount a NFS server pseudo filesystem.
 </summary>
@@ -83249,7 +83766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfsd_fs" lineno="3488">
+<interface name="fs_remount_nfsd_fs" lineno="3662">
 <summary>
 Mount a NFS server pseudo filesystem.
 This allows some mount options to be changed.
@@ -83260,7 +83777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3506">
+<interface name="fs_unmount_nfsd_fs" lineno="3680">
 <summary>
 Unmount a NFS server pseudo filesystem.
 </summary>
@@ -83270,7 +83787,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3525">
+<interface name="fs_getattr_nfsd_fs" lineno="3699">
 <summary>
 Get the attributes of a NFS server
 pseudo filesystem.
@@ -83281,7 +83798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_nfsd_fs" lineno="3543">
+<interface name="fs_search_nfsd_fs" lineno="3717">
 <summary>
 Search NFS server directories.
 </summary>
@@ -83291,7 +83808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfsd_fs" lineno="3561">
+<interface name="fs_list_nfsd_fs" lineno="3735">
 <summary>
 List NFS server directories.
 </summary>
@@ -83301,7 +83818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_files" lineno="3579">
+<interface name="fs_getattr_nfsd_files" lineno="3753">
 <summary>
 Getattr files on an nfsd filesystem
 </summary>
@@ -83311,7 +83828,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_nfsd_fs" lineno="3597">
+<interface name="fs_rw_nfsd_fs" lineno="3771">
 <summary>
 Read and write NFS server files.
 </summary>
@@ -83321,7 +83838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nsfs_files" lineno="3615">
+<interface name="fs_read_nsfs_files" lineno="3789">
 <summary>
 Read nsfs inodes (e.g. /proc/pid/ns/uts)
 </summary>
@@ -83331,7 +83848,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstorefs" lineno="3633">
+<interface name="fs_unmount_nsfs" lineno="3807">
+<summary>
+Unmount an nsfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_pstorefs" lineno="3825">
 <summary>
 Get the attributes of a pstore filesystem.
 </summary>
@@ -83341,7 +83868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstore_dirs" lineno="3652">
+<interface name="fs_getattr_pstore_dirs" lineno="3844">
 <summary>
 Get the attributes of directories
 of a pstore filesystem.
@@ -83352,7 +83879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_pstore_dirs" lineno="3671">
+<interface name="fs_relabel_pstore_dirs" lineno="3863">
 <summary>
 Relabel to/from pstore_t directories.
 </summary>
@@ -83362,7 +83889,39 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_ramfs" lineno="3689">
+<interface name="fs_list_pstore_dirs" lineno="3882">
+<summary>
+List the directories
+of a pstore filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_pstore_files" lineno="3901">
+<summary>
+Read pstore_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_delete_pstore_files" lineno="3920">
+<summary>
+Delete the files
+of a pstore filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_associate_ramfs" lineno="3939">
 <summary>
 Allow the type to associate to ramfs filesystems.
 </summary>
@@ -83372,7 +83931,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_ramfs" lineno="3707">
+<interface name="fs_mount_ramfs" lineno="3957">
 <summary>
 Mount a RAM filesystem.
 </summary>
@@ -83382,7 +83941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_ramfs" lineno="3726">
+<interface name="fs_remount_ramfs" lineno="3976">
 <summary>
 Remount a RAM filesystem.  This allows
 some mount options to be changed.
@@ -83393,7 +83952,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_ramfs" lineno="3744">
+<interface name="fs_unmount_ramfs" lineno="3994">
 <summary>
 Unmount a RAM filesystem.
 </summary>
@@ -83403,7 +83962,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_ramfs" lineno="3762">
+<interface name="fs_getattr_ramfs" lineno="4012">
 <summary>
 Get the attributes of a RAM filesystem.
 </summary>
@@ -83413,7 +83972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_ramfs" lineno="3780">
+<interface name="fs_search_ramfs" lineno="4030">
 <summary>
 Search directories on a ramfs
 </summary>
@@ -83423,7 +83982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="3798">
+<interface name="fs_dontaudit_search_ramfs" lineno="4048">
 <summary>
 Dontaudit Search directories on a ramfs
 </summary>
@@ -83433,7 +83992,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_dirs" lineno="3817">
+<interface name="fs_manage_ramfs_dirs" lineno="4067">
 <summary>
 Create, read, write, and delete
 directories on a ramfs.
@@ -83444,7 +84003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="3835">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4085">
 <summary>
 Dontaudit read on a ramfs files.
 </summary>
@@ -83454,7 +84013,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3853">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4103">
 <summary>
 Dontaudit read on a ramfs fifo_files.
 </summary>
@@ -83464,7 +84023,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_files" lineno="3872">
+<interface name="fs_manage_ramfs_files" lineno="4122">
 <summary>
 Create, read, write, and delete
 files on a ramfs filesystem.
@@ -83475,7 +84034,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_pipes" lineno="3890">
+<interface name="fs_write_ramfs_pipes" lineno="4140">
 <summary>
 Write to named pipe on a ramfs filesystem.
 </summary>
@@ -83485,7 +84044,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3909">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4159">
 <summary>
 Do not audit attempts to write to named
 pipes on a ramfs filesystem.
@@ -83496,7 +84055,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_ramfs_pipes" lineno="3927">
+<interface name="fs_rw_ramfs_pipes" lineno="4177">
 <summary>
 Read and write a named pipe on a ramfs filesystem.
 </summary>
@@ -83506,7 +84065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_pipes" lineno="3946">
+<interface name="fs_manage_ramfs_pipes" lineno="4196">
 <summary>
 Create, read, write, and delete
 named pipes on a ramfs filesystem.
@@ -83517,7 +84076,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_sockets" lineno="3964">
+<interface name="fs_write_ramfs_sockets" lineno="4214">
 <summary>
 Write to named socket on a ramfs filesystem.
 </summary>
@@ -83527,7 +84086,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_sockets" lineno="3983">
+<interface name="fs_manage_ramfs_sockets" lineno="4233">
 <summary>
 Create, read, write, and delete
 named sockets on a ramfs filesystem.
@@ -83538,7 +84097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_romfs" lineno="4001">
+<interface name="fs_mount_romfs" lineno="4251">
 <summary>
 Mount a ROM filesystem.
 </summary>
@@ -83548,7 +84107,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_romfs" lineno="4020">
+<interface name="fs_remount_romfs" lineno="4270">
 <summary>
 Remount a ROM filesystem.  This allows
 some mount options to be changed.
@@ -83559,7 +84118,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_romfs" lineno="4038">
+<interface name="fs_unmount_romfs" lineno="4288">
 <summary>
 Unmount a ROM filesystem.
 </summary>
@@ -83569,7 +84128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_romfs" lineno="4057">
+<interface name="fs_getattr_romfs" lineno="4307">
 <summary>
 Get the attributes of a ROM
 filesystem.
@@ -83580,7 +84139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4075">
+<interface name="fs_mount_rpc_pipefs" lineno="4325">
 <summary>
 Mount a RPC pipe filesystem.
 </summary>
@@ -83590,7 +84149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4094">
+<interface name="fs_remount_rpc_pipefs" lineno="4344">
 <summary>
 Remount a RPC pipe filesystem.  This
 allows some mount option to be changed.
@@ -83601,7 +84160,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4112">
+<interface name="fs_unmount_rpc_pipefs" lineno="4362">
 <summary>
 Unmount a RPC pipe filesystem.
 </summary>
@@ -83611,7 +84170,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4131">
+<interface name="fs_getattr_rpc_pipefs" lineno="4381">
 <summary>
 Get the attributes of a RPC pipe
 filesystem.
@@ -83622,7 +84181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4149">
+<interface name="fs_rw_rpc_named_pipes" lineno="4399">
 <summary>
 Read and write RPC pipe filesystem named pipes.
 </summary>
@@ -83632,7 +84191,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_tmpfs" lineno="4167">
+<interface name="fs_mount_tmpfs" lineno="4417">
 <summary>
 Mount a tmpfs filesystem.
 </summary>
@@ -83642,7 +84201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_tmpfs" lineno="4185">
+<interface name="fs_remount_tmpfs" lineno="4435">
 <summary>
 Remount a tmpfs filesystem.
 </summary>
@@ -83652,7 +84211,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_tmpfs" lineno="4203">
+<interface name="fs_unmount_tmpfs" lineno="4453">
 <summary>
 Unmount a tmpfs filesystem.
 </summary>
@@ -83662,7 +84221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4221">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="4471">
 <summary>
 Do not audit getting the attributes of a tmpfs filesystem
 </summary>
@@ -83672,7 +84231,7 @@ Domain to not audit
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs" lineno="4241">
+<interface name="fs_getattr_tmpfs" lineno="4491">
 <summary>
 Get the attributes of a tmpfs
 filesystem.
@@ -83684,7 +84243,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_associate_tmpfs" lineno="4259">
+<interface name="fs_associate_tmpfs" lineno="4509">
 <summary>
 Allow the type to associate to tmpfs filesystems.
 </summary>
@@ -83694,7 +84253,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4277">
+<interface name="fs_relabelfrom_tmpfs" lineno="4527">
 <summary>
 Relabel from tmpfs filesystem.
 </summary>
@@ -83704,7 +84263,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4295">
+<interface name="fs_getattr_tmpfs_dirs" lineno="4545">
 <summary>
 Get the attributes of tmpfs directories.
 </summary>
@@ -83714,7 +84273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4314">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4564">
 <summary>
 Do not audit attempts to get the attributes
 of tmpfs directories.
@@ -83725,7 +84284,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs" lineno="4332">
+<interface name="fs_mounton_tmpfs" lineno="4582">
 <summary>
 Mount on tmpfs directories.
 </summary>
@@ -83735,7 +84294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4350">
+<interface name="fs_mounton_tmpfs_files" lineno="4600">
 <summary>
 Mount on tmpfs files.
 </summary>
@@ -83745,7 +84304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4368">
+<interface name="fs_setattr_tmpfs_dirs" lineno="4618">
 <summary>
 Set the attributes of tmpfs directories.
 </summary>
@@ -83755,7 +84314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tmpfs" lineno="4386">
+<interface name="fs_search_tmpfs" lineno="4636">
 <summary>
 Search tmpfs directories.
 </summary>
@@ -83765,7 +84324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_tmpfs" lineno="4404">
+<interface name="fs_list_tmpfs" lineno="4654">
 <summary>
 List the contents of generic tmpfs directories.
 </summary>
@@ -83775,7 +84334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4423">
+<interface name="fs_dontaudit_list_tmpfs" lineno="4673">
 <summary>
 Do not audit attempts to list the
 contents of generic tmpfs directories.
@@ -83786,7 +84345,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4442">
+<interface name="fs_manage_tmpfs_dirs" lineno="4692">
 <summary>
 Create, read, write, and delete
 tmpfs directories
@@ -83797,7 +84356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4461">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4711">
 <summary>
 Do not audit attempts to write
 tmpfs directories
@@ -83808,7 +84367,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4479">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4729">
 <summary>
 Relabel from tmpfs_t dir
 </summary>
@@ -83818,7 +84377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="4497">
+<interface name="fs_relabel_tmpfs_dirs" lineno="4747">
 <summary>
 Relabel directory on tmpfs filesystems.
 </summary>
@@ -83828,7 +84387,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_tmpfs_filetrans" lineno="4530">
+<interface name="fs_tmpfs_filetrans" lineno="4780">
 <summary>
 Create an object in a tmpfs filesystem, with a private
 type using a type transition.
@@ -83854,7 +84413,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4550">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4800">
 <summary>
 Do not audit attempts to getattr
 generic tmpfs files.
@@ -83865,7 +84424,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4569">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4819">
 <summary>
 Do not audit attempts to read or write
 generic tmpfs files.
@@ -83876,7 +84435,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="4587">
+<interface name="fs_delete_tmpfs_symlinks" lineno="4837">
 <summary>
 Delete tmpfs symbolic links.
 </summary>
@@ -83886,7 +84445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_auto_mountpoints" lineno="4606">
+<interface name="fs_manage_auto_mountpoints" lineno="4856">
 <summary>
 Create, read, write, and delete
 auto moutpoints.
@@ -83897,7 +84456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_files" lineno="4624">
+<interface name="fs_read_tmpfs_files" lineno="4874">
 <summary>
 Read generic tmpfs files.
 </summary>
@@ -83907,7 +84466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_files" lineno="4642">
+<interface name="fs_rw_tmpfs_files" lineno="4892">
 <summary>
 Read and write generic tmpfs files.
 </summary>
@@ -83917,7 +84476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_files" lineno="4660">
+<interface name="fs_relabel_tmpfs_files" lineno="4910">
 <summary>
 Relabel files on tmpfs filesystems.
 </summary>
@@ -83927,7 +84486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="4678">
+<interface name="fs_read_tmpfs_symlinks" lineno="4928">
 <summary>
 Read tmpfs link files.
 </summary>
@@ -83937,7 +84496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4696">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4946">
 <summary>
 Relabelfrom socket files on tmpfs filesystems.
 </summary>
@@ -83947,7 +84506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4714">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4964">
 <summary>
 Relabelfrom tmpfs link files.
 </summary>
@@ -83957,7 +84516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="4732">
+<interface name="fs_rw_tmpfs_chr_files" lineno="4982">
 <summary>
 Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -83967,7 +84526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4751">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5001">
 <summary>
 dontaudit Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -83977,7 +84536,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="4770">
+<interface name="fs_relabel_tmpfs_chr_file" lineno="5020">
 <summary>
 Relabel character nodes on tmpfs filesystems.
 </summary>
@@ -83987,7 +84546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="4789">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5039">
 <summary>
 Read and write block nodes on tmpfs filesystems.
 </summary>
@@ -83997,7 +84556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="4808">
+<interface name="fs_relabel_tmpfs_blk_file" lineno="5058">
 <summary>
 Relabel block nodes on tmpfs filesystems.
 </summary>
@@ -84007,7 +84566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_files" lineno="4828">
+<interface name="fs_manage_tmpfs_files" lineno="5078">
 <summary>
 Read and write, create and delete generic
 files on tmpfs filesystems.
@@ -84018,7 +84577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="4847">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5097">
 <summary>
 Read and write, create and delete symbolic
 links on tmpfs filesystems.
@@ -84029,7 +84588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="4866">
+<interface name="fs_manage_tmpfs_sockets" lineno="5116">
 <summary>
 Read and write, create and delete socket
 files on tmpfs filesystems.
@@ -84040,7 +84599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="4885">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5135">
 <summary>
 Read and write, create and delete character
 nodes on tmpfs filesystems.
@@ -84051,7 +84610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="4904">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5154">
 <summary>
 Read and write, create and delete block nodes
 on tmpfs filesystems.
@@ -84062,7 +84621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs" lineno="4922">
+<interface name="fs_getattr_tracefs" lineno="5172">
 <summary>
 Get the attributes of a trace filesystem.
 </summary>
@@ -84072,7 +84631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="4940">
+<interface name="fs_getattr_tracefs_dirs" lineno="5190">
 <summary>
 Get attributes of dirs on tracefs filesystem.
 </summary>
@@ -84082,7 +84641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tracefs" lineno="4958">
+<interface name="fs_search_tracefs" lineno="5208">
 <summary>
 search directories on a tracefs filesystem
 </summary>
@@ -84092,7 +84651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_files" lineno="4977">
+<interface name="fs_getattr_tracefs_files" lineno="5227">
 <summary>
 Get the attributes of files
 on a trace filesystem.
@@ -84103,7 +84662,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_xenfs" lineno="4995">
+<interface name="fs_mount_xenfs" lineno="5245">
 <summary>
 Mount a XENFS filesystem.
 </summary>
@@ -84113,7 +84672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_xenfs" lineno="5013">
+<interface name="fs_search_xenfs" lineno="5263">
 <summary>
 Search the XENFS filesystem.
 </summary>
@@ -84123,7 +84682,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5033">
+<interface name="fs_manage_xenfs_dirs" lineno="5283">
 <summary>
 Create, read, write, and delete directories
 on a XENFS filesystem.
@@ -84135,7 +84694,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5053">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5303">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -84147,7 +84706,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_files" lineno="5073">
+<interface name="fs_manage_xenfs_files" lineno="5323">
 <summary>
 Create, read, write, and delete files
 on a XENFS filesystem.
@@ -84159,7 +84718,17 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5093">
+<interface name="fs_mmap_xenfs_files" lineno="5341">
+<summary>
+Map files a XENFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="5361">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -84171,7 +84740,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_all_fs" lineno="5111">
+<interface name="fs_mount_all_fs" lineno="5379">
 <summary>
 Mount all filesystems.
 </summary>
@@ -84181,7 +84750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_all_fs" lineno="5130">
+<interface name="fs_remount_all_fs" lineno="5398">
 <summary>
 Remount all filesystems.  This
 allows some mount options to be changed.
@@ -84192,7 +84761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_all_fs" lineno="5148">
+<interface name="fs_unmount_all_fs" lineno="5416">
 <summary>
 Unmount all filesystems.
 </summary>
@@ -84202,7 +84771,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_fs" lineno="5180">
+<interface name="fs_getattr_all_fs" lineno="5448">
 <summary>
 Get the attributes of all filesystems.
 </summary>
@@ -84226,7 +84795,7 @@ Domain allowed access.
 <infoflow type="read" weight="5"/>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5200">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="5468">
 <summary>
 Do not audit attempts to get the attributes
 all filesystems.
@@ -84237,7 +84806,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_get_all_fs_quotas" lineno="5219">
+<interface name="fs_get_all_fs_quotas" lineno="5487">
 <summary>
 Get the quotas of all filesystems.
 </summary>
@@ -84248,7 +84817,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_set_all_quotas" lineno="5238">
+<interface name="fs_set_all_quotas" lineno="5506">
 <summary>
 Set the quotas of all filesystems.
 </summary>
@@ -84259,7 +84828,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5256">
+<interface name="fs_relabelfrom_all_fs" lineno="5524">
 <summary>
 Relabelfrom all filesystems.
 </summary>
@@ -84269,7 +84838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_dirs" lineno="5275">
+<interface name="fs_getattr_all_dirs" lineno="5543">
 <summary>
 Get the attributes of all directories
 with a filesystem type.
@@ -84280,7 +84849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_all" lineno="5293">
+<interface name="fs_search_all" lineno="5561">
 <summary>
 Search all directories with a filesystem type.
 </summary>
@@ -84290,7 +84859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_all" lineno="5311">
+<interface name="fs_list_all" lineno="5579">
 <summary>
 List all directories with a filesystem type.
 </summary>
@@ -84300,7 +84869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_files" lineno="5330">
+<interface name="fs_getattr_all_files" lineno="5598">
 <summary>
 Get the attributes of all files with
 a filesystem type.
@@ -84311,7 +84880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5349">
+<interface name="fs_dontaudit_getattr_all_files" lineno="5617">
 <summary>
 Do not audit attempts to get the attributes
 of all files with a filesystem type.
@@ -84322,7 +84891,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_symlinks" lineno="5368">
+<interface name="fs_getattr_all_symlinks" lineno="5636">
 <summary>
 Get the attributes of all symbolic links with
 a filesystem type.
@@ -84333,7 +84902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5387">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5655">
 <summary>
 Do not audit attempts to get the attributes
 of all symbolic links with a filesystem type.
@@ -84344,7 +84913,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_pipes" lineno="5406">
+<interface name="fs_getattr_all_pipes" lineno="5674">
 <summary>
 Get the attributes of all named pipes with
 a filesystem type.
@@ -84355,7 +84924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="5425">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="5693">
 <summary>
 Do not audit attempts to get the attributes
 of all named pipes with a filesystem type.
@@ -84366,7 +84935,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_sockets" lineno="5444">
+<interface name="fs_getattr_all_sockets" lineno="5712">
 <summary>
 Get the attributes of all named sockets with
 a filesystem type.
@@ -84377,7 +84946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="5463">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="5731">
 <summary>
 Do not audit attempts to get the attributes
 of all named sockets with a filesystem type.
@@ -84388,7 +84957,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_blk_files" lineno="5482">
+<interface name="fs_getattr_all_blk_files" lineno="5750">
 <summary>
 Get the attributes of all block device nodes with
 a filesystem type.
@@ -84399,7 +84968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_chr_files" lineno="5501">
+<interface name="fs_getattr_all_chr_files" lineno="5769">
 <summary>
 Get the attributes of all character device nodes with
 a filesystem type.
@@ -84410,7 +84979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unconfined" lineno="5519">
+<interface name="fs_unconfined" lineno="5787">
 <summary>
 Unconfined access to filesystems
 </summary>
@@ -84703,7 +85272,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_ring_buffer" lineno="505">
+<interface name="kernel_write_key" lineno="504">
+<summary>
+allow write access to the kernel key ring.
+</summary>
+<param name="domain">
+<summary>
+Domain to allow.
+</summary>
+</param>
+</interface>
+<interface name="kernel_read_ring_buffer" lineno="523">
 <summary>
 Allows caller to read the ring buffer.
 </summary>
@@ -84714,7 +85293,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_read_ring_buffer" lineno="524">
+<interface name="kernel_dontaudit_read_ring_buffer" lineno="542">
 <summary>
 Do not audit attempts to read the ring buffer.
 </summary>
@@ -84724,7 +85303,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_change_ring_buffer_level" lineno="543">
+<interface name="kernel_change_ring_buffer_level" lineno="561">
 <summary>
 Change the level of kernel messages logged to the console.
 </summary>
@@ -84735,7 +85314,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_clear_ring_buffer" lineno="563">
+<interface name="kernel_clear_ring_buffer" lineno="581">
 <summary>
 Allows the caller to clear the ring buffer.
 </summary>
@@ -84746,7 +85325,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_request_load_module" lineno="595">
+<interface name="kernel_request_load_module" lineno="613">
 <summary>
 Allows caller to request the kernel to load a module
 </summary>
@@ -84769,7 +85348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_request_load_module" lineno="613">
+<interface name="kernel_dontaudit_request_load_module" lineno="631">
 <summary>
 Do not audit requests to the kernel to load a module.
 </summary>
@@ -84779,7 +85358,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_get_sysvipc_info" lineno="631">
+<interface name="kernel_get_sysvipc_info" lineno="649">
 <summary>
 Get information on all System V IPC objects.
 </summary>
@@ -84789,7 +85368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_debugfs" lineno="649">
+<interface name="kernel_getattr_debugfs" lineno="667">
 <summary>
 Get the attributes of a kernel debugging filesystem.
 </summary>
@@ -84799,7 +85378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_debugfs" lineno="667">
+<interface name="kernel_mount_debugfs" lineno="685">
 <summary>
 Mount a kernel debugging filesystem.
 </summary>
@@ -84809,7 +85388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_debugfs" lineno="685">
+<interface name="kernel_unmount_debugfs" lineno="703">
 <summary>
 Unmount a kernel debugging filesystem.
 </summary>
@@ -84819,7 +85398,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_remount_debugfs" lineno="703">
+<interface name="kernel_remount_debugfs" lineno="721">
 <summary>
 Remount a kernel debugging filesystem.
 </summary>
@@ -84829,7 +85408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_debugfs" lineno="721">
+<interface name="kernel_search_debugfs" lineno="739">
 <summary>
 Search the contents of a kernel debugging filesystem.
 </summary>
@@ -84839,7 +85418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_debugfs" lineno="739">
+<interface name="kernel_dontaudit_search_debugfs" lineno="757">
 <summary>
 Do not audit attempts to search the kernel debugging filesystem.
 </summary>
@@ -84849,7 +85428,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_debugfs" lineno="757">
+<interface name="kernel_read_debugfs" lineno="775">
 <summary>
 Read information from the debugging filesystem.
 </summary>
@@ -84859,7 +85438,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="777">
+<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="795">
 <summary>
 Do not audit attempts to write kernel debugging filesystem dirs.
 </summary>
@@ -84869,7 +85448,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_debugfs" lineno="795">
+<interface name="kernel_manage_debugfs" lineno="813">
 <summary>
 Manage information from the debugging filesystem.
 </summary>
@@ -84879,7 +85458,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_kvmfs" lineno="815">
+<interface name="kernel_mount_kvmfs" lineno="833">
 <summary>
 Mount a kernel VM filesystem.
 </summary>
@@ -84889,7 +85468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_proc" lineno="833">
+<interface name="kernel_mount_proc" lineno="851">
 <summary>
 mount the proc filesystem.
 </summary>
@@ -84899,7 +85478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_remount_proc" lineno="851">
+<interface name="kernel_remount_proc" lineno="869">
 <summary>
 remount the proc filesystem.
 </summary>
@@ -84909,7 +85488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_proc" lineno="869">
+<interface name="kernel_unmount_proc" lineno="887">
 <summary>
 Unmount the proc filesystem.
 </summary>
@@ -84919,7 +85498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_proc" lineno="887">
+<interface name="kernel_getattr_proc" lineno="905">
 <summary>
 Get the attributes of the proc filesystem.
 </summary>
@@ -84929,7 +85508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_proc" lineno="906">
+<interface name="kernel_mounton_proc" lineno="924">
 <summary>
 Mount on proc directories.
 </summary>
@@ -84940,7 +85519,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="925">
+<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="943">
 <summary>
 Do not audit attempts to set the
 attributes of directories in /proc.
@@ -84951,7 +85530,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_proc" lineno="943">
+<interface name="kernel_search_proc" lineno="961">
 <summary>
 Search directories in /proc.
 </summary>
@@ -84961,7 +85540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_list_proc" lineno="961">
+<interface name="kernel_list_proc" lineno="979">
 <summary>
 List the contents of directories in /proc.
 </summary>
@@ -84971,7 +85550,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_proc" lineno="980">
+<interface name="kernel_dontaudit_list_proc" lineno="998">
 <summary>
 Do not audit attempts to list the
 contents of directories in /proc.
@@ -84982,7 +85561,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_proc_dirs" lineno="999">
+<interface name="kernel_dontaudit_write_proc_dirs" lineno="1017">
 <summary>
 Do not audit attempts to write the
 directories in /proc.
@@ -84993,7 +85572,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_proc_dirs" lineno="1017">
+<interface name="kernel_mounton_proc_dirs" lineno="1035">
 <summary>
 Mount the directories in /proc.
 </summary>
@@ -85003,7 +85582,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_proc_files" lineno="1035">
+<interface name="kernel_getattr_proc_files" lineno="1053">
 <summary>
 Get the attributes of files in /proc.
 </summary>
@@ -85013,7 +85592,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_proc_symlinks" lineno="1062">
+<interface name="kernel_read_proc_symlinks" lineno="1080">
 <summary>
 Read generic symbolic links in /proc.
 </summary>
@@ -85032,7 +85611,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="kernel_read_system_state" lineno="1101">
+<interface name="kernel_read_system_state" lineno="1119">
 <summary>
 Allows caller to read system state information in /proc.
 </summary>
@@ -85063,7 +85642,7 @@ Domain allowed access.
 <infoflow type="read" weight="10"/>
 <rolecap/>
 </interface>
-<interface name="kernel_write_proc_files" lineno="1127">
+<interface name="kernel_write_proc_files" lineno="1145">
 <summary>
 Write to generic proc entries.
 </summary>
@@ -85074,7 +85653,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_read_system_state" lineno="1146">
+<interface name="kernel_dontaudit_read_system_state" lineno="1164">
 <summary>
 Do not audit attempts by caller to
 read system state information in proc.
@@ -85085,7 +85664,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1165">
+<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1183">
 <summary>
 Do not audit attempts by caller to
 read symbolic links in proc.
@@ -85096,7 +85675,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_afs_state" lineno="1184">
+<interface name="kernel_rw_afs_state" lineno="1202">
 <summary>
 Allow caller to read and write state information for AFS.
 </summary>
@@ -85107,7 +85686,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_software_raid_state" lineno="1204">
+<interface name="kernel_read_software_raid_state" lineno="1222">
 <summary>
 Allow caller to read the state information for software raid.
 </summary>
@@ -85118,7 +85697,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_software_raid_state" lineno="1224">
+<interface name="kernel_rw_software_raid_state" lineno="1242">
 <summary>
 Allow caller to read and set the state information for software raid.
 </summary>
@@ -85128,9 +85707,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_core_if" lineno="1244">
+<interface name="kernel_getattr_core_if" lineno="1262">
 <summary>
-Allows caller to get attribues of core kernel interface.
+Allows caller to get attributes of core kernel interface.
 </summary>
 <param name="domain">
 <summary>
@@ -85138,7 +85717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_core_if" lineno="1265">
+<interface name="kernel_dontaudit_getattr_core_if" lineno="1283">
 <summary>
 Do not audit attempts to get the attributes of
 core kernel interfaces.
@@ -85149,7 +85728,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_core_if" lineno="1283">
+<interface name="kernel_read_core_if" lineno="1301">
 <summary>
 Allows caller to read the core kernel interface.
 </summary>
@@ -85159,7 +85738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_messages" lineno="1307">
+<interface name="kernel_read_messages" lineno="1325">
 <summary>
 Allow caller to read kernel messages
 using the /proc/kmsg interface.
@@ -85170,7 +85749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_message_if" lineno="1329">
+<interface name="kernel_getattr_message_if" lineno="1347">
 <summary>
 Allow caller to get the attributes of kernel message
 interface (/proc/kmsg).
@@ -85181,7 +85760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_message_if" lineno="1348">
+<interface name="kernel_dontaudit_getattr_message_if" lineno="1366">
 <summary>
 Do not audit attempts by caller to get the attributes of kernel
 message interfaces.
@@ -85192,7 +85771,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_message_if" lineno="1367">
+<interface name="kernel_mounton_message_if" lineno="1385">
 <summary>
 Mount on kernel message interfaces files.
 </summary>
@@ -85203,7 +85782,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_search_network_state" lineno="1388">
+<interface name="kernel_dontaudit_search_network_state" lineno="1406">
 <summary>
 Do not audit attempts to search the network
 state directory.
@@ -85215,7 +85794,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_search_network_state" lineno="1407">
+<interface name="kernel_search_network_state" lineno="1425">
 <summary>
 Allow searching of network state directory.
 </summary>
@@ -85226,7 +85805,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_read_network_state" lineno="1437">
+<interface name="kernel_read_network_state" lineno="1455">
 <summary>
 Read the network state information.
 </summary>
@@ -85248,7 +85827,7 @@ Domain allowed access.
 <infoflow type="read" weight="10"/>
 <rolecap/>
 </interface>
-<interface name="kernel_read_network_state_symlinks" lineno="1458">
+<interface name="kernel_read_network_state_symlinks" lineno="1476">
 <summary>
 Allow caller to read the network state symbolic links.
 </summary>
@@ -85258,7 +85837,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_xen_state" lineno="1479">
+<interface name="kernel_search_xen_state" lineno="1497">
 <summary>
 Allow searching of xen state directory.
 </summary>
@@ -85269,7 +85848,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_dontaudit_search_xen_state" lineno="1499">
+<interface name="kernel_dontaudit_search_xen_state" lineno="1517">
 <summary>
 Do not audit attempts to search the xen
 state directory.
@@ -85281,7 +85860,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_read_xen_state" lineno="1518">
+<interface name="kernel_read_xen_state" lineno="1536">
 <summary>
 Allow caller to read the xen state information.
 </summary>
@@ -85292,7 +85871,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_read_xen_state_symlinks" lineno="1540">
+<interface name="kernel_read_xen_state_symlinks" lineno="1558">
 <summary>
 Allow caller to read the xen state symbolic links.
 </summary>
@@ -85303,7 +85882,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_write_xen_state" lineno="1561">
+<interface name="kernel_write_xen_state" lineno="1579">
 <summary>
 Allow caller to write xen state information.
 </summary>
@@ -85314,7 +85893,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_list_all_proc" lineno="1579">
+<interface name="kernel_list_all_proc" lineno="1597">
 <summary>
 Allow attempts to list all proc directories.
 </summary>
@@ -85324,7 +85903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_all_proc" lineno="1598">
+<interface name="kernel_dontaudit_list_all_proc" lineno="1616">
 <summary>
 Do not audit attempts to list all proc directories.
 </summary>
@@ -85334,7 +85913,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_sysctl" lineno="1619">
+<interface name="kernel_dontaudit_search_sysctl" lineno="1637">
 <summary>
 Do not audit attempts by caller to search
 the base directory of sysctls.
@@ -85346,7 +85925,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_mounton_sysctl_dirs" lineno="1638">
+<interface name="kernel_mounton_sysctl_dirs" lineno="1656">
 <summary>
 Mount on sysctl_t dirs.
 </summary>
@@ -85357,7 +85936,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_sysctl" lineno="1658">
+<interface name="kernel_read_sysctl" lineno="1676">
 <summary>
 Allow access to read sysctl directories.
 </summary>
@@ -85368,7 +85947,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_mounton_sysctl_files" lineno="1678">
+<interface name="kernel_mounton_sysctl_files" lineno="1696">
 <summary>
 Mount on sysctl files.
 </summary>
@@ -85379,7 +85958,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_device_sysctls" lineno="1698">
+<interface name="kernel_read_device_sysctls" lineno="1716">
 <summary>
 Allow caller to read the device sysctls.
 </summary>
@@ -85390,7 +85969,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_device_sysctls" lineno="1719">
+<interface name="kernel_rw_device_sysctls" lineno="1737">
 <summary>
 Read and write device sysctls.
 </summary>
@@ -85401,7 +85980,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_vm_sysctl" lineno="1739">
+<interface name="kernel_search_vm_sysctl" lineno="1757">
 <summary>
 Allow caller to search virtual memory sysctls.
 </summary>
@@ -85411,7 +85990,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_vm_sysctls" lineno="1758">
+<interface name="kernel_read_vm_sysctls" lineno="1776">
 <summary>
 Allow caller to read virtual memory sysctls.
 </summary>
@@ -85422,7 +86001,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_vm_sysctls" lineno="1779">
+<interface name="kernel_rw_vm_sysctls" lineno="1797">
 <summary>
 Read and write virtual memory sysctls.
 </summary>
@@ -85433,7 +86012,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_network_sysctl" lineno="1801">
+<interface name="kernel_search_network_sysctl" lineno="1819">
 <summary>
 Search network sysctl directories.
 </summary>
@@ -85443,7 +86022,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_network_sysctl" lineno="1819">
+<interface name="kernel_dontaudit_search_network_sysctl" lineno="1837">
 <summary>
 Do not audit attempts by caller to search network sysctl directories.
 </summary>
@@ -85453,7 +86032,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_net_sysctls" lineno="1838">
+<interface name="kernel_read_net_sysctls" lineno="1856">
 <summary>
 Allow caller to read network sysctls.
 </summary>
@@ -85464,7 +86043,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_net_sysctls" lineno="1859">
+<interface name="kernel_rw_net_sysctls" lineno="1877">
 <summary>
 Allow caller to modiry contents of sysctl network files.
 </summary>
@@ -85475,7 +86054,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_unix_sysctls" lineno="1881">
+<interface name="kernel_read_unix_sysctls" lineno="1899">
 <summary>
 Allow caller to read unix domain
 socket sysctls.
@@ -85487,7 +86066,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_unix_sysctls" lineno="1903">
+<interface name="kernel_rw_unix_sysctls" lineno="1921">
 <summary>
 Read and write unix domain
 socket sysctls.
@@ -85499,7 +86078,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_hotplug_sysctls" lineno="1924">
+<interface name="kernel_read_hotplug_sysctls" lineno="1942">
 <summary>
 Read the hotplug sysctl.
 </summary>
@@ -85510,7 +86089,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_hotplug_sysctls" lineno="1945">
+<interface name="kernel_rw_hotplug_sysctls" lineno="1963">
 <summary>
 Read and write the hotplug sysctl.
 </summary>
@@ -85521,7 +86100,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_modprobe_sysctls" lineno="1966">
+<interface name="kernel_read_modprobe_sysctls" lineno="1984">
 <summary>
 Read the modprobe sysctl.
 </summary>
@@ -85532,7 +86111,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_modprobe_sysctls" lineno="1987">
+<interface name="kernel_rw_modprobe_sysctls" lineno="2005">
 <summary>
 Read and write the modprobe sysctl.
 </summary>
@@ -85543,7 +86122,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2007">
+<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2025">
 <summary>
 Do not audit attempts to search generic kernel sysctls.
 </summary>
@@ -85553,7 +86132,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2025">
+<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2043">
 <summary>
 Do not audit attempted reading of kernel sysctls
 </summary>
@@ -85563,7 +86142,7 @@ Domain to not audit accesses from
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_crypto_sysctls" lineno="2043">
+<interface name="kernel_read_crypto_sysctls" lineno="2061">
 <summary>
 Read generic crypto sysctls.
 </summary>
@@ -85573,7 +86152,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_kernel_sysctls" lineno="2084">
+<interface name="kernel_read_kernel_sysctls" lineno="2102">
 <summary>
 Read general kernel sysctls.
 </summary>
@@ -85605,7 +86184,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2104">
+<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2122">
 <summary>
 Do not audit attempts to write generic kernel sysctls.
 </summary>
@@ -85615,7 +86194,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_kernel_sysctl" lineno="2123">
+<interface name="kernel_rw_kernel_sysctl" lineno="2141">
 <summary>
 Read and write generic kernel sysctls.
 </summary>
@@ -85626,7 +86205,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_mounton_kernel_sysctl_files" lineno="2144">
+<interface name="kernel_mounton_kernel_sysctl_files" lineno="2162">
 <summary>
 Mount on kernel sysctl files.
 </summary>
@@ -85637,7 +86216,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2164">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2182">
 <summary>
 Read kernel ns lastpid sysctls.
 </summary>
@@ -85648,7 +86227,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2184">
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2202">
 <summary>
 Do not audit attempts to write kernel ns lastpid sysctls.
 </summary>
@@ -85658,7 +86237,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2203">
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2221">
 <summary>
 Read and write kernel ns lastpid sysctls.
 </summary>
@@ -85669,7 +86248,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_fs_sysctls" lineno="2224">
+<interface name="kernel_search_fs_sysctls" lineno="2242">
 <summary>
 Search filesystem sysctl directories.
 </summary>
@@ -85680,7 +86259,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_fs_sysctls" lineno="2243">
+<interface name="kernel_read_fs_sysctls" lineno="2261">
 <summary>
 Read filesystem sysctls.
 </summary>
@@ -85691,9 +86270,9 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2264">
+<interface name="kernel_rw_fs_sysctls" lineno="2282">
 <summary>
-Read and write fileystem sysctls.
+Read and write filesystem sysctls.
 </summary>
 <param name="domain">
 <summary>
@@ -85702,7 +86281,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_irq_sysctls" lineno="2285">
+<interface name="kernel_read_irq_sysctls" lineno="2303">
 <summary>
 Read IRQ sysctls.
 </summary>
@@ -85713,7 +86292,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2306">
+<interface name="kernel_rw_irq_sysctls" lineno="2324">
 <summary>
 Read and write IRQ sysctls.
 </summary>
@@ -85724,7 +86303,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2327">
+<interface name="kernel_read_rpc_sysctls" lineno="2345">
 <summary>
 Read RPC sysctls.
 </summary>
@@ -85735,7 +86314,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2348">
+<interface name="kernel_rw_rpc_sysctls" lineno="2366">
 <summary>
 Read and write RPC sysctls.
 </summary>
@@ -85746,7 +86325,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2368">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2386">
 <summary>
 Do not audit attempts to list all sysctl directories.
 </summary>
@@ -85756,7 +86335,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_all_sysctls" lineno="2388">
+<interface name="kernel_read_all_sysctls" lineno="2406">
 <summary>
 Allow caller to read all sysctls.
 </summary>
@@ -85767,7 +86346,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_all_sysctls" lineno="2411">
+<interface name="kernel_rw_all_sysctls" lineno="2429">
 <summary>
 Read and write all sysctls.
 </summary>
@@ -85778,7 +86357,18 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_kill_unlabeled" lineno="2435">
+<interface name="kernel_associate_proc" lineno="2454">
+<summary>
+Associate a file to proc_t (/proc)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_kill_unlabeled" lineno="2471">
 <summary>
 Send a kill signal to unlabeled processes.
 </summary>
@@ -85788,7 +86378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_unlabeled" lineno="2453">
+<interface name="kernel_mount_unlabeled" lineno="2489">
 <summary>
 Mount a kernel unlabeled filesystem.
 </summary>
@@ -85798,7 +86388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_unlabeled" lineno="2471">
+<interface name="kernel_unmount_unlabeled" lineno="2507">
 <summary>
 Unmount a kernel unlabeled filesystem.
 </summary>
@@ -85808,7 +86398,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_signal_unlabeled" lineno="2489">
+<interface name="kernel_signal_unlabeled" lineno="2525">
 <summary>
 Send general signals to unlabeled processes.
 </summary>
@@ -85818,7 +86408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_signull_unlabeled" lineno="2507">
+<interface name="kernel_signull_unlabeled" lineno="2543">
 <summary>
 Send a null signal to unlabeled processes.
 </summary>
@@ -85828,7 +86418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2525">
+<interface name="kernel_sigstop_unlabeled" lineno="2561">
 <summary>
 Send a stop signal to unlabeled processes.
 </summary>
@@ -85838,7 +86428,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2543">
+<interface name="kernel_sigchld_unlabeled" lineno="2579">
 <summary>
 Send a child terminated signal to unlabeled processes.
 </summary>
@@ -85848,7 +86438,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2561">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2597">
 <summary>
 Get the attributes of unlabeled directories.
 </summary>
@@ -85858,7 +86448,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2579">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2615">
 <summary>
 Do not audit attempts to search unlabeled directories.
 </summary>
@@ -85868,7 +86458,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_list_unlabeled" lineno="2597">
+<interface name="kernel_list_unlabeled" lineno="2633">
 <summary>
 List unlabeled directories.
 </summary>
@@ -85878,7 +86468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_unlabeled_state" lineno="2615">
+<interface name="kernel_read_unlabeled_state" lineno="2651">
 <summary>
 Read the process state (/proc/pid) of all unlabeled_t.
 </summary>
@@ -85888,7 +86478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2635">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2671">
 <summary>
 Do not audit attempts to list unlabeled directories.
 </summary>
@@ -85898,7 +86488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2653">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2689">
 <summary>
 Read and write unlabeled directories.
 </summary>
@@ -85908,7 +86498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2671">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2707">
 <summary>
 Delete unlabeled directories.
 </summary>
@@ -85918,7 +86508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2689">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2725">
 <summary>
 Create, read, write, and delete unlabeled directories.
 </summary>
@@ -85928,7 +86518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2707">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2743">
 <summary>
 Mount a filesystem on an unlabeled directory.
 </summary>
@@ -85938,7 +86528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_unlabeled_files" lineno="2725">
+<interface name="kernel_read_unlabeled_files" lineno="2761">
 <summary>
 Read unlabeled files.
 </summary>
@@ -85948,7 +86538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2743">
+<interface name="kernel_rw_unlabeled_files" lineno="2779">
 <summary>
 Read and write unlabeled files.
 </summary>
@@ -85958,7 +86548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2761">
+<interface name="kernel_delete_unlabeled_files" lineno="2797">
 <summary>
 Delete unlabeled files.
 </summary>
@@ -85968,7 +86558,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2779">
+<interface name="kernel_manage_unlabeled_files" lineno="2815">
 <summary>
 Create, read, write, and delete unlabeled files.
 </summary>
@@ -85978,7 +86568,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2798">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2834">
 <summary>
 Do not audit attempts by caller to get the
 attributes of an unlabeled file.
@@ -85989,7 +86579,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2817">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2853">
 <summary>
 Do not audit attempts by caller to
 read an unlabeled file.
@@ -86000,7 +86590,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="2835">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="2871">
 <summary>
 Delete unlabeled symbolic links.
 </summary>
@@ -86010,7 +86600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="2853">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="2889">
 <summary>
 Create, read, write, and delete unlabeled symbolic links.
 </summary>
@@ -86020,7 +86610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2872">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2908">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled symbolic links.
@@ -86031,7 +86621,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2891">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2927">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled named pipes.
@@ -86042,7 +86632,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2910">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2946">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled named sockets.
@@ -86053,7 +86643,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2929">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2965">
 <summary>
 Do not audit attempts by caller to get attributes for
 unlabeled block devices.
@@ -86064,7 +86654,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="2947">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="2983">
 <summary>
 Read and write unlabeled block device nodes.
 </summary>
@@ -86074,7 +86664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="2965">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="3001">
 <summary>
 Delete unlabeled block device nodes.
 </summary>
@@ -86084,7 +86674,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="2983">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="3019">
 <summary>
 Create, read, write, and delete unlabeled block device nodes.
 </summary>
@@ -86094,7 +86684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3002">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3038">
 <summary>
 Do not audit attempts by caller to get attributes for
 unlabeled character devices.
@@ -86105,7 +86695,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3021">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3057">
 <summary>
 Do not audit attempts to
 write unlabeled character devices.
@@ -86116,7 +86706,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="3039">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3075">
 <summary>
 Delete unlabeled character device nodes.
 </summary>
@@ -86126,7 +86716,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="3058">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3094">
 <summary>
 Create, read, write, and delete unlabeled character device nodes.
 </summary>
@@ -86136,7 +86726,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3076">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3112">
 <summary>
 Allow caller to relabel unlabeled directories.
 </summary>
@@ -86146,7 +86736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3094">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3130">
 <summary>
 Allow caller to relabel unlabeled files.
 </summary>
@@ -86156,7 +86746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3113">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3149">
 <summary>
 Allow caller to relabel unlabeled symbolic links.
 </summary>
@@ -86166,7 +86756,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3132">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3168">
 <summary>
 Allow caller to relabel unlabeled named pipes.
 </summary>
@@ -86176,7 +86766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3151">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3187">
 <summary>
 Delete unlabeled named pipes
 </summary>
@@ -86186,7 +86776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3169">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3205">
 <summary>
 Allow caller to relabel unlabeled named sockets.
 </summary>
@@ -86196,7 +86786,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3188">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3224">
 <summary>
 Delete unlabeled named sockets.
 </summary>
@@ -86206,7 +86796,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3220">
+<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3242">
+<summary>
+Allow caller to relabel from unlabeled block devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3260">
+<summary>
+Allow caller to relabel from unlabeled character devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3293">
 <summary>
 Send and receive messages from an
 unlabeled IPSEC association.
@@ -86217,7 +86827,7 @@ Send and receive messages from an
 unlabeled IPSEC association.  Network
 connections that are not protected
 by IPSEC have use an unlabeled
-assocation.
+association.
 </p>
 <p>
 The corenetwork interface
@@ -86231,7 +86841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3253">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3326">
 <summary>
 Do not audit attempts to send and receive messages
 from an	unlabeled IPSEC association.
@@ -86242,7 +86852,7 @@ Do not audit attempts to send and receive messages
 from an	unlabeled IPSEC association.  Network
 connections that are not protected
 by IPSEC have use an unlabeled
-assocation.
+association.
 </p>
 <p>
 The corenetwork interface
@@ -86256,7 +86866,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3280">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3353">
 <summary>
 Receive TCP packets from an unlabeled connection.
 </summary>
@@ -86275,7 +86885,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3309">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3382">
 <summary>
 Do not audit attempts to receive TCP packets from an unlabeled
 connection.
@@ -86296,7 +86906,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3336">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3409">
 <summary>
 Receive UDP packets from an unlabeled connection.
 </summary>
@@ -86315,7 +86925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3365">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3438">
 <summary>
 Do not audit attempts to receive UDP packets from an unlabeled
 connection.
@@ -86336,7 +86946,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3392">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3465">
 <summary>
 Receive Raw IP packets from an unlabeled connection.
 </summary>
@@ -86355,7 +86965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3421">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3494">
 <summary>
 Do not audit attempts to receive Raw IP packets from an unlabeled
 connection.
@@ -86376,7 +86986,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3451">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3524">
 <summary>
 Send and receive unlabeled packets.
 </summary>
@@ -86398,7 +87008,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3479">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3552">
 <summary>
 Receive packets from an unlabeled peer.
 </summary>
@@ -86418,7 +87028,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3507">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3580">
 <summary>
 Do not audit attempts to receive packets from an unlabeled peer.
 </summary>
@@ -86438,7 +87048,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3525">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3598">
 <summary>
 Relabel from unlabeled database objects.
 </summary>
@@ -86448,7 +87058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unconfined" lineno="3562">
+<interface name="kernel_unconfined" lineno="3635">
 <summary>
 Unconfined access to kernel module resources.
 </summary>
@@ -86458,7 +87068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3582">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3655">
 <summary>
 Read virtual memory overcommit sysctl.
 </summary>
@@ -86469,7 +87079,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3602">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3675">
 <summary>
 Read and write virtual memory overcommit sysctl.
 </summary>
@@ -86480,7 +87090,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3621">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3694">
 <summary>
 Access unlabeled infiniband pkeys.
 </summary>
@@ -86490,7 +87100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3639">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3712">
 <summary>
 Manage subnet on unlabeled Infiniband endports.
 </summary>
@@ -87112,7 +87722,7 @@ Domain allowed access.
 <interface name="mls_fd_share_all_levels" lineno="841">
 <summary>
 Make the file descriptors from the
-specifed domain inheritable by
+specified domain inheritable by
 all levels.
 </summary>
 <param name="domain">
@@ -87122,19 +87732,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_context_translate_all_levels" lineno="861">
-<summary>
-Make specified domain MLS trusted
-for translating contexts at all levels.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="mls_db_read_all_levels" lineno="877">
+<interface name="mls_db_read_all_levels" lineno="861">
 <summary>
 Make specified domain MLS trusted
 for reading from databases at any level.
@@ -87146,7 +87744,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_db_write_all_levels" lineno="897">
+<interface name="mls_db_write_all_levels" lineno="881">
 <summary>
 Make specified domain MLS trusted
 for writing to databases at any level.
@@ -87158,7 +87756,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_db_upgrade" lineno="917">
+<interface name="mls_db_upgrade" lineno="901">
 <summary>
 Make specified domain MLS trusted
 for raising the level of databases.
@@ -87170,7 +87768,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_db_downgrade" lineno="937">
+<interface name="mls_db_downgrade" lineno="921">
 <summary>
 Make specified domain MLS trusted
 for lowering the level of databases.
@@ -87182,7 +87780,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_dbus_send_all_levels" lineno="957">
+<interface name="mls_dbus_send_all_levels" lineno="941">
 <summary>
 Make specified domain MLS trusted
 for sending dbus messages to
@@ -87195,7 +87793,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mls_dbus_recv_all_levels" lineno="978">
+<interface name="mls_dbus_recv_all_levels" lineno="962">
 <summary>
 Make specified domain MLS trusted
 for receiving dbus messages from
@@ -87455,7 +88053,19 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_set_parameters" lineno="469">
+<interface name="selinux_get_all_booleans" lineno="459">
+<summary>
+Allow caller to get the state of all Booleans to
+view conditional portions of the policy.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="selinux_set_parameters" lineno="493">
 <summary>
 Allow caller to set SELinux access vector cache parameters.
 </summary>
@@ -87477,7 +88087,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_validate_context" lineno="488">
+<interface name="selinux_validate_context" lineno="512">
 <summary>
 Allows caller to validate security contexts.
 </summary>
@@ -87488,7 +88098,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_dontaudit_validate_context" lineno="510">
+<interface name="selinux_dontaudit_validate_context" lineno="534">
 <summary>
 Do not audit attempts to validate security contexts.
 </summary>
@@ -87499,7 +88109,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_access_vector" lineno="531">
+<interface name="selinux_compute_access_vector" lineno="555">
 <summary>
 Allows caller to compute an access vector.
 </summary>
@@ -87510,7 +88120,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_create_context" lineno="554">
+<interface name="selinux_compute_create_context" lineno="578">
 <summary>
 Calculate the default type for object creation.
 </summary>
@@ -87521,7 +88131,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_member" lineno="576">
+<interface name="selinux_compute_member" lineno="600">
 <summary>
 Allows caller to compute polyinstatntiated
 directory members.
@@ -87532,7 +88142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_compute_relabel_context" lineno="606">
+<interface name="selinux_compute_relabel_context" lineno="630">
 <summary>
 Calculate the context for relabeling objects.
 </summary>
@@ -87551,7 +88161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_compute_user_contexts" lineno="627">
+<interface name="selinux_compute_user_contexts" lineno="651">
 <summary>
 Allows caller to compute possible contexts for a user.
 </summary>
@@ -87561,17 +88171,28 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_map_security_files" lineno="649">
+<interface name="selinux_use_status_page" lineno="673">
 <summary>
-Allows caller to map secuirty_t files.
+Allows the caller to use the SELinux status page.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<rolecap/>
 </interface>
-<interface name="selinux_unconfined" lineno="668">
+<interface name="selinux_map_security_files" lineno="694">
+<summary>
+Allows caller to map secuirty_t files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="selinux_unconfined" lineno="715">
 <summary>
 Unconfined access to the SELinux kernel security server.
 </summary>
@@ -87794,7 +88415,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_fuse_dev" lineno="378">
+<interface name="storage_watch_fixed_disk" lineno="377">
+<summary>
+Watch fixed disk device nodes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="storage_getattr_fuse_dev" lineno="398">
 <summary>
 Allow the caller to get the attributes
 of device nodes of fuse devices.
@@ -87805,7 +88436,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_rw_fuse" lineno="397">
+<interface name="storage_rw_fuse" lineno="417">
 <summary>
 read or write fuse device interfaces.
 </summary>
@@ -87815,7 +88446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="416">
+<interface name="storage_dontaudit_rw_fuse" lineno="436">
 <summary>
 Do not audit attempts to read or write
 fuse device interfaces.
@@ -87826,7 +88457,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="435">
+<interface name="storage_getattr_scsi_generic_dev" lineno="455">
 <summary>
 Allow the caller to get the attributes of
 the generic SCSI interface device nodes.
@@ -87837,7 +88468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="455">
+<interface name="storage_setattr_scsi_generic_dev" lineno="475">
 <summary>
 Allow the caller to set the attributes of
 the generic SCSI interface device nodes.
@@ -87848,7 +88479,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_read_scsi_generic" lineno="478">
+<interface name="storage_read_scsi_generic" lineno="498">
 <summary>
 Allow the caller to directly read, in a
 generic fashion, from any SCSI device.
@@ -87862,7 +88493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_write_scsi_generic" lineno="503">
+<interface name="storage_write_scsi_generic" lineno="523">
 <summary>
 Allow the caller to directly write, in a
 generic fashion, from any SCSI device.
@@ -87876,10 +88507,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="525">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545">
 <summary>
 Set attributes of the device nodes
-for the SCSI generic inerface.
+for the SCSI generic interface.
 </summary>
 <param name="domain">
 <summary>
@@ -87887,7 +88518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="545">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="565">
 <summary>
 Do not audit attempts to read or write
 SCSI generic device interfaces.
@@ -87898,7 +88529,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_removable_dev" lineno="564">
+<interface name="storage_getattr_removable_dev" lineno="584">
 <summary>
 Allow the caller to get the attributes of removable
 devices device nodes.
@@ -87909,7 +88540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="584">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="604">
 <summary>
 Do not audit attempts made by the caller to get
 the attributes of removable devices device nodes.
@@ -87920,7 +88551,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="603">
+<interface name="storage_dontaudit_read_removable_device" lineno="623">
 <summary>
 Do not audit attempts made by the caller to read
 removable devices device nodes.
@@ -87931,7 +88562,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="623">
+<interface name="storage_dontaudit_write_removable_device" lineno="643">
 <summary>
 Do not audit attempts made by the caller to write
 removable devices device nodes.
@@ -87942,7 +88573,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_removable_dev" lineno="642">
+<interface name="storage_setattr_removable_dev" lineno="662">
 <summary>
 Allow the caller to set the attributes of removable
 devices device nodes.
@@ -87953,7 +88584,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="662">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="682">
 <summary>
 Do not audit attempts made by the caller to set
 the attributes of removable devices device nodes.
@@ -87964,7 +88595,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_read_removable_device" lineno="684">
+<interface name="storage_raw_read_removable_device" lineno="704">
 <summary>
 Allow the caller to directly read from
 a removable device.
@@ -87978,7 +88609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="703">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="723">
 <summary>
 Do not audit attempts to directly read removable devices.
 </summary>
@@ -87988,7 +88619,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_write_removable_device" lineno="725">
+<interface name="storage_raw_write_removable_device" lineno="745">
 <summary>
 Allow the caller to directly write to
 a removable device.
@@ -88002,7 +88633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="744">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="764">
 <summary>
 Do not audit attempts to directly write removable devices.
 </summary>
@@ -88012,7 +88643,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_read_tape" lineno="763">
+<interface name="storage_read_tape" lineno="783">
 <summary>
 Allow the caller to directly read
 a tape device.
@@ -88023,7 +88654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_write_tape" lineno="783">
+<interface name="storage_write_tape" lineno="803">
 <summary>
 Allow the caller to directly write
 a tape device.
@@ -88034,7 +88665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_tape_dev" lineno="803">
+<interface name="storage_getattr_tape_dev" lineno="823">
 <summary>
 Allow the caller to get the attributes
 of device nodes of tape devices.
@@ -88045,7 +88676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_tape_dev" lineno="823">
+<interface name="storage_setattr_tape_dev" lineno="843">
 <summary>
 Allow the caller to set the attributes
 of device nodes of tape devices.
@@ -88056,7 +88687,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_unconfined" lineno="842">
+<interface name="storage_unconfined" lineno="862">
 <summary>
 Unconfined access to storage devices.
 </summary>
@@ -88156,7 +88787,7 @@ The type of the process creating the directory.
 </summary>
 </param>
 </interface>
-<interface name="term_create_pty" lineno="184">
+<interface name="term_create_pty" lineno="185">
 <summary>
 Create a pty in the /dev/pts directory.
 </summary>
@@ -88171,7 +88802,7 @@ The type of the pty.
 </summary>
 </param>
 </interface>
-<interface name="term_write_all_terms" lineno="210">
+<interface name="term_write_all_terms" lineno="211">
 <summary>
 Write the console, all
 ttys and all ptys.
@@ -88183,7 +88814,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_use_all_terms" lineno="233">
+<interface name="term_use_all_terms" lineno="234">
 <summary>
 Read and write the console, all
 ttys and all ptys.
@@ -88195,7 +88826,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_write_console" lineno="255">
+<interface name="term_write_console" lineno="256">
 <summary>
 Write to the console.
 </summary>
@@ -88206,7 +88837,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_read_console" lineno="275">
+<interface name="term_read_console" lineno="276">
 <summary>
 Read from the console.
 </summary>
@@ -88217,7 +88848,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_read_console" lineno="295">
+<interface name="term_dontaudit_read_console" lineno="296">
 <summary>
 Do not audit attempts to read from the console.
 </summary>
@@ -88228,7 +88859,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_use_console" lineno="314">
+<interface name="term_use_console" lineno="315">
 <summary>
 Read from and write to the console.
 </summary>
@@ -88239,9 +88870,9 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_use_console" lineno="334">
+<interface name="term_dontaudit_use_console" lineno="335">
 <summary>
-Do not audit attemtps to read from
+Do not audit attempts to read from
 or write to the console.
 </summary>
 <param name="domain">
@@ -88250,7 +88881,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_console" lineno="354">
+<interface name="term_setattr_console" lineno="355">
 <summary>
 Set the attributes of the console
 device node.
@@ -88262,7 +88893,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_relabel_console" lineno="373">
+<interface name="term_relabel_console" lineno="374">
 <summary>
 Relabel from and to the console type.
 </summary>
@@ -88272,7 +88903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_create_console_dev" lineno="392">
+<interface name="term_create_console_dev" lineno="393">
 <summary>
 Create the console device (/dev/console).
 </summary>
@@ -88282,7 +88913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_pty_fs" lineno="412">
+<interface name="term_getattr_pty_fs" lineno="413">
 <summary>
 Get the attributes of a pty filesystem
 </summary>
@@ -88292,7 +88923,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_relabel_pty_fs" lineno="430">
+<interface name="term_relabel_pty_fs" lineno="431">
 <summary>
 Relabel from and to pty filesystem.
 </summary>
@@ -88302,7 +88933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_pty_dirs" lineno="450">
+<interface name="term_getattr_pty_dirs" lineno="451">
 <summary>
 Get the attributes of the
 /dev/pts directory.
@@ -88313,7 +88944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_getattr_pty_dirs" lineno="469">
+<interface name="term_dontaudit_getattr_pty_dirs" lineno="470">
 <summary>
 Do not audit attempts to get the
 attributes of the /dev/pts directory.
@@ -88324,7 +88955,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_search_ptys" lineno="487">
+<interface name="term_search_ptys" lineno="488">
 <summary>
 Search the contents of the /dev/pts directory.
 </summary>
@@ -88334,7 +88965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_search_ptys" lineno="507">
+<interface name="term_dontaudit_search_ptys" lineno="508">
 <summary>
 Do not audit attempts to search the
 contents of the /dev/pts directory.
@@ -88345,7 +88976,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_list_ptys" lineno="527">
+<interface name="term_list_ptys" lineno="528">
 <summary>
 Read the /dev/pts directory to
 list all ptys.
@@ -88356,7 +88987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_list_ptys" lineno="547">
+<interface name="term_dontaudit_list_ptys" lineno="548">
 <summary>
 Do not audit attempts to read the
 /dev/pts directory.
@@ -88367,7 +88998,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_manage_pty_dirs" lineno="566">
+<interface name="term_dontaudit_manage_pty_dirs" lineno="567">
 <summary>
 Do not audit attempts to create, read,
 write, or delete the /dev/pts directory.
@@ -88378,7 +89009,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_relabel_pty_dirs" lineno="584">
+<interface name="term_relabel_pty_dirs" lineno="585">
 <summary>
 Relabel from and to pty directories.
 </summary>
@@ -88388,7 +89019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_generic_ptys" lineno="603">
+<interface name="term_getattr_generic_ptys" lineno="604">
 <summary>
 Get the attributes of generic pty devices.
 </summary>
@@ -88398,7 +89029,7 @@ Domain to allow
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_getattr_generic_ptys" lineno="622">
+<interface name="term_dontaudit_getattr_generic_ptys" lineno="623">
 <summary>
 Do not audit attempts to get the attributes
 of generic pty devices.
@@ -88409,7 +89040,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_ioctl_generic_ptys" lineno="640">
+<interface name="term_ioctl_generic_ptys" lineno="641">
 <summary>
 ioctl of generic pty devices.
 </summary>
@@ -88430,7 +89061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_setattr_generic_ptys" lineno="682">
+<interface name="term_dontaudit_setattr_generic_ptys" lineno="681">
 <summary>
 Dontaudit setting the attributes of
 generic pty devices.
@@ -88441,7 +89072,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_use_generic_ptys" lineno="702">
+<interface name="term_use_generic_ptys" lineno="701">
 <summary>
 Read and write the generic pty
 type.  This is generally only used in
@@ -88453,7 +89084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_use_generic_ptys" lineno="724">
+<interface name="term_dontaudit_use_generic_ptys" lineno="723">
 <summary>
 Dot not audit attempts to read and
 write the generic pty type.  This is
@@ -88465,7 +89096,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_controlling_term" lineno="742">
+<interface name="term_create_controlling_term" lineno="741">
+<summary>
+Create the tty device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_setattr_controlling_term" lineno="762">
 <summary>
 Set the attributes of the tty device
 </summary>
@@ -88475,7 +89116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_use_controlling_term" lineno="762">
+<interface name="term_use_controlling_term" lineno="782">
 <summary>
 Read and write the controlling
 terminal (/dev/tty).
@@ -88486,7 +89127,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_ptmx" lineno="781">
+<interface name="term_create_ptmx" lineno="801">
+<summary>
+Create the pty multiplexor (/dev/ptmx).
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="term_getattr_ptmx" lineno="821">
 <summary>
 Get the attributes of the pty multiplexor (/dev/ptmx).
 </summary>
@@ -88496,7 +89147,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_getattr_ptmx" lineno="800">
+<interface name="term_dontaudit_getattr_ptmx" lineno="840">
 <summary>
 Do not audit attempts to get attributes
 on the pty multiplexor (/dev/ptmx).
@@ -88507,7 +89158,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_use_ptmx" lineno="818">
+<interface name="term_use_ptmx" lineno="858">
 <summary>
 Read and write the pty multiplexor (/dev/ptmx).
 </summary>
@@ -88517,7 +89168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_use_ptmx" lineno="838">
+<interface name="term_dontaudit_use_ptmx" lineno="878">
 <summary>
 Do not audit attempts to read and
 write the pty multiplexor (/dev/ptmx).
@@ -88528,7 +89179,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_all_ptys" lineno="858">
+<interface name="term_getattr_all_ptys" lineno="898">
 <summary>
 Get the attributes of all
 pty device nodes.
@@ -88540,7 +89191,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_getattr_all_ptys" lineno="881">
+<interface name="term_dontaudit_getattr_all_ptys" lineno="921">
 <summary>
 Do not audit attempts to get the
 attributes of any pty
@@ -88552,7 +89203,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_all_ptys" lineno="901">
+<interface name="term_setattr_all_ptys" lineno="941">
 <summary>
 Set the attributes of all
 pty device nodes.
@@ -88564,7 +89215,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_relabelto_all_ptys" lineno="922">
+<interface name="term_relabelto_all_ptys" lineno="962">
 <summary>
 Relabel to all ptys.
 </summary>
@@ -88574,7 +89225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_write_all_ptys" lineno="940">
+<interface name="term_write_all_ptys" lineno="980">
 <summary>
 Write to all ptys.
 </summary>
@@ -88584,7 +89235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_use_all_ptys" lineno="960">
+<interface name="term_use_all_ptys" lineno="1000">
 <summary>
 Read and write all ptys.
 </summary>
@@ -88595,7 +89246,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_use_all_ptys" lineno="981">
+<interface name="term_dontaudit_use_all_ptys" lineno="1021">
 <summary>
 Do not audit attempts to read or write any ptys.
 </summary>
@@ -88605,7 +89256,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_relabel_all_ptys" lineno="999">
+<interface name="term_relabel_all_ptys" lineno="1039">
 <summary>
 Relabel from and to all pty device nodes.
 </summary>
@@ -88615,7 +89266,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_unallocated_ttys" lineno="1021">
+<interface name="term_getattr_unallocated_ttys" lineno="1061">
 <summary>
 Get the attributes of all unallocated
 tty device nodes.
@@ -88627,7 +89278,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_setattr_unlink_unallocated_ttys" lineno="1041">
+<interface name="term_setattr_unlink_unallocated_ttys" lineno="1081">
 <summary>
 Setattr and unlink unallocated tty device nodes.
 </summary>
@@ -88638,7 +89289,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1061">
+<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1101">
 <summary>
 Do not audit attempts to get the attributes
 of all unallocated tty device nodes.
@@ -88649,7 +89300,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_unallocated_ttys" lineno="1081">
+<interface name="term_setattr_unallocated_ttys" lineno="1121">
 <summary>
 Set the attributes of all unallocated
 tty device nodes.
@@ -88661,7 +89312,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1101">
+<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1141">
 <summary>
 Do not audit attempts to set the attributes
 of unallocated tty device nodes.
@@ -88672,7 +89323,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1120">
+<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1160">
 <summary>
 Do not audit attempts to ioctl
 unallocated tty device nodes.
@@ -88683,7 +89334,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_relabel_unallocated_ttys" lineno="1139">
+<interface name="term_relabel_unallocated_ttys" lineno="1179">
 <summary>
 Relabel from and to the unallocated
 tty type.
@@ -88694,7 +89345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_reset_tty_labels" lineno="1159">
+<interface name="term_reset_tty_labels" lineno="1199">
 <summary>
 Relabel from all user tty types to
 the unallocated tty type.
@@ -88705,7 +89356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_append_unallocated_ttys" lineno="1180">
+<interface name="term_append_unallocated_ttys" lineno="1220">
 <summary>
 Append to unallocated ttys.
 </summary>
@@ -88715,7 +89366,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_write_unallocated_ttys" lineno="1199">
+<interface name="term_write_unallocated_ttys" lineno="1239">
 <summary>
 Write to unallocated ttys.
 </summary>
@@ -88725,7 +89376,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_use_unallocated_ttys" lineno="1219">
+<interface name="term_use_unallocated_ttys" lineno="1259">
 <summary>
 Read and write unallocated ttys.
 </summary>
@@ -88736,7 +89387,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_use_unallocated_ttys" lineno="1239">
+<interface name="term_dontaudit_use_unallocated_ttys" lineno="1279">
 <summary>
 Do not audit attempts to read or
 write unallocated ttys.
@@ -88747,7 +89398,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_all_ttys" lineno="1258">
+<interface name="term_getattr_all_ttys" lineno="1298">
 <summary>
 Get the attributes of all tty device nodes.
 </summary>
@@ -88758,7 +89409,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_getattr_all_ttys" lineno="1278">
+<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
 <summary>
 Do not audit attempts to get the
 attributes of any tty device nodes.
@@ -88769,7 +89420,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_all_ttys" lineno="1298">
+<interface name="term_setattr_all_ttys" lineno="1338">
 <summary>
 Set the attributes of all tty device nodes.
 </summary>
@@ -88780,7 +89431,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_relabel_all_ttys" lineno="1317">
+<interface name="term_relabel_all_ttys" lineno="1357">
 <summary>
 Relabel from and to all tty device nodes.
 </summary>
@@ -88790,7 +89441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_write_all_ttys" lineno="1336">
+<interface name="term_write_all_ttys" lineno="1376">
 <summary>
 Write to all ttys.
 </summary>
@@ -88800,7 +89451,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_use_all_ttys" lineno="1356">
+<interface name="term_use_all_ttys" lineno="1396">
 <summary>
 Read and write all ttys.
 </summary>
@@ -88811,7 +89462,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_use_all_ttys" lineno="1376">
+<interface name="term_dontaudit_use_all_ttys" lineno="1416">
 <summary>
 Do not audit attempts to read or write
 any ttys.
@@ -88822,7 +89473,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_use_virtio_console" lineno="1394">
+<interface name="term_use_virtio_console" lineno="1434">
 <summary>
 Read from and write virtio console.
 </summary>
@@ -89044,7 +89695,7 @@ generic user files.
 </tunable>
 </module>
 <module name="guest" filename="policy/modules/roles/guest.if">
-<summary>Least privledge terminal user role.</summary>
+<summary>Least privilege terminal user role.</summary>
 <interface name="guest_role_change" lineno="14">
 <summary>
 Change to the guest role.
@@ -89189,7 +89840,7 @@ Role allowed access.
 </module>
 <module name="sysadm" filename="policy/modules/roles/sysadm.if">
 <summary>General system administration role</summary>
-<interface name="sysadm_role_change" lineno="14">
+<interface name="sysadm_role_change" lineno="19">
 <summary>
 Change to the system administrator role.
 </summary>
@@ -89198,9 +89849,14 @@ Change to the system administrator role.
 Role allowed access.
 </summary>
 </param>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
 <rolecap/>
 </interface>
-<interface name="sysadm_role_change_to" lineno="44">
+<interface name="sysadm_role_change_to" lineno="54">
 <summary>
 Change from the system administrator role.
 </summary>
@@ -89222,7 +89878,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysadm_shell_domtrans" lineno="62">
+<interface name="sysadm_shell_domtrans" lineno="72">
 <summary>
 Execute a shell in the sysadm domain.
 </summary>
@@ -89232,7 +89888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_bin_spec_domtrans" lineno="83">
+<interface name="sysadm_bin_spec_domtrans" lineno="93">
 <summary>
 Execute a generic bin program in the sysadm domain.
 </summary>
@@ -89242,7 +89898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_entry_spec_domtrans" lineno="106">
+<interface name="sysadm_entry_spec_domtrans" lineno="116">
 <summary>
 Execute all entrypoint files in the sysadm domain. This
 is an explicit transition, requiring the
@@ -89254,7 +89910,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_entry_spec_domtrans_to" lineno="141">
+<interface name="sysadm_entry_spec_domtrans_to" lineno="151">
 <summary>
 Allow sysadm to execute all entrypoint files in
 a specified domain.  This is an explicit transition,
@@ -89278,7 +89934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_bin_spec_domtrans_to" lineno="175">
+<interface name="sysadm_bin_spec_domtrans_to" lineno="185">
 <summary>
 Allow sysadm to execute a generic bin program in
 a specified domain.  This is an explicit transition,
@@ -89301,7 +89957,7 @@ Domain to execute in.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_sigchld" lineno="196">
+<interface name="sysadm_sigchld" lineno="206">
 <summary>
 Send a SIGCHLD signal to sysadm users.
 </summary>
@@ -89311,7 +89967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_use_fds" lineno="214">
+<interface name="sysadm_use_fds" lineno="224">
 <summary>
 Inherit and use sysadm file descriptors
 </summary>
@@ -89321,7 +89977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysadm_rw_pipes" lineno="232">
+<interface name="sysadm_rw_pipes" lineno="242">
 <summary>
 Read and write sysadm user unnamed pipes.
 </summary>
@@ -89338,6 +89994,14 @@ Allow sysadm to debug or ptrace all processes.
 </p>
 </desc>
 </tunable>
+<tunable name="sysadm_allow_rw_inherited_fifo" dftval="false">
+<desc>
+<p>
+Allow sysadm to read/write to fifo files inherited from
+a domain allowed to change role.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="unprivuser" filename="policy/modules/roles/unprivuser.if">
 <summary>Generic unprivileged user role</summary>
@@ -89428,7 +90092,7 @@ read generic user files.
 </tunable>
 </module>
 <module name="xguest" filename="policy/modules/roles/xguest.if">
-<summary>Least privledge xwindows user role.</summary>
+<summary>Least privilege xwindows user role.</summary>
 <interface name="xguest_role_change" lineno="14">
 <summary>
 Change to the xguest role.
@@ -89618,7 +90282,18 @@ Domain allowed access.
 </interface>
 <interface name="abrt_read_pid_files" lineno="234">
 <summary>
-Read abrt PID files.
+Read abrt PID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="abrt_manage_pid_files" lineno="249">
+<summary>
+Create, read, write, and delete
+abrt PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -89626,10 +90301,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="abrt_manage_pid_files" lineno="254">
+<interface name="abrt_manage_runtime_files" lineno="265">
 <summary>
 Create, read, write, and delete
-abrt PID files.
+abrt runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -89637,7 +90312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="abrt_admin" lineno="280">
+<interface name="abrt_admin" lineno="291">
 <summary>
 All of the rules required to
 administrate an abrt environment,
@@ -89950,7 +90625,7 @@ Domain allowed to transition.
 </interface>
 <interface name="aiccu_read_pid_files" lineno="50">
 <summary>
-Read aiccu PID files.
+Read aiccu PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -89958,7 +90633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="aiccu_admin" lineno="76">
+<interface name="aiccu_admin" lineno="71">
 <summary>
 All of the rules required to
 administrate an aiccu environment.
@@ -90129,7 +90804,17 @@ Domain allowed access.
 </interface>
 <interface name="amavis_setattr_pid_files" lineno="184">
 <summary>
-Set attributes of amavis pid files.
+Set attributes of amavis pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="amavis_create_pid_files" lineno="199">
+<summary>
+Create amavis pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -90137,9 +90822,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="amavis_create_pid_files" lineno="203">
+<interface name="amavis_setattr_runtime_files" lineno="214">
 <summary>
-Create amavis pid files.
+Set attributes of amavis runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -90147,7 +90832,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="amavis_admin" lineno="230">
+<interface name="amavis_create_runtime_files" lineno="233">
+<summary>
+Create amavis runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="amavis_admin" lineno="259">
 <summary>
 All of the rules required to
 administrate an amavis environment.
@@ -90186,7 +90881,7 @@ The prefix to be used for deriving type names.
 </summary>
 </param>
 </template>
-<interface name="apache_role" lineno="118">
+<interface name="apache_role" lineno="120">
 <summary>
 Role access for apache.
 </summary>
@@ -90201,7 +90896,7 @@ User domain for the role.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_user_scripts" lineno="173">
+<interface name="apache_read_user_scripts" lineno="175">
 <summary>
 Read user httpd script executable files.
 </summary>
@@ -90211,7 +90906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_user_content" lineno="193">
+<interface name="apache_read_user_content" lineno="195">
 <summary>
 Read user httpd content.
 </summary>
@@ -90221,7 +90916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans" lineno="213">
+<interface name="apache_domtrans" lineno="215">
 <summary>
 Execute httpd with a domain transition.
 </summary>
@@ -90231,7 +90926,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_initrc_domtrans" lineno="232">
+<interface name="apache_initrc_domtrans" lineno="234">
 <summary>
 Execute httpd server in the httpd domain.
 </summary>
@@ -90241,7 +90936,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_signal" lineno="250">
+<interface name="apache_signal" lineno="252">
 <summary>
 Send generic signals to httpd.
 </summary>
@@ -90251,7 +90946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_signull" lineno="268">
+<interface name="apache_signull" lineno="270">
 <summary>
 Send null signals to httpd.
 </summary>
@@ -90261,7 +90956,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_sigchld" lineno="286">
+<interface name="apache_sigchld" lineno="288">
 <summary>
 Send child terminated signals to httpd.
 </summary>
@@ -90271,7 +90966,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_use_fds" lineno="305">
+<interface name="apache_use_fds" lineno="307">
 <summary>
 Inherit and use file descriptors
 from httpd.
@@ -90282,7 +90977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_fifo_file" lineno="324">
+<interface name="apache_dontaudit_rw_fifo_file" lineno="326">
 <summary>
 Do not audit attempts to read and
 write httpd unnamed pipes.
@@ -90293,7 +90988,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_stream_sockets" lineno="343">
+<interface name="apache_dontaudit_rw_stream_sockets" lineno="345">
 <summary>
 Do not audit attempts to read and
 write httpd unix domain stream sockets.
@@ -90304,7 +90999,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_rw_stream_sockets" lineno="362">
+<interface name="apache_rw_stream_sockets" lineno="364">
 <summary>
 Read and write httpd unix domain
 stream sockets.
@@ -90315,7 +91010,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_tcp_sockets" lineno="381">
+<interface name="apache_dontaudit_rw_tcp_sockets" lineno="383">
 <summary>
 Do not audit attempts to read and
 write httpd TCP sockets.
@@ -90326,7 +91021,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_reload" lineno="399">
+<interface name="apache_reload" lineno="401">
 <summary>
 Reload the httpd service (systemd).
 </summary>
@@ -90336,7 +91031,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_ra_content" lineno="418">
+<interface name="apache_read_all_ra_content" lineno="420">
 <summary>
 Read all appendable content
 </summary>
@@ -90346,7 +91041,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_append_all_ra_content" lineno="437">
+<interface name="apache_append_all_ra_content" lineno="439">
 <summary>
 Append to all appendable web content
 </summary>
@@ -90356,7 +91051,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_rw_content" lineno="455">
+<interface name="apache_read_all_rw_content" lineno="457">
 <summary>
 Read all read/write content
 </summary>
@@ -90366,7 +91061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_rw_content" lineno="474">
+<interface name="apache_manage_all_rw_content" lineno="476">
 <summary>
 Manage all read/write content
 </summary>
@@ -90376,7 +91071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_content" lineno="493">
+<interface name="apache_read_all_content" lineno="495">
 <summary>
 Read all web content.
 </summary>
@@ -90386,7 +91081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_all_content" lineno="515">
+<interface name="apache_search_all_content" lineno="517">
 <summary>
 Search all apache content.
 </summary>
@@ -90396,7 +91091,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_content" lineno="535">
+<interface name="apache_list_all_content" lineno="535">
+<summary>
+List all apache content.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="apache_manage_all_content" lineno="555">
 <summary>
 Create, read, write, and delete
 all httpd content.
@@ -90408,7 +91113,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_setattr_cache_dirs" lineno="559">
+<interface name="apache_setattr_cache_dirs" lineno="579">
 <summary>
 Set attributes httpd cache directories.
 </summary>
@@ -90418,7 +91123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_cache" lineno="577">
+<interface name="apache_list_cache" lineno="597">
 <summary>
 List httpd cache directories.
 </summary>
@@ -90428,7 +91133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_rw_cache_files" lineno="595">
+<interface name="apache_rw_cache_files" lineno="615">
 <summary>
 Read and write httpd cache files.
 </summary>
@@ -90438,7 +91143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_cache_dirs" lineno="613">
+<interface name="apache_delete_cache_dirs" lineno="633">
 <summary>
 Delete httpd cache directories.
 </summary>
@@ -90448,7 +91153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_cache_files" lineno="631">
+<interface name="apache_delete_cache_files" lineno="651">
 <summary>
 Delete httpd cache files.
 </summary>
@@ -90458,7 +91163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_config" lineno="650">
+<interface name="apache_read_config" lineno="670">
 <summary>
 Read httpd configuration files.
 </summary>
@@ -90469,7 +91174,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_search_config" lineno="671">
+<interface name="apache_search_config" lineno="691">
 <summary>
 Search httpd configuration directories.
 </summary>
@@ -90479,7 +91184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_config" lineno="691">
+<interface name="apache_manage_config" lineno="711">
 <summary>
 Create, read, write, and delete
 httpd configuration files.
@@ -90490,7 +91195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_helper" lineno="713">
+<interface name="apache_domtrans_helper" lineno="733">
 <summary>
 Execute the Apache helper program
 with a domain transition.
@@ -90501,7 +91206,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_run_helper" lineno="740">
+<interface name="apache_run_helper" lineno="760">
 <summary>
 Execute the Apache helper program with
 a domain transition, and allow the
@@ -90519,7 +91224,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_read_log" lineno="760">
+<interface name="apache_read_log" lineno="780">
 <summary>
 Read httpd log files.
 </summary>
@@ -90530,7 +91235,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_append_log" lineno="781">
+<interface name="apache_append_log" lineno="801">
 <summary>
 Append httpd log files.
 </summary>
@@ -90540,7 +91245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_append_log" lineno="802">
+<interface name="apache_dontaudit_append_log" lineno="822">
 <summary>
 Do not audit attempts to append
 httpd log files.
@@ -90551,7 +91256,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_log" lineno="821">
+<interface name="apache_manage_log" lineno="841">
 <summary>
 Create, read, write, and delete
 httpd log files.
@@ -90562,7 +91267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_write_log" lineno="842">
+<interface name="apache_write_log" lineno="862">
 <summary>
 Write apache log files.
 </summary>
@@ -90572,7 +91277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_search_modules" lineno="862">
+<interface name="apache_dontaudit_search_modules" lineno="882">
 <summary>
 Do not audit attempts to search
 httpd module directories.
@@ -90583,7 +91288,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_modules" lineno="880">
+<interface name="apache_list_modules" lineno="900">
 <summary>
 List httpd module directories.
 </summary>
@@ -90593,7 +91298,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_exec_modules" lineno="898">
+<interface name="apache_exec_modules" lineno="918">
 <summary>
 Execute httpd module files.
 </summary>
@@ -90603,7 +91308,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_module_files" lineno="918">
+<interface name="apache_read_module_files" lineno="938">
 <summary>
 Read httpd module files.
 </summary>
@@ -90613,7 +91318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_rotatelogs" lineno="938">
+<interface name="apache_domtrans_rotatelogs" lineno="958">
 <summary>
 Execute a domain transition to
 run httpd_rotatelogs.
@@ -90624,7 +91329,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_sys_content" lineno="957">
+<interface name="apache_list_sys_content" lineno="977">
 <summary>
 List httpd system content directories.
 </summary>
@@ -90634,7 +91339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_sys_content" lineno="978">
+<interface name="apache_manage_sys_content" lineno="998">
 <summary>
 Create, read, write, and delete
 httpd system content files.
@@ -90646,7 +91351,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_manage_sys_rw_content" lineno="1000">
+<interface name="apache_manage_sys_rw_content" lineno="1020">
 <summary>
 Create, read, write, and delete
 httpd system rw content.
@@ -90657,7 +91362,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_sys_script" lineno="1022">
+<interface name="apache_domtrans_sys_script" lineno="1042">
 <summary>
 Execute all httpd scripts in the
 system script domain.
@@ -90668,7 +91373,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1045">
+<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1065">
 <summary>
 Do not audit attempts to read and
 write httpd system script unix
@@ -90680,7 +91385,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_all_scripts" lineno="1064">
+<interface name="apache_domtrans_all_scripts" lineno="1084">
 <summary>
 Execute all user scripts in the user
 script domain.
@@ -90691,7 +91396,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_run_all_scripts" lineno="1089">
+<interface name="apache_run_all_scripts" lineno="1109">
 <summary>
 Execute all user scripts in the user
 script domain. Add user script domains
@@ -90708,7 +91413,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_squirrelmail_data" lineno="1108">
+<interface name="apache_read_squirrelmail_data" lineno="1128">
 <summary>
 Read httpd squirrelmail data files.
 </summary>
@@ -90718,7 +91423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_append_squirrelmail_data" lineno="1126">
+<interface name="apache_append_squirrelmail_data" lineno="1146">
 <summary>
 Append httpd squirrelmail data files.
 </summary>
@@ -90728,7 +91433,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_sys_content" lineno="1144">
+<interface name="apache_delete_squirrelmail_spool" lineno="1164">
+<summary>
+delete httpd squirrelmail spool files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="apache_search_sys_content" lineno="1182">
 <summary>
 Search httpd system content.
 </summary>
@@ -90738,7 +91453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_sys_content" lineno="1163">
+<interface name="apache_read_sys_content" lineno="1201">
 <summary>
 Read httpd system content.
 </summary>
@@ -90748,7 +91463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_sys_scripts" lineno="1183">
+<interface name="apache_search_sys_scripts" lineno="1221">
 <summary>
 Search httpd system CGI directories.
 </summary>
@@ -90758,7 +91473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_user_content" lineno="1203">
+<interface name="apache_manage_all_user_content" lineno="1241">
 <summary>
 Create, read, write, and delete all
 user httpd content.
@@ -90770,7 +91485,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_search_sys_script_state" lineno="1224">
+<interface name="apache_search_sys_script_state" lineno="1262">
 <summary>
 Search system script state directories.
 </summary>
@@ -90780,7 +91495,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_tmp_files" lineno="1242">
+<interface name="apache_read_tmp_files" lineno="1280">
 <summary>
 Read httpd tmp files.
 </summary>
@@ -90790,7 +91505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_write_tmp_files" lineno="1262">
+<interface name="apache_dontaudit_write_tmp_files" lineno="1300">
 <summary>
 Do not audit attempts to write
 httpd tmp files.
@@ -90801,7 +91516,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_lib_files" lineno="1280">
+<interface name="apache_delete_lib_files" lineno="1318">
 <summary>
 Delete httpd_var_lib_t files
 </summary>
@@ -90811,7 +91526,7 @@ Domain that can delete the files
 </summary>
 </param>
 </interface>
-<interface name="apache_cgi_domain" lineno="1311">
+<interface name="apache_cgi_domain" lineno="1349">
 <summary>
 Execute CGI in the specified domain.
 </summary>
@@ -90833,7 +91548,7 @@ Type of the executable to enter the cgi domain.
 </summary>
 </param>
 </interface>
-<interface name="apache_admin" lineno="1339">
+<interface name="apache_admin" lineno="1377">
 <summary>
 All of the rules required to
 administrate an apache environment.
@@ -90954,7 +91669,7 @@ with avahi service via dbus.
 <tunable name="httpd_enable_cgi" dftval="false">
 <desc>
 <p>
-Determine wether httpd can use support.
+Determine whether httpd can use support.
 </p>
 </desc>
 </tunable>
@@ -91160,7 +91875,7 @@ Domain allowed to transition.
 </interface>
 <interface name="apcupsd_read_pid_files" lineno="52">
 <summary>
-Read apcupsd PID files.
+Read apcupsd PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91168,7 +91883,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_read_log" lineno="72">
+<interface name="apcupsd_read_log" lineno="67">
 <summary>
 Read apcupsd log files.
 </summary>
@@ -91179,7 +91894,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apcupsd_append_log" lineno="92">
+<interface name="apcupsd_append_log" lineno="87">
 <summary>
 Append apcupsd log files.
 </summary>
@@ -91189,7 +91904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_cgi_script_domtrans" lineno="113">
+<interface name="apcupsd_cgi_script_domtrans" lineno="108">
 <summary>
 Execute a domain transition to
 run httpd_apcupsd_cgi_script.
@@ -91200,7 +91915,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_admin" lineno="143">
+<interface name="apcupsd_admin" lineno="138">
 <summary>
 All of the rules required to
 administrate an apcupsd environment.
@@ -91228,6 +91943,46 @@ be labeled public_content_rw_t.
 </desc>
 </tunable>
 </module>
+<module name="aptcacher" filename="policy/modules/services/aptcacher.if">
+<summary>apt-cacher, cache for Debian APT repositories.</summary>
+<interface name="aptcacher_domtrans_acngtool" lineno="13">
+<summary>
+Execute acngtool in the acngtool domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="aptcacher_run_acngtool" lineno="38">
+<summary>
+Execute acngtool in the acngtool domain, and
+allow the specified role the acngtool domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+<interface name="aptcacher_stream_connect" lineno="58">
+<summary>
+Connect to aptcacher using a unix
+stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
 <module name="arpwatch" filename="policy/modules/services/arpwatch.if">
 <summary>Ethernet activity monitor.</summary>
 <interface name="arpwatch_initrc_domtrans" lineno="14">
@@ -91368,7 +92123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="asterisk_admin" lineno="120">
+<interface name="asterisk_admin" lineno="114">
 <summary>
 All of the rules required to
 administrate an asterisk environment.
@@ -91547,7 +92302,7 @@ Domain allowed access.
 </interface>
 <interface name="avahi_create_pid_dirs" lineno="146">
 <summary>
-Create avahi pid directories.
+Create avahi pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91555,9 +92310,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_setattr_pid_dirs" lineno="165">
+<interface name="avahi_setattr_pid_dirs" lineno="161">
 <summary>
-Set attributes of avahi pid directories.
+Set attributes of avahi pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91565,9 +92320,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_manage_pid_files" lineno="184">
+<interface name="avahi_setattr_runtime_dirs" lineno="176">
 <summary>
-Create, read, and write avahi pid files.
+Set attributes of avahi runtime directories.
 </summary>
 <param name="domain">
 <summary>
@@ -91575,10 +92330,30 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_dontaudit_search_pid" lineno="204">
+<interface name="avahi_create_runtime_dirs" lineno="195">
+<summary>
+Create avahi runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_manage_pid_files" lineno="214">
+<summary>
+Create, read, and write avahi pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_dontaudit_search_pid" lineno="230">
 <summary>
 Do not audit attempts to search
-avahi pid directories.
+avahi pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91586,10 +92361,10 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="avahi_filetrans_pid" lineno="233">
+<interface name="avahi_filetrans_pid" lineno="256">
 <summary>
 Create specified objects in generic
-pid directories with the avahi pid file type.
+pid directories with the avahi pid file type.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91607,7 +92382,49 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="avahi_admin" lineno="258">
+<interface name="avahi_manage_runtime_files" lineno="271">
+<summary>
+Create, read, and write avahi runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_dontaudit_search_runtime" lineno="291">
+<summary>
+Do not audit attempts to search
+avahi runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="avahi_filetrans_runtime" lineno="320">
+<summary>
+Create specified objects in generic
+runtime directories with the avahi runtime file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="avahi_admin" lineno="345">
 <summary>
 All of the rules required to
 administrate an avahi environment.
@@ -91769,7 +92586,7 @@ Domain allowed access.
 </interface>
 <interface name="bind_setattr_pid_dirs" lineno="267">
 <summary>
-Set attributes of bind pid directories.
+Set attributes of bind pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -91777,7 +92594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_setattr_zone_dirs" lineno="285">
+<interface name="bind_setattr_zone_dirs" lineno="281">
 <summary>
 Set attributes of bind zone directories.
 </summary>
@@ -91787,7 +92604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_read_zone" lineno="303">
+<interface name="bind_read_zone" lineno="299">
 <summary>
 Read bind zone files.
 </summary>
@@ -91797,7 +92614,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_manage_zone" lineno="323">
+<interface name="bind_manage_zone" lineno="319">
 <summary>
 Create, read, write, and delete
 bind zone files.
@@ -91808,7 +92625,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_admin" lineno="349">
+<interface name="bind_admin" lineno="345">
 <summary>
 All of the rules required to
 administrate an bind environment.
@@ -92211,6 +93028,37 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="certbot" filename="policy/modules/services/certbot.if">
+<summary>SSL certificate requesting tool certbot AKA letsencrypt.</summary>
+<interface name="certbot_domtrans" lineno="14">
+<summary>
+Execute certbot/letsencrypt in the certbot
+domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="certbot_run" lineno="39">
+<summary>
+Execute certbot/letsencrypt in the certbot
+domain, and allow the specified role
+the firstboot domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+</module>
 <module name="certmaster" filename="policy/modules/services/certmaster.if">
 <summary>Remote certificate distribution framework.</summary>
 <interface name="certmaster_domtrans" lineno="13">
@@ -92318,7 +93166,7 @@ Domain allowed to transition.
 </interface>
 <interface name="certmonger_read_pid_files" lineno="72">
 <summary>
-Read certmonger PID files.
+Read certmonger PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -92326,7 +93174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_search_lib" lineno="91">
+<interface name="certmonger_search_lib" lineno="86">
 <summary>
 Search certmonger lib directories.
 </summary>
@@ -92336,7 +93184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_read_lib_files" lineno="110">
+<interface name="certmonger_read_lib_files" lineno="105">
 <summary>
 Read certmonger lib files.
 </summary>
@@ -92346,7 +93194,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_manage_lib_files" lineno="130">
+<interface name="certmonger_manage_lib_files" lineno="125">
 <summary>
 Create, read, write, and delete
 certmonger lib files.
@@ -92357,7 +93205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_admin" lineno="156">
+<interface name="certmonger_admin" lineno="151">
 <summary>
 All of the rules required to
 administrate an certmonger environment.
@@ -92760,7 +93608,7 @@ Domain allowed access.
 <interface name="clamav_manage_pid_content" lineno="101">
 <summary>
 Create, read, write, and delete
-clamav pid content.
+clamav pid content.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -92768,7 +93616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_read_config" lineno="121">
+<interface name="clamav_read_config" lineno="115">
 <summary>
 Read clamav configuration files.
 </summary>
@@ -92778,7 +93626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_search_lib" lineno="140">
+<interface name="clamav_search_lib" lineno="134">
 <summary>
 Search clamav library directories.
 </summary>
@@ -92788,7 +93636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_domtrans_clamscan" lineno="159">
+<interface name="clamav_domtrans_clamscan" lineno="153">
 <summary>
 Execute a domain transition to run clamscan.
 </summary>
@@ -92798,7 +93646,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="clamav_exec_clamscan" lineno="178">
+<interface name="clamav_exec_clamscan" lineno="172">
 <summary>
 Execute clamscan in the caller domain.
 </summary>
@@ -92808,7 +93656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_read_state_clamd" lineno="197">
+<interface name="clamav_read_state_clamd" lineno="191">
 <summary>
 Read clamd process state files.
 </summary>
@@ -92818,7 +93666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_read_signatures" lineno="225">
+<interface name="clamav_read_signatures" lineno="219">
 <summary>
 Read clam virus signature files
 </summary>
@@ -92835,7 +93683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_scannable_files" lineno="246">
+<interface name="clamav_scannable_files" lineno="240">
 <summary>
 Denote a particular type to be scanned by ClamAV
 </summary>
@@ -92845,7 +93693,7 @@ Type that clamd_t and clamscan_t can read.
 </summary>
 </param>
 </interface>
-<interface name="clamav_domtrans_freshclam" lineno="264">
+<interface name="clamav_domtrans_freshclam" lineno="258">
 <summary>
 Execute a domain transition to run freshclam.
 </summary>
@@ -92855,7 +93703,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="clamav_run_freshclam" lineno="290">
+<interface name="clamav_run_freshclam" lineno="284">
 <summary>
 Execute freshclam in the freshclam domain, and
 allow the specified role the freshclam domain.
@@ -92872,7 +93720,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="clamav_exec_freshclam" lineno="309">
+<interface name="clamav_exec_freshclam" lineno="303">
 <summary>
 Execute freshclam in the caller domain.
 </summary>
@@ -92882,7 +93730,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_enabledisable_clamd" lineno="328">
+<interface name="clamav_enabledisable_clamd" lineno="322">
 <summary>
 Allow specified domain to enable clamd units
 </summary>
@@ -92892,7 +93740,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_startstop_clamd" lineno="347">
+<interface name="clamav_startstop_clamd" lineno="341">
 <summary>
 Allow specified domain to start clamd units
 </summary>
@@ -92902,7 +93750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_status_clamd" lineno="366">
+<interface name="clamav_status_clamd" lineno="360">
 <summary>
 Allow specified domain to get status of clamd
 </summary>
@@ -92912,7 +93760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_reload_clamd" lineno="385">
+<interface name="clamav_reload_clamd" lineno="379">
 <summary>
 Allow specified domain reload of clamd
 </summary>
@@ -92922,7 +93770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_admin" lineno="411">
+<interface name="clamav_admin" lineno="405">
 <summary>
 All of the rules required to
 administrate an clamav environment.
@@ -93054,7 +93902,7 @@ Domain allowed to transition.
 </interface>
 <interface name="cmirrord_read_pid_files" lineno="52">
 <summary>
-Read cmirrord PID files.
+Read cmirrord PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -93062,7 +93910,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cmirrord_rw_shm" lineno="71">
+<interface name="cmirrord_rw_shm" lineno="66">
 <summary>
 Read and write cmirrord shared memory.
 </summary>
@@ -93072,7 +93920,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cmirrord_admin" lineno="101">
+<interface name="cmirrord_admin" lineno="96">
 <summary>
 All of the rules required to
 administrate an cmirrord environment.
@@ -93329,75 +94177,6 @@ to the network using TCP.
 </desc>
 </tunable>
 </module>
-<module name="consolekit" filename="policy/modules/services/consolekit.if">
-<summary>Framework for facilitating multiple user sessions on desktops.</summary>
-<interface name="consolekit_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run consolekit.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_dbus_chat" lineno="33">
-<summary>
-Send and receive messages from
-consolekit over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_use_inhibit_lock" lineno="57">
-<summary>
-Use consolekit inhibit locks.
-
-The program gets passed an FD to a fifo_file to hold.
-When the application is done with the lock, it closes the FD.
-Implements this API: https://www.freedesktop.org/wiki/Software/systemd/inhibit/
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_read_log" lineno="76">
-<summary>
-Read consolekit log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_manage_log" lineno="96">
-<summary>
-Create, read, write, and delete
-consolekit log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_read_pid_files" lineno="115">
-<summary>
-Read consolekit PID files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="consolesetup" filename="policy/modules/services/consolesetup.if">
 <summary>console font and keymap setup program for debian</summary>
 <interface name="consolesetup_domtrans" lineno="13">
@@ -93447,6 +94226,18 @@ Domain allowed access.
 <interface name="consolesetup_pid_filetrans_runtime" lineno="98">
 <summary>
 Create a console-setup directory in
+the runtime directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115">
+<summary>
+Create a console-setup directory in
 the runtime directory.
 </summary>
 <param name="domain">
@@ -93511,7 +94302,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corosync_rw_tmpfs" lineno="110">
+<interface name="corosync_mmap_rw_tmpfs" lineno="110">
+<summary>
+Memmap, read and write corosync tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corosync_rw_tmpfs" lineno="129">
 <summary>
 Read and write corosync tmpfs files.
 </summary>
@@ -93521,7 +94322,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corosync_admin" lineno="136">
+<interface name="corosync_read_state" lineno="148">
+<summary>
+Read process state of corosync.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corosync_admin" lineno="173">
 <summary>
 All of the rules required to
 administrate an corosync environment.
@@ -93573,7 +94384,7 @@ Domain allowed access.
 </interface>
 <interface name="couchdb_read_pid_files" lineno="70">
 <summary>
-Read couchdb pid files.
+Read couchdb pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -93581,7 +94392,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="couchdb_admin" lineno="96">
+<interface name="couchdb_read_runtime_files" lineno="85">
+<summary>
+Read couchdb runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="couchdb_admin" lineno="111">
 <summary>
 All of the rules required to
 administrate an couchdb environment.
@@ -93771,7 +94592,7 @@ User domain for the role.
 <interface name="cron_system_entry" lineno="312">
 <summary>
 Make the specified program domain
-accessable from the system cron jobs.
+accessible from the system cron jobs.
 </summary>
 <param name="domain">
 <summary>
@@ -93961,7 +94782,7 @@ Domain allowed access.
 <interface name="cron_manage_pid_files" lineno="641">
 <summary>
 Create, read, write, and delete
-crond pid files.
+crond pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -93969,7 +94790,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_anacron_domtrans_system_job" lineno="660">
+<interface name="cron_anacron_domtrans_system_job" lineno="656">
 <summary>
 Execute anacron in the cron
 system domain.
@@ -93980,7 +94801,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cron_use_system_job_fds" lineno="679">
+<interface name="cron_use_system_job_fds" lineno="675">
 <summary>
 Use system cron job file descriptors.
 </summary>
@@ -93990,7 +94811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_manage_system_spool" lineno="697">
+<interface name="cron_manage_system_spool" lineno="693">
 <summary>
 Create, read, write, and delete the system spool.
 </summary>
@@ -94000,7 +94821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_spool" lineno="716">
+<interface name="cron_read_system_spool" lineno="712">
 <summary>
 Read the system spool.
 </summary>
@@ -94010,7 +94831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_tmp_files" lineno="736">
+<interface name="cron_rw_tmp_files" lineno="732">
 <summary>
 Read and write crond temporary files.
 </summary>
@@ -94020,7 +94841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_job_lib_files" lineno="754">
+<interface name="cron_read_system_job_lib_files" lineno="750">
 <summary>
 Read system cron job lib files.
 </summary>
@@ -94030,7 +94851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_manage_system_job_lib_files" lineno="774">
+<interface name="cron_manage_system_job_lib_files" lineno="770">
 <summary>
 Create, read, write, and delete
 system cron job lib files.
@@ -94041,7 +94862,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_write_system_job_pipes" lineno="793">
+<interface name="cron_write_system_job_pipes" lineno="789">
 <summary>
 Write system cron job unnamed pipes.
 </summary>
@@ -94051,7 +94872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_system_job_pipes" lineno="812">
+<interface name="cron_rw_system_job_pipes" lineno="808">
 <summary>
 Read and write system cron job
 unnamed pipes.
@@ -94062,7 +94883,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_system_job_stream_sockets" lineno="831">
+<interface name="cron_rw_system_job_stream_sockets" lineno="827">
 <summary>
 Read and write inherited system cron
 job unix domain stream sockets.
@@ -94073,7 +94894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_job_tmp_files" lineno="849">
+<interface name="cron_read_system_job_tmp_files" lineno="845">
 <summary>
 Read system cron job temporary files.
 </summary>
@@ -94083,7 +94904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="869">
+<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="865">
 <summary>
 Do not audit attempts to append temporary
 system cron job files.
@@ -94094,7 +94915,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_inherited_system_job_tmp_files" lineno="887">
+<interface name="cron_rw_inherited_system_job_tmp_files" lineno="883">
 <summary>
 Read and write to inherited system cron job temporary files.
 </summary>
@@ -94104,7 +94925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="906">
+<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="902">
 <summary>
 Do not audit attempts to write temporary
 system cron job files.
@@ -94115,7 +94936,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="cron_exec_crontab" lineno="925">
+<interface name="cron_exec_crontab" lineno="921">
 <summary>
 Execute crontab in the caller domain.
 </summary>
@@ -94126,7 +94947,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cron_admin" lineno="951">
+<interface name="cron_admin" lineno="947">
 <summary>
 All of the rules required to
 administrate a cron environment.
@@ -94292,7 +95113,17 @@ Domain allowed access.
 </interface>
 <interface name="cups_read_pid_files" lineno="107">
 <summary>
-Read cups PID files.
+Read cups PID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cups_read_runtime_files" lineno="122">
+<summary>
+Read cups runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -94300,7 +95131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_domtrans_config" lineno="127">
+<interface name="cups_domtrans_config" lineno="142">
 <summary>
 Execute cups_config in the
 cups config domain.
@@ -94311,7 +95142,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cups_signal_config" lineno="147">
+<interface name="cups_signal_config" lineno="162">
 <summary>
 Send generic signals to the cups
 configuration daemon.
@@ -94322,7 +95153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_dbus_chat_config" lineno="166">
+<interface name="cups_dbus_chat_config" lineno="181">
 <summary>
 Send and receive messages from
 cupsd_config over dbus.
@@ -94333,7 +95164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_read_config" lineno="187">
+<interface name="cups_read_config" lineno="202">
 <summary>
 Read cups configuration files.
 </summary>
@@ -94344,7 +95175,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_read_rw_config" lineno="207">
+<interface name="cups_read_rw_config" lineno="222">
 <summary>
 Read cups-writable configuration files.
 </summary>
@@ -94355,7 +95186,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_read_log" lineno="227">
+<interface name="cups_read_log" lineno="242">
 <summary>
 Read cups log files.
 </summary>
@@ -94366,7 +95197,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_append_log" lineno="246">
+<interface name="cups_append_log" lineno="261">
 <summary>
 Append cups log files.
 </summary>
@@ -94376,7 +95207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_write_log" lineno="265">
+<interface name="cups_write_log" lineno="280">
 <summary>
 Write cups log files.
 </summary>
@@ -94386,7 +95217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_stream_connect_ptal" lineno="285">
+<interface name="cups_stream_connect_ptal" lineno="300">
 <summary>
 Connect to ptal over an unix
 domain stream socket.
@@ -94397,7 +95228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_read_state" lineno="304">
+<interface name="cups_read_state" lineno="319">
 <summary>
 Read the process state (/proc/pid) of cupsd.
 </summary>
@@ -94407,7 +95238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_domtrans_hplip" lineno="326">
+<interface name="cups_domtrans_hplip" lineno="341">
 <summary>
 Execute HP Linux Imaging and
 Printing applications in their
@@ -94419,7 +95250,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cups_admin" lineno="352">
+<interface name="cups_admin" lineno="367">
 <summary>
 All of the rules required to
 administrate an cups environment.
@@ -94644,7 +95475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_connect_all_session_bus" lineno="170">
+<interface name="dbus_connect_all_session_bus" lineno="172">
 <summary>
 Acquire service on all DBUS
 session busses.
@@ -94655,7 +95486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_connect_spec_session_bus" lineno="196">
+<interface name="dbus_connect_spec_session_bus" lineno="198">
 <summary>
 Acquire service on specified
 DBUS session bus.
@@ -94672,7 +95503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_all_session_bus_client" lineno="216">
+<interface name="dbus_all_session_bus_client" lineno="218">
 <summary>
 Creating connections to all
 DBUS session busses.
@@ -94683,7 +95514,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_spec_session_bus_client" lineno="248">
+<interface name="dbus_spec_session_bus_client" lineno="250">
 <summary>
 Creating connections to specified
 DBUS session bus.
@@ -94700,7 +95531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_send_all_session_bus" lineno="275">
+<interface name="dbus_send_all_session_bus" lineno="277">
 <summary>
 Send messages to all DBUS
 session busses.
@@ -94711,7 +95542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_send_spec_session_bus" lineno="301">
+<interface name="dbus_send_spec_session_bus" lineno="303">
 <summary>
 Send messages to specified
 DBUS session busses.
@@ -94728,7 +95559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_read_config" lineno="320">
+<interface name="dbus_read_config" lineno="322">
 <summary>
 Read dbus configuration content.
 </summary>
@@ -94738,7 +95569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_read_lib_files" lineno="339">
+<interface name="dbus_read_lib_files" lineno="341">
 <summary>
 Read system dbus lib files.
 </summary>
@@ -94748,7 +95579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_relabel_lib_dirs" lineno="359">
+<interface name="dbus_relabel_lib_dirs" lineno="361">
 <summary>
 Relabel system dbus lib directory.
 </summary>
@@ -94758,7 +95589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_manage_lib_files" lineno="379">
+<interface name="dbus_manage_lib_files" lineno="381">
 <summary>
 Create, read, write, and delete
 system dbus lib files.
@@ -94769,7 +95600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_all_session_domain" lineno="405">
+<interface name="dbus_all_session_domain" lineno="407">
 <summary>
 Allow a application domain to be
 started by the specified session bus.
@@ -94786,7 +95617,7 @@ entry point to this domain.
 </summary>
 </param>
 </interface>
-<interface name="dbus_spec_session_domain" lineno="439">
+<interface name="dbus_spec_session_domain" lineno="441">
 <summary>
 Allow a application domain to be
 started by the specified session bus.
@@ -94809,7 +95640,7 @@ entry point to this domain.
 </summary>
 </param>
 </interface>
-<interface name="dbus_connect_system_bus" lineno="460">
+<interface name="dbus_connect_system_bus" lineno="462">
 <summary>
 Acquire service on the DBUS system bus.
 </summary>
@@ -94819,7 +95650,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_send_system_bus" lineno="479">
+<interface name="dbus_send_system_bus" lineno="481">
 <summary>
 Send messages to the DBUS system bus.
 </summary>
@@ -94829,7 +95660,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_system_bus_unconfined" lineno="498">
+<interface name="dbus_system_bus_unconfined" lineno="500">
 <summary>
 Unconfined access to DBUS system bus.
 </summary>
@@ -94839,7 +95670,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_system_domain" lineno="523">
+<interface name="dbus_system_domain" lineno="525">
 <summary>
 Create a domain for processes which
 can be started by the DBUS system bus.
@@ -94855,7 +95686,7 @@ Type of the program to be used as an entry point to this domain.
 </summary>
 </param>
 </interface>
-<interface name="dbus_use_system_bus_fds" lineno="563">
+<interface name="dbus_use_system_bus_fds" lineno="565">
 <summary>
 Use and inherit DBUS system bus
 file descriptors.
@@ -94866,7 +95697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="582">
+<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="584">
 <summary>
 Do not audit attempts to read and
 write DBUS system bus TCP sockets.
@@ -94877,7 +95708,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dbus_watch_system_bus_runtime_dirs" lineno="600">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="602">
 <summary>
 Watch system bus runtime directories.
 </summary>
@@ -94887,7 +95718,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="618">
+<interface name="dbus_list_system_bus_runtime" lineno="620">
+<summary>
+List system bus runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="638">
 <summary>
 Watch system bus runtime named sockets.
 </summary>
@@ -94897,7 +95738,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_unconfined" lineno="636">
+<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="656">
+<summary>
+Read system bus runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="674">
 <summary>
 Unconfined access to DBUS.
 </summary>
@@ -94907,7 +95758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="666">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="704">
 <summary>
 Create resources in /run or /var/run with the system_dbusd_runtime_t
 label. This method is deprecated in favor of the init_daemon_run_dir
@@ -94929,7 +95780,7 @@ Optional file name used for the resource
 </summary>
 </param>
 </interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="680">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="718">
 <summary>
 Create directories with the system_dbusd_runtime_t label
 </summary>
@@ -94939,6 +95790,15 @@ Domain allowed access
 </summary>
 </param>
 </interface>
+<tunable name="dbus_pass_tuntap_fd" dftval="false">
+<desc>
+<p>
+Allow dbus-daemon system bus to access /dev/net/tun
+which is needed to pass tun/tap device file descriptors
+over D-Bus.  This is needed by openvpn3-linux.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="dcc" filename="policy/modules/services/dcc.if">
 <summary>Distributed checksum clearinghouse spam filtering.</summary>
@@ -95247,7 +96107,7 @@ Domain allowed access.
 </interface>
 <interface name="devicekit_read_pid_files" lineno="212">
 <summary>
-Read devicekit PID files.
+Read devicekit PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95255,10 +96115,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="devicekit_manage_pid_files" lineno="232">
+<interface name="devicekit_manage_pid_files" lineno="228">
 <summary>
 Create, read, write, and delete
-devicekit PID files.
+devicekit PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95266,7 +96126,28 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="devicekit_admin" lineno="258">
+<interface name="devicekit_read_runtime_files" lineno="243">
+<summary>
+Read devicekit runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="devicekit_manage_runtime_files" lineno="263">
+<summary>
+Create, read, write, and delete
+devicekit runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="devicekit_admin" lineno="289">
 <summary>
 All of the rules required to
 administrate an devicekit environment.
@@ -95586,7 +96467,7 @@ Domain allowed access.
 </interface>
 <interface name="dnsmasq_delete_pid_files" lineno="149">
 <summary>
-Delete dnsmasq pid files.
+Delete dnsmasq pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95594,10 +96475,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_manage_pid_files" lineno="168">
+<interface name="dnsmasq_manage_pid_files" lineno="165">
 <summary>
 Create, read, write, and delete
-dnsmasq pid files
+dnsmasq pid files  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95605,9 +96486,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_read_pid_files" lineno="188">
+<interface name="dnsmasq_read_pid_files" lineno="181">
 <summary>
-Read dnsmasq pid files.
+Read dnsmasq pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95615,9 +96496,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_create_pid_dirs" lineno="206">
+<interface name="dnsmasq_create_pid_dirs" lineno="196">
 <summary>
-Create dnsmasq pid directories.
+Create dnsmasq pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95625,11 +96506,11 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_spec_filetrans_pid" lineno="242">
+<interface name="dnsmasq_spec_filetrans_pid" lineno="228">
 <summary>
 Create specified objects in specified
 directories with a type transition to
-the dnsmasq pid file type.
+the dnsmasq pid file type.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95652,30 +96533,73 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_admin" lineno="267">
+<interface name="dnsmasq_create_runtime_dirs" lineno="243">
 <summary>
-All of the rules required to
-administrate an dnsmasq environment.
+Create dnsmasq runtime directories.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<param name="role">
+</interface>
+<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274">
 <summary>
-Role allowed access.
+Create specified objects in specified
+directories with a type transition to
+the dnsmasq runtime file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
 </summary>
 </param>
-<rolecap/>
 </interface>
-</module>
-<module name="dnssectrigger" filename="policy/modules/services/dnssectrigger.if">
-<summary>Enables DNSSEC protection for DNS traffic.</summary>
-<interface name="dnssectrigger_admin" lineno="20">
+<interface name="dnsmasq_read_runtime_files" lineno="293">
+<summary>
+Read dnsmasq runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_delete_runtime_files" lineno="312">
+<summary>
+Delete dnsmasq runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_manage_runtime_files" lineno="331">
+<summary>
+Create, read, write, and delete
+dnsmasq runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_admin" lineno="357">
 <summary>
 All of the rules required to
-administrate an dnssec environment.
+administrate an dnsmasq environment.
 </summary>
 <param name="domain">
 <summary>
@@ -95958,7 +96882,7 @@ Domain allowed access.
 </interface>
 <interface name="exim_read_pid_files" lineno="116">
 <summary>
-Read exim pid files.
+Read exim pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -95966,7 +96890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_log" lineno="136">
+<interface name="exim_read_log" lineno="131">
 <summary>
 Read exim log files.
 </summary>
@@ -95977,7 +96901,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="exim_append_log" lineno="155">
+<interface name="exim_append_log" lineno="150">
 <summary>
 Append exim log files.
 </summary>
@@ -95987,7 +96911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_log" lineno="176">
+<interface name="exim_manage_log" lineno="171">
 <summary>
 Create, read, write, and delete
 exim log files.
@@ -95999,7 +96923,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="exim_manage_spool_dirs" lineno="196">
+<interface name="exim_manage_spool_dirs" lineno="191">
 <summary>
 Create, read, write, and delete
 exim spool directories.
@@ -96010,7 +96934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_spool_files" lineno="215">
+<interface name="exim_read_spool_files" lineno="210">
 <summary>
 Read exim spool files.
 </summary>
@@ -96020,7 +96944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_spool_files" lineno="236">
+<interface name="exim_manage_spool_files" lineno="231">
 <summary>
 Create, read, write, and delete
 exim spool files.
@@ -96031,7 +96955,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_var_lib_files" lineno="255">
+<interface name="exim_read_var_lib_files" lineno="250">
 <summary>
 Read exim var lib files.
 </summary>
@@ -96041,7 +96965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_var_lib_files" lineno="274">
+<interface name="exim_manage_var_lib_files" lineno="269">
 <summary>
 Create, read, and write exim var lib files.
 </summary>
@@ -96051,7 +96975,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_admin" lineno="300">
+<interface name="exim_admin" lineno="295">
 <summary>
 All of the rules required to
 administrate an exim environment.
@@ -96222,7 +97146,7 @@ Domain allowed access.
 </interface>
 <interface name="fail2ban_read_pid_files" lineno="233">
 <summary>
-Read fail2ban pid files.
+Read fail2ban pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -96230,7 +97154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fail2ban_admin" lineno="259">
+<interface name="fail2ban_admin" lineno="254">
 <summary>
 All of the rules required to
 administrate an fail2ban environment.
@@ -96862,7 +97786,7 @@ Domain allowed access.
 </interface>
 <interface name="glance_read_pid_files" lineno="192">
 <summary>
-Read glance pid files.
+Read glance pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -96870,10 +97794,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="glance_manage_pid_files" lineno="212">
+<interface name="glance_manage_pid_files" lineno="207">
 <summary>
 Create, read, write, and delete
-glance pid files.
+glance pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -96881,7 +97805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="glance_admin" lineno="238">
+<interface name="glance_admin" lineno="228">
 <summary>
 All of the rules required to
 administrate an glance environment.
@@ -97148,7 +98072,7 @@ Domain allowed access.
 </interface>
 <interface name="gssproxy_read_pid_files" lineno="108">
 <summary>
-Read gssproxy PID files.
+Read gssproxy PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -97156,7 +98080,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="gssproxy_stream_connect" lineno="128">
+<interface name="gssproxy_stream_connect" lineno="123">
 <summary>
 Connect to gssproxy over an unix
 domain stream socket.
@@ -97167,7 +98091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="gssproxy_admin" lineno="150">
+<interface name="gssproxy_admin" lineno="145">
 <summary>
 All of the rules required to administrate
 an gssproxy environment
@@ -97380,250 +98304,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="hal" filename="policy/modules/services/hal.if">
-<summary>Hardware abstraction layer.</summary>
-<interface name="hal_domtrans" lineno="13">
-<summary>
-Execute hal in the hal domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hal_getattr" lineno="32">
-<summary>
-Get attributes of hald processes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_state" lineno="50">
-<summary>
-Read hal process state files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_ptrace" lineno="68">
-<summary>
-Trace hald processes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_use_fds" lineno="86">
-<summary>
-Inherit and use hald file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_use_fds" lineno="105">
-<summary>
-Do not audit attempts to inherited
-and use hald file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_rw_pipes" lineno="123">
-<summary>
-Read and write hald unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_rw_pipes" lineno="142">
-<summary>
-Do not audit attempts to read and
-write hald unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_dgram_send" lineno="161">
-<summary>
-Send to hald over a unix domain
-datagram socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_stream_connect" lineno="181">
-<summary>
-Send to hald over a unix domain
-stream socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_rw_dgram_sockets" lineno="201">
-<summary>
-Do not audit attempts to read and
-write hald unix datagram sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_dbus_send" lineno="219">
-<summary>
-Send messages to hald over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dbus_chat" lineno="239">
-<summary>
-Send and receive messages from
-hald over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_domtrans_mac" lineno="259">
-<summary>
-Execute hal mac in the hal mac domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hal_write_log" lineno="278">
-<summary>
-Write hald log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_write_log" lineno="298">
-<summary>
-Do not audit attempts to write hald
-log files.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_log" lineno="317">
-<summary>
-Create, read, write, and delete
-hald log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_tmp_files" lineno="336">
-<summary>
-Read hald temporary files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_append_lib_files" lineno="356">
-<summary>
-Do not audit attempts to append
-hald libraries files.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_pid_files" lineno="374">
-<summary>
-Read hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_rw_pid_files" lineno="393">
-<summary>
-Read and write hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_pid_dirs" lineno="413">
-<summary>
-Create, read, write, and delete
-hald pid directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_pid_files" lineno="433">
-<summary>
-Create, read, write, and delete
-hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="hddtemp" filename="policy/modules/services/hddtemp.if">
 <summary>Hard disk temperature tool running as a daemon.</summary>
 <interface name="hddtemp_domtrans" lineno="13">
@@ -97778,7 +98458,7 @@ Domain allowed to transition.
 </interface>
 <interface name="icecast_read_pid_files" lineno="68">
 <summary>
-Read icecast pid files.
+Read icecast pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -97786,7 +98466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_manage_pid_files" lineno="88">
+<interface name="icecast_manage_pid_files" lineno="83">
 <summary>
 Create, read, write, and delete
 icecast pid files.
@@ -97797,7 +98477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_read_log" lineno="108">
+<interface name="icecast_read_log" lineno="103">
 <summary>
 Read icecast log files.
 </summary>
@@ -97808,7 +98488,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="icecast_append_log" lineno="127">
+<interface name="icecast_append_log" lineno="122">
 <summary>
 Append icecast log files.
 </summary>
@@ -97818,7 +98498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_manage_log" lineno="147">
+<interface name="icecast_manage_log" lineno="142">
 <summary>
 Create, read, write, and delete
 icecast log files.
@@ -97829,7 +98509,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_admin" lineno="173">
+<interface name="icecast_admin" lineno="168">
 <summary>
 All of the rules required to
 administrate an icecast environment.
@@ -97900,7 +98580,7 @@ Domain allowed access.
 </interface>
 <interface name="ifplugd_read_pid_files" lineno="90">
 <summary>
-Read ifplugd pid files.
+Read ifplugd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -97908,7 +98588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ifplugd_admin" lineno="116">
+<interface name="ifplugd_admin" lineno="111">
 <summary>
 All of the rules required to
 administrate an ifplugd environment.
@@ -98089,7 +98769,7 @@ The name of the object being created.
 <interface name="inn_manage_pid" lineno="100">
 <summary>
 Create, read, write, and delete
-innd pid content.
+innd pid content.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -98097,7 +98777,40 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_config" lineno="122">
+<interface name="inn_manage_runtime_dirs" lineno="118">
+<summary>
+Create, read, write, and delete
+innd runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_manage_runtime_files" lineno="138">
+<summary>
+Create, read, write, and delete
+innd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_manage_runtime_sockets" lineno="158">
+<summary>
+Create, read, write, and delete
+innd runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_read_config" lineno="178">
 <summary>
 Read innd configuration content.
 </summary>
@@ -98107,7 +98820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_news_lib" lineno="142">
+<interface name="inn_read_news_lib" lineno="198">
 <summary>
 Read innd news library content.
 </summary>
@@ -98117,7 +98830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_news_spool" lineno="161">
+<interface name="inn_read_news_spool" lineno="217">
 <summary>
 Read innd news spool content.
 </summary>
@@ -98127,7 +98840,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_dgram_send" lineno="181">
+<interface name="inn_dgram_send" lineno="237">
 <summary>
 Send to a innd unix dgram socket.
 </summary>
@@ -98137,7 +98850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_domtrans" lineno="200">
+<interface name="inn_domtrans" lineno="256">
 <summary>
 Execute innd in the innd domain.
 </summary>
@@ -98147,7 +98860,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="inn_admin" lineno="226">
+<interface name="inn_admin" lineno="282">
 <summary>
 All of the rules required to
 administrate an inn environment.
@@ -98321,7 +99034,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_read_config" lineno="109">
+<interface name="kerberos_read_config" lineno="108">
 <summary>
 Read kerberos configuration files.
 </summary>
@@ -98332,7 +99045,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kerberos_dontaudit_write_config" lineno="132">
+<interface name="kerberos_dontaudit_write_config" lineno="131">
 <summary>
 Do not audit attempts to write
 kerberos configuration files.
@@ -98343,7 +99056,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_rw_config" lineno="152">
+<interface name="kerberos_rw_config" lineno="151">
 <summary>
 Read and write kerberos
 configuration files.
@@ -98355,7 +99068,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kerberos_manage_krb5_home_files" lineno="172">
+<interface name="kerberos_manage_krb5_home_files" lineno="171">
 <summary>
 Create, read, write, and delete
 kerberos home files.
@@ -98366,7 +99079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_relabel_krb5_home_files" lineno="191">
+<interface name="kerberos_relabel_krb5_home_files" lineno="190">
 <summary>
 Relabel kerberos home files.
 </summary>
@@ -98376,7 +99089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_home_filetrans_krb5_home" lineno="221">
+<interface name="kerberos_home_filetrans_krb5_home" lineno="220">
 <summary>
 Create objects in user home
 directories with the krb5 home type.
@@ -98397,7 +99110,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_read_keytab" lineno="240">
+<interface name="kerberos_read_keytab" lineno="239">
 <summary>
 Read kerberos key table files.
 </summary>
@@ -98408,7 +99121,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kerberos_rw_keytab" lineno="259">
+<interface name="kerberos_rw_keytab" lineno="258">
 <summary>
 Read and write kerberos key table files.
 </summary>
@@ -98418,7 +99131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_manage_keytab_files" lineno="279">
+<interface name="kerberos_manage_keytab_files" lineno="278">
 <summary>
 Create, read, write, and delete
 kerberos key table files.
@@ -98429,7 +99142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_etc_filetrans_keytab" lineno="310">
+<interface name="kerberos_etc_filetrans_keytab" lineno="309">
 <summary>
 Create specified objects in generic
 etc directories with the kerberos
@@ -98451,7 +99164,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_read_kdc_config" lineno="329">
+<interface name="kerberos_read_kdc_config" lineno="328">
 <summary>
 Read kerberos kdc configuration files.
 </summary>
@@ -98462,7 +99175,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kerberos_manage_host_rcache" lineno="350">
+<interface name="kerberos_manage_host_rcache" lineno="349">
 <summary>
 Create, read, write, and delete
 kerberos host rcache files.
@@ -98474,7 +99187,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kerberos_tmp_filetrans_host_rcache" lineno="391">
+<interface name="kerberos_tmp_filetrans_host_rcache" lineno="390">
 <summary>
 Create objects in generic temporary
 directories with the kerberos host
@@ -98496,7 +99209,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_connect_524" lineno="409">
+<interface name="kerberos_connect_524" lineno="408">
 <summary>
 Connect to krb524 service.
 </summary>
@@ -98506,7 +99219,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kerberos_admin" lineno="439">
+<interface name="kerberos_admin" lineno="437">
 <summary>
 All of the rules required to
 administrate an kerberos environment.
@@ -98595,19 +99308,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="keyboardd" filename="policy/modules/services/keyboardd.if">
-<summary>Xorg.conf keyboard layout callout.</summary>
-<interface name="keyboardd_read_pipes" lineno="13">
-<summary>
-Read keyboardd unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="keystone" filename="policy/modules/services/keystone.if">
 <summary>Python implementation of the OpenStack identity service API.</summary>
 <interface name="keystone_admin" lineno="20">
@@ -99078,7 +99778,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<template name="lpd_domtrans_lpr" lineno="203">
+<interface name="lpd_domtrans_lpr" lineno="203">
 <summary>
 Transition to a user lpr domain.
 </summary>
@@ -99087,7 +99787,7 @@ Transition to a user lpr domain.
 Domain allowed to transition.
 </summary>
 </param>
-</template>
+</interface>
 <interface name="lpd_run_lpr" lineno="229">
 <summary>
 Execute lpr in the lpr domain, and
@@ -99200,7 +99900,7 @@ Execute mailman in the caller domain.
 </summary>
 <param name="domain">
 <summary>
-Domain allowd access.
+Domain allowed access.
 </summary>
 </param>
 </interface>
@@ -99306,7 +100006,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_domtrans_queue" lineno="336">
+<interface name="mailman_domtrans_queue" lineno="337">
 <summary>
 Execute mailman_queue in the
 mailman_queue domain.
@@ -99377,7 +100077,7 @@ Domain allowed to transition.
 <interface name="memcached_manage_pid_files" lineno="33">
 <summary>
 Create, read, write, and delete
-memcached pid files.
+memcached pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -99385,9 +100085,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_read_pid_files" lineno="52">
+<interface name="memcached_read_pid_files" lineno="48">
 <summary>
-Read memcached pid files.
+Read memcached pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -99395,7 +100095,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_stream_connect" lineno="72">
+<interface name="memcached_manage_runtime_files" lineno="63">
+<summary>
+Create, read, write, and delete
+memcached runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="memcached_stream_connect" lineno="83">
 <summary>
 Connect to memcached using a unix
 domain stream socket.
@@ -99406,7 +100117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_tcp_connect" lineno="91">
+<interface name="memcached_tcp_connect" lineno="102">
 <summary>
 Connect to memcache over the network.
 </summary>
@@ -99416,7 +100127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_admin" lineno="118">
+<interface name="memcached_admin" lineno="129">
 <summary>
 All of the rules required to
 administrate an memcached environment.
@@ -99434,6 +100145,9 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="memlockd" filename="policy/modules/services/memlockd.if">
+<summary>memory lock daemon, keeps important files in RAM.</summary>
+</module>
 <module name="milter" filename="policy/modules/services/milter.if">
 <summary>Milter mail filters.</summary>
 <template name="milter_template" lineno="13">
@@ -100062,7 +100776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_home_filetrans_mail_home_rw" lineno="279">
+<interface name="mta_home_filetrans_mail_home_rw" lineno="280">
 <summary>
 Create specified objects in user home
 directories with the generic mail
@@ -100084,7 +100798,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_system_content" lineno="297">
+<interface name="mta_system_content" lineno="298">
 <summary>
 Make the specified type by a system MTA.
 </summary>
@@ -100094,7 +100808,7 @@ Type to be used as a mail client.
 </summary>
 </param>
 </interface>
-<interface name="mta_sendmail_mailserver" lineno="330">
+<interface name="mta_sendmail_mailserver" lineno="331">
 <summary>
 Modified mailserver interface for
 sendmail daemon use.
@@ -100119,7 +100833,7 @@ The type to be used for the mail server.
 </summary>
 </param>
 </interface>
-<interface name="mta_use_mailserver_fds" lineno="351">
+<interface name="mta_use_mailserver_fds" lineno="352">
 <summary>
 Inherit FDs from mailserver_domain domains
 </summary>
@@ -100129,7 +100843,7 @@ Type for a list server or delivery agent that inherits fds
 </summary>
 </param>
 </interface>
-<interface name="mta_mailserver_sender" lineno="370">
+<interface name="mta_mailserver_sender" lineno="371">
 <summary>
 Make a type a mailserver type used
 for sending mail.
@@ -100140,7 +100854,7 @@ Mail server domain type used for sending mail.
 </summary>
 </param>
 </interface>
-<interface name="mta_mailserver_delivery" lineno="389">
+<interface name="mta_mailserver_delivery" lineno="390">
 <summary>
 Make a type a mailserver type used
 for delivering mail to local users.
@@ -100151,7 +100865,7 @@ Mail server domain type used for delivering mail.
 </summary>
 </param>
 </interface>
-<interface name="mta_mailserver_user_agent" lineno="409">
+<interface name="mta_mailserver_user_agent" lineno="410">
 <summary>
 Make a type a mailserver type used
 for sending mail on behalf of local
@@ -100163,7 +100877,7 @@ Mail server domain type used for sending local mail.
 </summary>
 </param>
 </interface>
-<interface name="mta_send_mail" lineno="427">
+<interface name="mta_send_mail" lineno="428">
 <summary>
 Send mail from the system.
 </summary>
@@ -100173,7 +100887,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="mta_sendmail_domtrans" lineno="472">
+<interface name="mta_sendmail_domtrans" lineno="473">
 <summary>
 Execute send mail in a specified domain.
 </summary>
@@ -100198,7 +100912,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="mta_signal_system_mail" lineno="494">
+<interface name="mta_signal_system_mail" lineno="495">
 <summary>
 Send signals to system mail.
 </summary>
@@ -100208,7 +100922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_kill_system_mail" lineno="512">
+<interface name="mta_kill_system_mail" lineno="513">
 <summary>
 Send kill signals to system mail.
 </summary>
@@ -100218,7 +100932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_sendmail_exec" lineno="530">
+<interface name="mta_sendmail_exec" lineno="531">
 <summary>
 Execute sendmail in the caller domain.
 </summary>
@@ -100228,7 +100942,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_sendmail_entry_point" lineno="550">
+<interface name="mta_sendmail_entry_point" lineno="551">
 <summary>
 Make sendmail usable as an entry
 point for the domain.
@@ -100239,7 +100953,7 @@ Domain to be entered.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_config" lineno="569">
+<interface name="mta_read_config" lineno="570">
 <summary>
 Read mail server configuration content.
 </summary>
@@ -100250,7 +100964,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mta_write_config" lineno="591">
+<interface name="mta_write_config" lineno="592">
 <summary>
 Write mail server configuration files.
 </summary>
@@ -100261,7 +100975,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mta_read_aliases" lineno="610">
+<interface name="mta_read_aliases" lineno="611">
 <summary>
 Read mail address alias files.
 </summary>
@@ -100271,7 +100985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_map_aliases" lineno="638">
+<interface name="mta_map_aliases" lineno="639">
 <summary>
 Read mail address alias files.
 </summary>
@@ -100281,7 +100995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_aliases" lineno="657">
+<interface name="mta_manage_aliases" lineno="658">
 <summary>
 Create, read, write, and delete
 mail address alias content.
@@ -100292,7 +101006,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_etc_filetrans_aliases" lineno="699">
+<interface name="mta_etc_filetrans_aliases" lineno="700">
 <summary>
 Create specified object in generic
 etc directories with the mail address
@@ -100314,7 +101028,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_spec_filetrans_aliases" lineno="734">
+<interface name="mta_spec_filetrans_aliases" lineno="735">
 <summary>
 Create specified objects in specified
 directories with a type transition to
@@ -100341,7 +101055,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_aliases" lineno="753">
+<interface name="mta_rw_aliases" lineno="754">
 <summary>
 Read and write mail alias files.
 </summary>
@@ -100352,7 +101066,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="783">
+<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="784">
 <summary>
 Do not audit attempts to read
 and write TCP sockets of mail
@@ -100364,7 +101078,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="802">
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="803">
 <summary>
 Do not audit attempts to read
 mail spool symlinks.
@@ -100375,7 +101089,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_getattr_spool" lineno="820">
+<interface name="mta_getattr_spool" lineno="821">
 <summary>
 Get attributes of mail spool content.
 </summary>
@@ -100385,7 +101099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="842">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="843">
 <summary>
 Do not audit attempts to get
 attributes of mail spool files.
@@ -100396,7 +101110,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_spool_filetrans" lineno="880">
+<interface name="mta_spool_filetrans" lineno="881">
 <summary>
 Create specified objects in the
 mail spool directory with a
@@ -100423,7 +101137,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_spool_files" lineno="899">
+<interface name="mta_read_spool_files" lineno="900">
 <summary>
 Read mail spool files.
 </summary>
@@ -100433,7 +101147,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_spool" lineno="918">
+<interface name="mta_rw_spool" lineno="920">
 <summary>
 Read and write mail spool files.
 </summary>
@@ -100443,7 +101157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_append_spool" lineno="939">
+<interface name="mta_append_spool" lineno="941">
 <summary>
 Create, read, and write mail spool files.
 </summary>
@@ -100453,7 +101167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_delete_spool" lineno="960">
+<interface name="mta_delete_spool" lineno="962">
 <summary>
 Delete mail spool files.
 </summary>
@@ -100463,7 +101177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_spool" lineno="980">
+<interface name="mta_manage_spool" lineno="982">
 <summary>
 Create, read, write, and delete
 mail spool content.
@@ -100474,7 +101188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_queue_filetrans" lineno="1018">
+<interface name="mta_queue_filetrans" lineno="1021">
 <summary>
 Create specified objects in the
 mail queue spool directory with a
@@ -100501,7 +101215,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_search_queue" lineno="1037">
+<interface name="mta_search_queue" lineno="1040">
 <summary>
 Search mail queue directories.
 </summary>
@@ -100511,7 +101225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_list_queue" lineno="1056">
+<interface name="mta_list_queue" lineno="1059">
 <summary>
 List mail queue directories.
 </summary>
@@ -100521,7 +101235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_queue" lineno="1075">
+<interface name="mta_read_queue" lineno="1078">
 <summary>
 Read mail queue files.
 </summary>
@@ -100531,7 +101245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1095">
+<interface name="mta_dontaudit_rw_queue" lineno="1098">
 <summary>
 Do not audit attempts to read and
 write mail queue content.
@@ -100542,7 +101256,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_queue" lineno="1115">
+<interface name="mta_manage_queue" lineno="1118">
 <summary>
 Create, read, write, and delete
 mail queue content.
@@ -100553,7 +101267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_sendmail_bin" lineno="1135">
+<interface name="mta_read_sendmail_bin" lineno="1138">
 <summary>
 Read sendmail binary.
 </summary>
@@ -100563,7 +101277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1154">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1157">
 <summary>
 Read and write unix domain stream
 sockets of all base mail domains.
@@ -100866,7 +101580,7 @@ Domain allowed to transition.
 </interface>
 <interface name="mysql_read_pid_files" lineno="361">
 <summary>
-Read mysqld pid files.
+Read mysqld pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -100874,9 +101588,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mysql_search_pid_files" lineno="381">
+<interface name="mysql_search_pid_files" lineno="376">
 <summary>
-Search mysqld pid files.
+Search mysqld pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -100885,7 +101599,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="mysql_admin" lineno="407">
+<interface name="mysql_admin" lineno="397">
 <summary>
 All of the rules required to
 administrate an mysqld environment.
@@ -100902,7 +101616,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mysql_setattr_run_dirs" lineno="449">
+<interface name="mysql_setattr_run_dirs" lineno="439">
 <summary>
 Set the attributes of the MySQL run directories
 </summary>
@@ -100912,7 +101626,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="mysql_create_run_dirs" lineno="467">
+<interface name="mysql_create_run_dirs" lineno="457">
 <summary>
 Create MySQL run directories
 </summary>
@@ -100922,7 +101636,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="mysql_generic_run_filetrans_run" lineno="498">
+<interface name="mysql_generic_run_filetrans_run" lineno="488">
 <summary>
 Automatically use the MySQL run label for created resources in generic
 run locations. This method is deprecated in favor of the
@@ -101183,7 +101897,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_read_etc_files" lineno="184">
+<interface name="networkmanager_watch_etc_dirs" lineno="184">
+<summary>
+Watch networkmanager etc dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_read_etc_files" lineno="202">
 <summary>
 Read networkmanager etc files.
 </summary>
@@ -101193,7 +101917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_manage_lib_files" lineno="205">
+<interface name="networkmanager_manage_lib_files" lineno="223">
 <summary>
 Create, read, and write
 networkmanager library files.
@@ -101204,7 +101928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_read_lib_files" lineno="225">
+<interface name="networkmanager_read_lib_files" lineno="243">
 <summary>
 Read networkmanager lib files.
 </summary>
@@ -101214,7 +101938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_append_log_files" lineno="246">
+<interface name="networkmanager_append_log_files" lineno="264">
 <summary>
 Append networkmanager log files.
 </summary>
@@ -101224,9 +101948,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_read_pid_files" lineno="266">
+<interface name="networkmanager_read_pid_files" lineno="284">
 <summary>
-Read networkmanager pid files.
+Read networkmanager pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -101234,7 +101958,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_stream_connect" lineno="287">
+<interface name="networkmanager_read_runtime_files" lineno="299">
+<summary>
+Read networkmanager runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_stream_connect" lineno="319">
 <summary>
 Connect to networkmanager over
 a unix domain stream socket.
@@ -101245,7 +101979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_enabledisable" lineno="306">
+<interface name="networkmanager_enabledisable" lineno="338">
 <summary>
 Allow specified domain to enable/disable NetworkManager units
 </summary>
@@ -101255,7 +101989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_startstop" lineno="325">
+<interface name="networkmanager_startstop" lineno="357">
 <summary>
 Allow specified domain to start/stop NetworkManager units
 </summary>
@@ -101265,7 +101999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_status" lineno="344">
+<interface name="networkmanager_status" lineno="376">
 <summary>
 Allow specified domain to get status of NetworkManager
 </summary>
@@ -101275,7 +102009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_admin" lineno="370">
+<interface name="networkmanager_admin" lineno="402">
 <summary>
 All of the rules required to
 administrate an networkmanager environment.
@@ -101292,7 +102026,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="409">
+<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441">
 <summary>
 Do not audit use of wpa_cli file descriptors
 </summary>
@@ -101302,7 +102036,7 @@ Domain to dontaudit access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_domtrans_wpa_cli" lineno="428">
+<interface name="networkmanager_domtrans_wpa_cli" lineno="460">
 <summary>
 Execute wpa_cli in the wpa_cli domain.
 </summary>
@@ -101312,7 +102046,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_run_wpa_cli" lineno="454">
+<interface name="networkmanager_run_wpa_cli" lineno="486">
 <summary>
 Execute wpa cli in the wpa_cli domain, and
 allow the specified role the wpa_cli domain.
@@ -101329,7 +102063,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="networkmanager_rw_rawip_sockets" lineno="475">
+<interface name="networkmanager_rw_rawip_sockets" lineno="507">
 <summary>
 Read and write networkmanager rawip sockets.
 </summary>
@@ -101365,7 +102099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_use_ypbind" lineno="88">
+<interface name="nis_use_ypbind" lineno="87">
 <summary>
 Use the ypbind service to access NIS services.
 </summary>
@@ -101373,7 +102107,7 @@ Use the ypbind service to access NIS services.
 <p>
 Allow the specified domain to use the ypbind service
 to access Network Information Service (NIS) services.
-Information that can be retreived from NIS includes
+Information that can be retrieved from NIS includes
 usernames, passwords, home directories, and groups.
 If the network is configured to have a single sign-on
 using NIS, it is likely that any program that does
@@ -101388,7 +102122,7 @@ Domain allowed access.
 <infoflow type="both" weight="10"/>
 <rolecap/>
 </interface>
-<interface name="nis_authenticate" lineno="105">
+<interface name="nis_authenticate" lineno="104">
 <summary>
 Use nis to authenticate passwords.
 </summary>
@@ -101399,7 +102133,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="nis_domtrans_ypbind" lineno="123">
+<interface name="nis_domtrans_ypbind" lineno="122">
 <summary>
 Execute ypbind in the ypbind domain.
 </summary>
@@ -101409,7 +102143,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_exec_ypbind" lineno="142">
+<interface name="nis_exec_ypbind" lineno="141">
 <summary>
 Execute ypbind in the caller domain.
 </summary>
@@ -101419,7 +102153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_run_ypbind" lineno="168">
+<interface name="nis_run_ypbind" lineno="167">
 <summary>
 Execute ypbind in the ypbind domain, and
 allow the specified role the ypbind domain.
@@ -101436,7 +102170,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="nis_signal_ypbind" lineno="187">
+<interface name="nis_signal_ypbind" lineno="186">
 <summary>
 Send generic signals to ypbind.
 </summary>
@@ -101446,7 +102180,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_list_var_yp" lineno="205">
+<interface name="nis_list_var_yp" lineno="204">
 <summary>
 List nis data directories.
 </summary>
@@ -101456,9 +102190,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_read_ypbind_pid" lineno="224">
+<interface name="nis_read_ypbind_pid" lineno="223">
 <summary>
-Read ypbind pid files.
+Read ypbind pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -101466,9 +102200,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_delete_ypbind_pid" lineno="243">
+<interface name="nis_read_ypbind_runtime_files" lineno="238">
 <summary>
-Delete ypbind pid files.
+Read ypbind runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -101476,7 +102210,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_read_ypserv_config" lineno="261">
+<interface name="nis_delete_ypbind_pid" lineno="257">
+<summary>
+Delete ypbind pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="nis_read_ypserv_config" lineno="271">
 <summary>
 Read ypserv configuration files.
 </summary>
@@ -101486,7 +102230,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_domtrans_ypxfr" lineno="280">
+<interface name="nis_domtrans_ypxfr" lineno="290">
 <summary>
 Execute ypxfr in the ypxfr domain.
 </summary>
@@ -101496,7 +102240,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_initrc_domtrans" lineno="301">
+<interface name="nis_initrc_domtrans" lineno="311">
 <summary>
 Execute nis init scripts in
 the init script domain.
@@ -101507,7 +102251,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_initrc_domtrans_ypbind" lineno="320">
+<interface name="nis_initrc_domtrans_ypbind" lineno="330">
 <summary>
 Execute ypbind init scripts in
 the init script domain.
@@ -101518,7 +102262,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_admin" lineno="345">
+<interface name="nis_admin" lineno="355">
 <summary>
 All of the rules required to
 administrate an nis environment.
@@ -101624,7 +102368,7 @@ Domain allowed access.
 <interface name="nscd_dontaudit_search_pid" lineno="186">
 <summary>
 Do not audit attempts to search
-nscd pid directories.
+nscd pid directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -101632,9 +102376,9 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="nscd_read_pid" lineno="204">
+<interface name="nscd_read_pid" lineno="201">
 <summary>
-Read nscd pid files.
+Read nscd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -101642,7 +102386,28 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_unconfined" lineno="223">
+<interface name="nscd_dontaudit_search_runtime" lineno="217">
+<summary>
+Do not audit attempts to search
+nscd runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="nscd_read_runtime_files" lineno="235">
+<summary>
+Read nscd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="nscd_unconfined" lineno="254">
 <summary>
 Unconfined access to nscd services.
 </summary>
@@ -101652,7 +102417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_run" lineno="248">
+<interface name="nscd_run" lineno="279">
 <summary>
 Execute nscd in the nscd domain, and
 allow the specified role the nscd domain.
@@ -101668,7 +102433,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_initrc_domtrans" lineno="268">
+<interface name="nscd_initrc_domtrans" lineno="299">
 <summary>
 Execute the nscd server init
 script in the initrc domain.
@@ -101679,7 +102444,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nscd_admin" lineno="293">
+<interface name="nscd_admin" lineno="324">
 <summary>
 All of the rules required to
 administrate an nscd environment.
@@ -101749,7 +102514,7 @@ Domain allowed to transition.
 </interface>
 <interface name="nslcd_read_pid_files" lineno="50">
 <summary>
-Read nslcd pid files.
+Read nslcd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -101757,7 +102522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nslcd_stream_connect" lineno="70">
+<interface name="nslcd_stream_connect" lineno="65">
 <summary>
 Connect to nslcd over an unix
 domain stream socket.
@@ -101768,7 +102533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nslcd_admin" lineno="96">
+<interface name="nslcd_admin" lineno="91">
 <summary>
 All of the rules required to
 administrate an nslcd environment.
@@ -102175,7 +102940,7 @@ Domain allowed to transition.
 <interface name="oddjob_system_entry" lineno="38">
 <summary>
 Make the specified program domain
-accessable from the oddjob.
+accessible from the oddjob.
 </summary>
 <param name="domain">
 <summary>
@@ -102401,7 +103166,17 @@ Domain allowed to transition.
 </interface>
 <interface name="openct_read_pid_files" lineno="69">
 <summary>
-Read openct pid files.
+Read openct pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="openct_read_runtime_files" lineno="84">
+<summary>
+Read openct runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -102409,7 +103184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openct_stream_connect" lineno="89">
+<interface name="openct_stream_connect" lineno="104">
 <summary>
 Connect to openct over an unix
 domain stream socket.
@@ -102420,7 +103195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openct_admin" lineno="115">
+<interface name="openct_admin" lineno="130">
 <summary>
 All of the rules required to
 administrate an openct environment.
@@ -102578,7 +103353,17 @@ Domain allowed to transition.
 </interface>
 <interface name="openvswitch_read_pid_files" lineno="32">
 <summary>
-Read openvswitch pid files.
+Read openvswitch pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="openvswitch_read_runtime_files" lineno="47">
+<summary>
+Read openvswitch runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -102586,7 +103371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openvswitch_admin" lineno="58">
+<interface name="openvswitch_admin" lineno="73">
 <summary>
 All of the rules required to
 administrate an openvswitch environment.
@@ -102623,6 +103408,13 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
+<tunable name="pacemaker_startstop_all_services" dftval="false">
+<desc>
+<p>
+Allow pacemaker to start/stop services
+</p>
+</desc>
+</tunable>
 </module>
 <module name="pads" filename="policy/modules/services/pads.if">
 <summary>Passive Asset Detection System.</summary>
@@ -102658,7 +103450,7 @@ Domain allowed to transition.
 </interface>
 <interface name="pcscd_read_pid_files" lineno="32">
 <summary>
-Read pcscd pid files.
+Read pcscd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -102666,7 +103458,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="pcscd_stream_connect" lineno="52">
+<interface name="pcscd_read_runtime_files" lineno="47">
+<summary>
+Read pcscd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="pcscd_stream_connect" lineno="67">
 <summary>
 Connect to pcscd over an unix
 domain stream socket.
@@ -102677,7 +103479,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="pcscd_admin" lineno="81">
+<interface name="pcscd_admin" lineno="96">
 <summary>
 All of the rules required to
 administrate an pcscd environment.
@@ -102933,7 +103735,7 @@ Domain allowed access.
 </interface>
 <interface name="plymouthd_read_pid_files" lineno="244">
 <summary>
-Read plymouthd pid files.
+Read plymouthd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -102941,9 +103743,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="plymouthd_delete_pid_files" lineno="264">
+<interface name="plymouthd_delete_pid_files" lineno="259">
 <summary>
-Delete the plymouthd pid files.
+Delete the plymouthd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -102951,7 +103753,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="plymouthd_admin" lineno="290">
+<interface name="plymouthd_read_runtime_files" lineno="274">
+<summary>
+Read plymouthd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_delete_runtime_files" lineno="293">
+<summary>
+Delete the plymouthd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_admin" lineno="319">
 <summary>
 All of the rules required to
 administrate an plymouthd environment.
@@ -104263,7 +105085,7 @@ Domain allowed access.
 </interface>
 <interface name="ppp_read_pid_files" lineno="366">
 <summary>
-Read ppp pid files.
+Read ppp pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -104271,10 +105093,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ppp_manage_pid_files" lineno="386">
+<interface name="ppp_manage_pid_files" lineno="382">
 <summary>
 Create, read, write, and delete
-ppp pid files.
+ppp pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -104282,9 +105104,51 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ppp_pid_filetrans" lineno="416">
+<interface name="ppp_pid_filetrans" lineno="408">
 <summary>
 Create specified pppd pid objects
+with a type transition.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="ppp_read_runtime_files" lineno="423">
+<summary>
+Read ppp runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ppp_manage_runtime_files" lineno="443">
+<summary>
+Create, read, write, and delete
+ppp runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ppp_runtime_filetrans" lineno="473">
+<summary>
+Create specified pppd runtime objects
 with a type transition.
 </summary>
 <param name="domain">
@@ -104303,7 +105167,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="ppp_initrc_domtrans" lineno="435">
+<interface name="ppp_initrc_domtrans" lineno="492">
 <summary>
 Execute pppd init script in
 the initrc domain.
@@ -104314,7 +105178,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ppp_admin" lineno="460">
+<interface name="ppp_admin" lineno="517">
 <summary>
 All of the rules required to
 administrate an ppp environment.
@@ -104608,7 +105472,7 @@ Domain allowed access.
 </interface>
 <interface name="psad_read_pid_files" lineno="111">
 <summary>
-Read psad pid files.
+Read psad pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -104616,9 +105480,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_rw_pid_files" lineno="130">
+<interface name="psad_rw_pid_files" lineno="125">
 <summary>
-Read and write psad pid files.
+Read and write psad pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -104626,7 +105490,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_read_log" lineno="150">
+<interface name="psad_read_log" lineno="140">
 <summary>
 Read psad log content.
 </summary>
@@ -104637,7 +105501,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="psad_append_log" lineno="171">
+<interface name="psad_append_log" lineno="161">
 <summary>
 Append psad log files.
 </summary>
@@ -104648,7 +105512,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="psad_rw_fifo_file" lineno="190">
+<interface name="psad_rw_fifo_file" lineno="180">
 <summary>
 Read and write psad fifo files.
 </summary>
@@ -104658,7 +105522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_rw_tmp_files" lineno="209">
+<interface name="psad_rw_tmp_files" lineno="199">
 <summary>
 Read and write psad temporary files.
 </summary>
@@ -104668,7 +105532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_admin" lineno="235">
+<interface name="psad_admin" lineno="225">
 <summary>
 All of the rules required to
 administrate an psad environment.
@@ -104949,7 +105813,7 @@ Domain allowed to transition.
 </interface>
 <interface name="qpidd_read_pid_files" lineno="87">
 <summary>
-Read qpidd pid files.
+Read qpidd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -104957,7 +105821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_search_lib" lineno="106">
+<interface name="qpidd_search_lib" lineno="101">
 <summary>
 Search qpidd lib directories.
 </summary>
@@ -104967,7 +105831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_read_lib_files" lineno="125">
+<interface name="qpidd_read_lib_files" lineno="120">
 <summary>
 Read qpidd lib files.
 </summary>
@@ -104977,7 +105841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_manage_lib_files" lineno="145">
+<interface name="qpidd_manage_lib_files" lineno="140">
 <summary>
 Create, read, write, and delete
 qpidd lib files.
@@ -104988,7 +105852,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_admin" lineno="171">
+<interface name="qpidd_admin" lineno="166">
 <summary>
 All of the rules required to
 administrate an qpidd environment.
@@ -105603,123 +106467,6 @@ Determine whether fenced can use ssh.
 </desc>
 </tunable>
 </module>
-<module name="rhgb" filename="policy/modules/services/rhgb.if">
-<summary> Red Hat Graphical Boot.</summary>
-<interface name="rhgb_stub" lineno="13">
-<summary>
-RHGB stub interface.  No access allowed.
-</summary>
-<param name="domain" unused="true">
-<summary>
-N/A
-</summary>
-</param>
-</interface>
-<interface name="rhgb_use_fds" lineno="29">
-<summary>
-Inherit and use rhgb file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_getpgid" lineno="47">
-<summary>
-Get the process group of rhgb.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_signal" lineno="65">
-<summary>
-Send generic signals to rhgb.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_stream_sockets" lineno="84">
-<summary>
-Read and write inherited rhgb unix
-domain stream sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_dontaudit_rw_stream_sockets" lineno="103">
-<summary>
-Do not audit attempts to read and write
-rhgb unix domain stream sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_stream_connect" lineno="122">
-<summary>
-Connected to rhgb with a unix
-domain stream socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_shm" lineno="141">
-<summary>
-Read and write to rhgb shared memory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_use_ptys" lineno="159">
-<summary>
-Read and write rhgb pty devices.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_dontaudit_use_ptys" lineno="179">
-<summary>
-Do not audit attempts to read and
-write rhgb pty devices.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_tmpfs_files" lineno="197">
-<summary>
-Read and write to rhgb tmpfs files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="rhsmcertd" filename="policy/modules/services/rhsmcertd.if">
 <summary>Subscription Management Certificate Daemon.</summary>
 <interface name="rhsmcertd_domtrans" lineno="13">
@@ -105819,7 +106566,7 @@ Domain allowed access.
 </interface>
 <interface name="rhsmcertd_read_pid_files" lineno="190">
 <summary>
-Read rhsmcertd pid files.
+Read rhsmcertd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -105827,7 +106574,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_stream_connect" lineno="210">
+<interface name="rhsmcertd_stream_connect" lineno="205">
 <summary>
 Connect to rhsmcertd with a
 unix domain stream socket.
@@ -105838,7 +106585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_dbus_chat" lineno="230">
+<interface name="rhsmcertd_dbus_chat" lineno="225">
 <summary>
 Send and receive messages from
 rhsmcertd over dbus.
@@ -105849,7 +106596,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="252">
+<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247">
 <summary>
 Do not audit attempts to send
 and receive messages from
@@ -105861,7 +106608,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_admin" lineno="279">
+<interface name="rhsmcertd_admin" lineno="274">
 <summary>
 All of the rules required to
 administrate an rhsmcertd environment.
@@ -105916,7 +106663,7 @@ Domain to not audit.
 <interface name="ricci_dontaudit_rw_modcluster_pipes" lineno="72">
 <summary>
 Do not audit attempts to read write
-ricci modcluster unamed pipes.
+ricci modcluster unnamed pipes.
 </summary>
 <param name="domain">
 <summary>
@@ -106103,26 +106850,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="roundup" filename="policy/modules/services/roundup.if">
-<summary>Roundup Issue Tracking System.</summary>
-<interface name="roundup_admin" lineno="20">
-<summary>
-All of the rules required to
-administrate an roundup environment.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-</module>
 <module name="rpc" filename="policy/modules/services/rpc.if">
 <summary>Remote Procedure Call Daemon.</summary>
 <interface name="rpc_stub" lineno="13">
@@ -106373,7 +107100,7 @@ Domain allowed access.
 </interface>
 <interface name="rpcbind_read_pid_files" lineno="52">
 <summary>
-Read rpcbind pid files.
+Read rpcbind pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -106381,7 +107108,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_search_lib" lineno="71">
+<interface name="rpcbind_search_lib" lineno="66">
 <summary>
 Search rpcbind lib directories.
 </summary>
@@ -106391,7 +107118,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_read_lib_files" lineno="90">
+<interface name="rpcbind_read_lib_files" lineno="85">
 <summary>
 Read rpcbind lib files.
 </summary>
@@ -106401,7 +107128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_manage_lib_files" lineno="110">
+<interface name="rpcbind_manage_lib_files" lineno="105">
 <summary>
 Create, read, write, and delete
 rpcbind lib files.
@@ -106412,7 +107139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_signull" lineno="129">
+<interface name="rpcbind_signull" lineno="124">
 <summary>
 Send null signals to rpcbind.
 </summary>
@@ -106422,7 +107149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_admin" lineno="154">
+<interface name="rpcbind_admin" lineno="149">
 <summary>
 All of the rules required to
 administrate an rpcbind environment.
@@ -106990,7 +107717,47 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_search_var" lineno="341">
+<interface name="samba_start" lineno="341">
+<summary>
+start samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_stop" lineno="361">
+<summary>
+stop samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_status" lineno="381">
+<summary>
+get status of samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_reload" lineno="401">
+<summary>
+reload samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_search_var" lineno="421">
 <summary>
 Search samba var directories.
 </summary>
@@ -107000,7 +107767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_read_var_files" lineno="360">
+<interface name="samba_read_var_files" lineno="440">
 <summary>
 Read samba var files.
 </summary>
@@ -107010,7 +107777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_dontaudit_write_var_files" lineno="380">
+<interface name="samba_dontaudit_write_var_files" lineno="460">
 <summary>
 Do not audit attempts to write
 samba var files.
@@ -107021,7 +107788,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="samba_rw_var_files" lineno="398">
+<interface name="samba_rw_var_files" lineno="478">
 <summary>
 Read and write samba var files.
 </summary>
@@ -107031,7 +107798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_manage_var_files" lineno="418">
+<interface name="samba_manage_var_files" lineno="498">
 <summary>
 Create, read, write, and delete
 samba var files.
@@ -107042,7 +107809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_domtrans_smbcontrol" lineno="437">
+<interface name="samba_domtrans_smbcontrol" lineno="517">
 <summary>
 Execute smbcontrol in the smbcontrol domain.
 </summary>
@@ -107052,7 +107819,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="samba_run_smbcontrol" lineno="463">
+<interface name="samba_run_smbcontrol" lineno="543">
 <summary>
 Execute smbcontrol in the smbcontrol
 domain, and allow the specified
@@ -107069,7 +107836,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_domtrans_smbd" lineno="482">
+<interface name="samba_domtrans_smbd" lineno="562">
 <summary>
 Execute smbd in the smbd domain.
 </summary>
@@ -107079,7 +107846,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="samba_signal_smbd" lineno="501">
+<interface name="samba_signal_smbd" lineno="581">
 <summary>
 Send generic signals to smbd.
 </summary>
@@ -107089,7 +107856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_dontaudit_use_fds" lineno="519">
+<interface name="samba_dontaudit_use_fds" lineno="599">
 <summary>
 Do not audit attempts to inherit
 and use smbd file descriptors.
@@ -107100,7 +107867,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="samba_write_smbmount_tcp_sockets" lineno="537">
+<interface name="samba_write_smbmount_tcp_sockets" lineno="617">
 <summary>
 Write smbmount tcp sockets.
 </summary>
@@ -107110,7 +107877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_rw_smbmount_tcp_sockets" lineno="555">
+<interface name="samba_rw_smbmount_tcp_sockets" lineno="635">
 <summary>
 Read and write smbmount tcp sockets.
 </summary>
@@ -107120,7 +107887,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_domtrans_winbind_helper" lineno="574">
+<interface name="samba_domtrans_winbind_helper" lineno="654">
 <summary>
 Execute winbind helper in the
 winbind helper domain.
@@ -107131,7 +107898,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="samba_getattr_winbind_exec" lineno="593">
+<interface name="samba_getattr_winbind_exec" lineno="673">
 <summary>
 Get attributes of winbind executable files.
 </summary>
@@ -107141,7 +107908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_run_winbind_helper" lineno="619">
+<interface name="samba_run_winbind_helper" lineno="699">
 <summary>
 Execute winbind helper in the winbind
 helper domain, and allow the specified
@@ -107159,9 +107926,19 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="samba_read_winbind_pid" lineno="638">
+<interface name="samba_read_winbind_pid" lineno="718">
+<summary>
+Read winbind pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_read_winbind_runtime_files" lineno="733">
 <summary>
-Read winbind pid files.
+Read winbind runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -107169,7 +107946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_stream_connect_winbind" lineno="658">
+<interface name="samba_stream_connect_winbind" lineno="753">
 <summary>
 Connect to winbind with a unix
 domain stream socket.
@@ -107180,7 +107957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_admin" lineno="684">
+<interface name="samba_admin" lineno="779">
 <summary>
 All of the rules required to
 administrate an samba environment.
@@ -107315,7 +108092,7 @@ Domain allowed to transition.
 <interface name="sanlock_manage_pid_files" lineno="52">
 <summary>
 Create, read, write, and delete
-sanlock pid files.
+sanlock pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -107323,7 +108100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sanlock_stream_connect" lineno="72">
+<interface name="sanlock_stream_connect" lineno="67">
 <summary>
 Connect to sanlock with a unix
 domain stream socket.
@@ -107334,7 +108111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sanlock_admin" lineno="98">
+<interface name="sanlock_admin" lineno="93">
 <summary>
 All of the rules required to
 administrate an sanlock environment.
@@ -107718,7 +108495,7 @@ Role allowed access.
 </interface>
 </module>
 <module name="shibboleth" filename="policy/modules/services/shibboleth.if">
-<summary>Shibboleth authentication deamon</summary>
+<summary>Shibboleth authentication daemon</summary>
 <interface name="shibboleth_read_config" lineno="14">
 <summary>
 Allow your application domain to access
@@ -107848,7 +108625,7 @@ Domain allowed to transition.
 </interface>
 <interface name="smokeping_read_pid_files" lineno="51">
 <summary>
-Read smokeping pid files.
+Read smokeping pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -107856,10 +108633,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_manage_pid_files" lineno="71">
+<interface name="smokeping_manage_pid_files" lineno="66">
 <summary>
 Create, read, write, and delete
-smokeping pid files.
+smokeping pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -107867,7 +108644,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_getattr_lib_files" lineno="90">
+<interface name="smokeping_getattr_lib_files" lineno="80">
 <summary>
 Get attributes of smokeping lib files.
 </summary>
@@ -107877,7 +108654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_read_lib_files" lineno="109">
+<interface name="smokeping_read_lib_files" lineno="99">
 <summary>
 Read smokeping lib files.
 </summary>
@@ -107887,7 +108664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_manage_lib_files" lineno="129">
+<interface name="smokeping_manage_lib_files" lineno="119">
 <summary>
 Create, read, write, and delete
 smokeping lib files.
@@ -107898,7 +108675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_admin" lineno="155">
+<interface name="smokeping_admin" lineno="145">
 <summary>
 All of the rules required to
 administrate a smokeping environment.
@@ -108157,7 +108934,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_exec_spamd" lineno="114">
+<interface name="spamassassin_reload" lineno="115">
+<summary>
+reload SA service
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="spamassassin_status" lineno="135">
+<summary>
+Get SA service status
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="spamassassin_exec_spamd" lineno="154">
 <summary>
 Execute spamd in the caller domain.
 </summary>
@@ -108167,7 +108966,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_domtrans_client" lineno="133">
+<interface name="spamassassin_domtrans_client" lineno="173">
 <summary>
 Execute spamc in the spamc domain.
 </summary>
@@ -108177,7 +108976,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_exec_client" lineno="152">
+<interface name="spamassassin_exec_client" lineno="192">
 <summary>
 Execute spamc in the caller domain.
 </summary>
@@ -108187,7 +108986,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_kill_client" lineno="171">
+<interface name="spamassassin_kill_client" lineno="211">
 <summary>
 Send kill signals to spamc.
 </summary>
@@ -108197,7 +108996,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_domtrans_local_client" lineno="190">
+<interface name="spamassassin_domtrans_local_client" lineno="230">
 <summary>
 Execute spamassassin standalone client
 in the user spamassassin domain.
@@ -108208,7 +109007,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_manage_spamd_home_content" lineno="210">
+<interface name="spamassassin_manage_spamd_home_content" lineno="250">
 <summary>
 Create, read, write, and delete
 spamd home content.
@@ -108219,7 +109018,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_relabel_spamd_home_content" lineno="231">
+<interface name="spamassassin_relabel_spamd_home_content" lineno="271">
 <summary>
 Relabel spamd home content.
 </summary>
@@ -108229,7 +109028,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_home_filetrans_spamd_home" lineno="263">
+<interface name="spamassassin_home_filetrans_spamd_home" lineno="303">
 <summary>
 Create objects in user home
 directories with the spamd home type.
@@ -108250,7 +109049,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_read_lib_files" lineno="281">
+<interface name="spamassassin_read_lib_files" lineno="321">
 <summary>
 Read spamd lib files.
 </summary>
@@ -108260,7 +109059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_manage_lib_files" lineno="301">
+<interface name="spamassassin_manage_lib_files" lineno="341">
 <summary>
 Create, read, write, and delete
 spamd lib files.
@@ -108271,9 +109070,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_read_spamd_pid_files" lineno="320">
+<interface name="spamassassin_read_spamd_pid_files" lineno="360">
+<summary>
+Read spamd pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="spamassassin_read_spamd_runtime_files" lineno="375">
 <summary>
-Read spamd pid files.
+Read spamd runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -108281,7 +109090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_read_spamd_tmp_files" lineno="339">
+<interface name="spamassassin_read_spamd_tmp_files" lineno="394">
 <summary>
 Read temporary spamd files.
 </summary>
@@ -108291,7 +109100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="358">
+<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="413">
 <summary>
 Do not audit attempts to get
 attributes of temporary spamd sockets.
@@ -108302,7 +109111,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_stream_connect_spamd" lineno="377">
+<interface name="spamassassin_stream_connect_spamd" lineno="432">
 <summary>
 Connect to spamd with a unix
 domain stream socket.
@@ -108313,7 +109122,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_admin" lineno="403">
+<interface name="spamassassin_admin" lineno="458">
 <summary>
 All of the rules required to
 administrate an spamassassin environment.
@@ -108346,9 +109155,14 @@ generic user home content.
 </p>
 </desc>
 </tunable>
-</module>
-<module name="speedtouch" filename="policy/modules/services/speedtouch.if">
-<summary>Alcatel speedtouch USB ADSL modem</summary>
+<tunable name="rspamd_spamd" dftval="false">
+<desc>
+<p>
+Determine whether extra rules should
+be enabled to support rspamd.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="squid" filename="policy/modules/services/squid.if">
 <summary>Squid caching http proxy server.</summary>
@@ -108545,7 +109359,7 @@ The role associated with the user domain.
 </summary>
 </param>
 </template>
-<template name="ssh_server_template" lineno="169">
+<template name="ssh_server_template" lineno="168">
 <summary>
 The template to define a ssh server.
 </summary>
@@ -108565,7 +109379,7 @@ is the prefix for sshd_t).
 </summary>
 </param>
 </template>
-<template name="ssh_role_template" lineno="300">
+<template name="ssh_role_template" lineno="298">
 <summary>
 Role access for ssh
 </summary>
@@ -108586,7 +109400,7 @@ User domain for the role
 </summary>
 </param>
 </template>
-<interface name="ssh_sigchld" lineno="453">
+<interface name="ssh_sigchld" lineno="455">
 <summary>
 Send a SIGCHLD signal to the ssh server.
 </summary>
@@ -108596,7 +109410,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signal" lineno="471">
+<interface name="ssh_signal" lineno="473">
 <summary>
 Send a generic signal to the ssh server.
 </summary>
@@ -108606,7 +109420,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signull" lineno="489">
+<interface name="ssh_signull" lineno="491">
 <summary>
 Send a null signal to sshd processes.
 </summary>
@@ -108616,7 +109430,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_pipes" lineno="507">
+<interface name="ssh_read_pipes" lineno="509">
 <summary>
 Read a ssh server unnamed pipe.
 </summary>
@@ -108626,7 +109440,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_pipes" lineno="524">
+<interface name="ssh_rw_pipes" lineno="526">
 <summary>
 Read and write a ssh server unnamed pipe.
 </summary>
@@ -108636,7 +109450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_stream_sockets" lineno="542">
+<interface name="ssh_rw_stream_sockets" lineno="544">
 <summary>
 Read and write ssh server unix domain stream sockets.
 </summary>
@@ -108646,7 +109460,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_tcp_sockets" lineno="560">
+<interface name="ssh_rw_tcp_sockets" lineno="562">
 <summary>
 Read and write ssh server TCP sockets.
 </summary>
@@ -108656,7 +109470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="579">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="581">
 <summary>
 Do not audit attempts to read and write
 ssh server TCP sockets.
@@ -108667,7 +109481,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec_sshd" lineno="597">
+<interface name="ssh_exec_sshd" lineno="599">
 <summary>
 Execute the ssh daemon in the caller domain.
 </summary>
@@ -108677,7 +109491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans" lineno="616">
+<interface name="ssh_domtrans" lineno="618">
 <summary>
 Execute the ssh daemon sshd domain.
 </summary>
@@ -108687,7 +109501,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec" lineno="634">
+<interface name="ssh_exec" lineno="636">
 <summary>
 Execute the ssh client in the caller domain.
 </summary>
@@ -108697,7 +109511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_setattr_key_files" lineno="653">
+<interface name="ssh_setattr_key_files" lineno="655">
 <summary>
 Set the attributes of sshd key files.
 </summary>
@@ -108707,7 +109521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_agent_exec" lineno="672">
+<interface name="ssh_agent_exec" lineno="674">
 <summary>
 Execute the ssh agent client in the caller domain.
 </summary>
@@ -108717,7 +109531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_user_home_files" lineno="691">
+<interface name="ssh_read_user_home_files" lineno="693">
 <summary>
 Read ssh home directory content
 </summary>
@@ -108727,7 +109541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans_keygen" lineno="712">
+<interface name="ssh_domtrans_keygen" lineno="714">
 <summary>
 Execute the ssh key generator in the ssh keygen domain.
 </summary>
@@ -108737,7 +109551,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="730">
+<interface name="ssh_dontaudit_read_server_keys" lineno="732">
 <summary>
 Read ssh server keys
 </summary>
@@ -108747,7 +109561,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_manage_home_files" lineno="748">
+<interface name="ssh_manage_home_files" lineno="750">
 <summary>
 Manage ssh home directory content
 </summary>
@@ -108757,7 +109571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_delete_tmp" lineno="767">
+<interface name="ssh_delete_tmp" lineno="769">
 <summary>
 Delete from the ssh temp files.
 </summary>
@@ -108767,6 +109581,16 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="ssh_dontaudit_agent_tmp" lineno="788">
+<summary>
+dontaudit access to ssh agent tmp dirs
+</summary>
+<param name="domain">
+<summary>
+Domain not to audit.
+</summary>
+</param>
+</interface>
 <tunable name="allow_ssh_keysign" dftval="false">
 <desc>
 <p>
@@ -108876,7 +109700,7 @@ Domain allowed access.
 </interface>
 <interface name="sssd_read_pid_files" lineno="168">
 <summary>
-Read sssd pid files.
+Read sssd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -108884,10 +109708,20 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_manage_pids" lineno="188">
+<interface name="sssd_manage_pids" lineno="184">
 <summary>
 Create, read, write, and delete
-sssd pid content.
+sssd pid content.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sssd_read_runtime_files" lineno="198">
+<summary>
+Read sssd runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -108895,7 +109729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_search_lib" lineno="208">
+<interface name="sssd_search_lib" lineno="217">
 <summary>
 Search sssd lib directories.
 </summary>
@@ -108905,7 +109739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_dontaudit_search_lib" lineno="228">
+<interface name="sssd_dontaudit_search_lib" lineno="237">
 <summary>
 Do not audit attempts to search
 sssd lib directories.
@@ -108916,7 +109750,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="sssd_read_lib_files" lineno="246">
+<interface name="sssd_read_lib_files" lineno="255">
 <summary>
 Read sssd lib files.
 </summary>
@@ -108926,7 +109760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_manage_lib_files" lineno="267">
+<interface name="sssd_manage_lib_files" lineno="276">
 <summary>
 Create, read, write, and delete
 sssd lib files.
@@ -108937,7 +109771,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_dbus_chat" lineno="288">
+<interface name="sssd_dbus_chat" lineno="297">
 <summary>
 Send and receive messages from
 sssd over dbus.
@@ -108948,7 +109782,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_stream_connect" lineno="309">
+<interface name="sssd_stream_connect" lineno="318">
 <summary>
 Connect to sssd with a unix
 domain stream socket.
@@ -108959,7 +109793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_admin" lineno="335">
+<interface name="sssd_admin" lineno="344">
 <summary>
 All of the rules required to
 administrate an sssd environment.
@@ -109427,7 +110261,94 @@ tcp sockets to all unreserved ports.
 </module>
 <module name="tpm2" filename="policy/modules/services/tpm2.if">
 <summary>Trusted Platform Module 2.0</summary>
-<interface name="tpm2_enabledisable_abrmd" lineno="13">
+<interface name="tpm2_exec" lineno="14">
+<summary>
+Execute tpm2_* processes
+in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_domtrans" lineno="33">
+<summary>
+Execute tpm2_* processes in the tpm2 domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_run" lineno="58">
+<summary>
+Execute tpm2_* processes in the tpm2
+domain and allow the specified role
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_use_fds" lineno="78">
+<summary>
+Use tpm2 file descriptors.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_dontaudit_use_fds" lineno="97">
+<summary>
+Do not audit attempts to inherit file
+descriptors from tpm2.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_dbus_chat_abrmd" lineno="116">
+<summary>
+Send and receive messages from
+tpm2-abrmd over dbus.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_read_pipes" lineno="144">
+<summary>
+Allow tpm2 to read unnamed pipes from other process.
+</summary>
+<desc>
+<p>
+Allow the tpm to open and read pipes from other
+domain.  This is seen when piping input to one
+of the tpm2_* processes.  For example:
+sha512sum my_file | tpm2_hmac -k 0x81001000 -g sha256 /dev/stdin
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain of pipe to be read by tpm2_t.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_enabledisable_abrmd" lineno="162">
 <summary>
 Allow specified domain to enable/disable tpm2-abrmd unit
 </summary>
@@ -109437,7 +110358,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="tpm2_startstop_abrmd" lineno="32">
+<interface name="tpm2_startstop_abrmd" lineno="181">
 <summary>
 Allow specified domain to start/stop tpm2-abrmd unit
 </summary>
@@ -109447,7 +110368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="tpm2_status_abrmd" lineno="51">
+<interface name="tpm2_status_abrmd" lineno="200">
 <summary>
 Allow specified domain to get status of tpm2-abrmd unit
 </summary>
@@ -109457,6 +110378,16 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="tpm2_rw_abrmd_pipes" lineno="219">
+<summary>
+access tpm2-abrmd fifos
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
 </module>
 <module name="transproxy" filename="policy/modules/services/transproxy.if">
 <summary>Portable Transparent Proxy Solution.</summary>
@@ -109502,7 +110433,7 @@ Domain allowed access.
 </interface>
 <interface name="tuned_read_pid_files" lineno="51">
 <summary>
-Read tuned pid files.
+Read tuned pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -109510,10 +110441,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="tuned_manage_pid_files" lineno="71">
+<interface name="tuned_manage_pid_files" lineno="66">
 <summary>
 Create, read, write, and delete
-tuned pid files.
+tuned pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -109521,7 +110452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="tuned_initrc_domtrans" lineno="91">
+<interface name="tuned_initrc_domtrans" lineno="81">
 <summary>
 Execute tuned init scripts in
 the initrc domain.
@@ -109532,7 +110463,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="tuned_admin" lineno="116">
+<interface name="tuned_admin" lineno="106">
 <summary>
 All of the rules required to
 administrate an tuned environment.
@@ -109813,7 +110744,7 @@ Domain allowed access.
 </interface>
 <interface name="uuidd_read_pid_files" lineno="129">
 <summary>
-Read uuidd pid files.
+Read uuidd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -109821,7 +110752,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="uuidd_stream_connect_manager" lineno="149">
+<interface name="uuidd_stream_connect_manager" lineno="144">
 <summary>
 Connect to uuidd with an unix
 domain stream socket.
@@ -109832,7 +110763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="uuidd_admin" lineno="175">
+<interface name="uuidd_admin" lineno="170">
 <summary>
 All of the rules required to
 administrate an uuidd environment.
@@ -110013,7 +110944,7 @@ Domain allowed access.
 </interface>
 <interface name="vdagent_read_pid_files" lineno="69">
 <summary>
-Read vdagent pid files.
+Read vdagent pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -110021,7 +110952,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vdagent_stream_connect" lineno="89">
+<interface name="vdagent_stream_connect" lineno="84">
 <summary>
 Connect to vdagent with a unix
 domain stream socket.
@@ -110032,7 +110963,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vdagent_admin" lineno="115">
+<interface name="vdagent_admin" lineno="110">
 <summary>
 All of the rules required to
 administrate an vdagent environment.
@@ -110117,7 +111048,7 @@ Domain allowed access.
 </interface>
 <interface name="vhostmd_read_pid_files" lineno="128">
 <summary>
-Read vhostmd pid files.
+Read vhostmd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -110125,10 +111056,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_manage_pid_files" lineno="148">
+<interface name="vhostmd_manage_pid_files" lineno="143">
 <summary>
 Create, read, write, and delete
-vhostmd pid files.
+vhostmd pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -110136,7 +111067,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_stream_connect" lineno="168">
+<interface name="vhostmd_stream_connect" lineno="158">
 <summary>
 Connect to vhostmd with a unix
 domain stream socket.
@@ -110147,7 +111078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="188">
+<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178">
 <summary>
 Do not audit attempts to read and
 write vhostmd unix domain stream sockets.
@@ -110158,7 +111089,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_admin" lineno="213">
+<interface name="vhostmd_admin" lineno="203">
 <summary>
 All of the rules required to
 administrate an vhostmd environment.
@@ -110550,7 +111481,7 @@ The name of the object being created.
 </interface>
 <interface name="virt_read_pid_files" lineno="808">
 <summary>
-Read virt pid files.
+Read virt pid files.  (Depprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -110558,18 +111489,54 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_pid_files" lineno="828">
+<interface name="virt_manage_pid_files" lineno="824">
 <summary>
 Create, read, write, and delete
-virt pid files.
+virt pid files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="virt_read_runtime_files" lineno="838">
+<summary>
+Read virt runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="virt_runtime_filetrans" lineno="873">
+<summary>
+Create an object in the libvirt runtime directory, with a private type.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
 </interface>
-<interface name="virt_search_lib" lineno="847">
+<interface name="virt_search_lib" lineno="891">
 <summary>
 Search virt lib directories.
 </summary>
@@ -110579,7 +111546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_read_lib_files" lineno="866">
+<interface name="virt_read_lib_files" lineno="910">
 <summary>
 Read virt lib files.
 </summary>
@@ -110589,7 +111556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_lib_files" lineno="887">
+<interface name="virt_manage_lib_files" lineno="931">
 <summary>
 Create, read, write, and delete
 virt lib files.
@@ -110600,10 +111567,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_pid_filetrans" lineno="923">
+<interface name="virt_pid_filetrans" lineno="967">
 <summary>
 Create objects in virt pid
-directories with a private type.
+directories with a private type.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -110627,7 +111594,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="virt_read_log" lineno="943">
+<interface name="virt_read_log" lineno="983">
 <summary>
 Read virt log files.
 </summary>
@@ -110638,7 +111605,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="virt_append_log" lineno="962">
+<interface name="virt_append_log" lineno="1002">
 <summary>
 Append virt log files.
 </summary>
@@ -110648,7 +111615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_log" lineno="982">
+<interface name="virt_manage_log" lineno="1022">
 <summary>
 Create, read, write, and delete
 virt log files.
@@ -110659,7 +111626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_search_images" lineno="1003">
+<interface name="virt_search_images" lineno="1043">
 <summary>
 Search virt image directories.
 </summary>
@@ -110669,7 +111636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_read_images" lineno="1022">
+<interface name="virt_read_images" lineno="1062">
 <summary>
 Read virt image files.
 </summary>
@@ -110679,7 +111646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_rw_all_image_chr_files" lineno="1058">
+<interface name="virt_rw_all_image_chr_files" lineno="1098">
 <summary>
 Read and write all virt image
 character files.
@@ -110690,7 +111657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_virt_cache" lineno="1079">
+<interface name="virt_manage_virt_cache" lineno="1119">
 <summary>
 Create, read, write, and delete
 virt cache content.
@@ -110701,7 +111668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_images" lineno="1101">
+<interface name="virt_manage_images" lineno="1141">
 <summary>
 Create, read, write, and delete
 virt image files.
@@ -110712,7 +111679,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_admin" lineno="1143">
+<interface name="virt_admin" lineno="1183">
 <summary>
 All of the rules required to
 administrate an virt environment.
@@ -110802,6 +111769,14 @@ can use vfio for pci device pass through (vt-d).
 </p>
 </desc>
 </tunable>
+<tunable name="virt_use_evdev" dftval="false">
+<desc>
+<p>
+Determine whether confined virtual guests
+can use input devices via evdev pass through.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="vnstatd" filename="policy/modules/services/vnstatd.if">
 <summary>Console network traffic monitor.</summary>
@@ -110832,59 +111807,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vnstatd_domtrans" lineno="58">
-<summary>
-Execute a domain transition to run vnstatd.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_search_lib" lineno="79">
-<summary>
-Search vnstatd lib directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_manage_lib_dirs" lineno="101">
-<summary>
-Create, read, write, and delete
-vnstatd lib directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_read_lib_files" lineno="122">
-<summary>
-Read vnstatd lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_manage_lib_files" lineno="144">
-<summary>
-Create, read, write, and delete
-vnstatd lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_admin" lineno="172">
+<interface name="vnstatd_admin" lineno="65">
 <summary>
 All of the rules required to
 administrate an vnstatd environment.
@@ -110902,19 +111825,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="w3c" filename="policy/modules/services/w3c.if">
-<summary>W3C Markup Validator.</summary>
-<tunable name="allow_httpd_w3c_validator_script_anon_write" dftval="false">
-<desc>
-<p>
-Determine whether the script domain can
-modify public files used for public file
-transfer services. Directories/Files must
-be labeled public_content_rw_t.
-</p>
-</desc>
-</tunable>
-</module>
 <module name="watchdog" filename="policy/modules/services/watchdog.if">
 <summary>Software watchdog.</summary>
 <interface name="watchdog_admin" lineno="20">
@@ -111075,9 +111985,6 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="xprint" filename="policy/modules/services/xprint.if">
-<summary>A X11-based print system and API.</summary>
-</module>
 <module name="xserver" filename="policy/modules/services/xserver.if">
 <summary>X Windows Server</summary>
 <interface name="xserver_restricted_role" lineno="19">
@@ -111096,7 +112003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_role" lineno="139">
+<interface name="xserver_role" lineno="140">
 <summary>
 Rules required for using the X Windows server
 and environment.
@@ -111112,7 +112019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_ro_session" lineno="236">
+<interface name="xserver_ro_session" lineno="209">
 <summary>
 Create sessions on the X server, with read-only
 access to the X server shared
@@ -111129,7 +112036,7 @@ The type of the domain SYSV tmpfs files.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_session" lineno="278">
+<interface name="xserver_rw_session" lineno="251">
 <summary>
 Create sessions on the X server, with read and write
 access to the X server shared
@@ -111146,7 +112053,7 @@ The type of the domain SYSV tmpfs files.
 </summary>
 </param>
 </interface>
-<interface name="xserver_non_drawing_client" lineno="298">
+<interface name="xserver_non_drawing_client" lineno="271">
 <summary>
 Create non-drawing client sessions on an X server.
 </summary>
@@ -111156,7 +112063,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="xserver_common_x_domain_template" lineno="337">
+<template name="xserver_common_x_domain_template" lineno="310">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Provides the minimal set required by a basic
@@ -111174,7 +112081,7 @@ Client domain allowed access.
 </summary>
 </param>
 </template>
-<template name="xserver_object_types_template" lineno="396">
+<template name="xserver_object_types_template" lineno="369">
 <summary>
 Template for creating the set of types used
 in an X windows domain.
@@ -111186,7 +112093,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="xserver_user_x_domain_template" lineno="438">
+<template name="xserver_user_x_domain_template" lineno="411">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Provides the minimal set required by a basic
@@ -111209,7 +112116,7 @@ The type of the domain SYSV tmpfs files.
 </summary>
 </param>
 </template>
-<interface name="xserver_use_user_fonts" lineno="505">
+<interface name="xserver_use_user_fonts" lineno="478">
 <summary>
 Read user fonts, user font configuration,
 and manage the user font cache.
@@ -111230,7 +112137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_domtrans_xauth" lineno="537">
+<interface name="xserver_domtrans_xauth" lineno="510">
 <summary>
 Transition to the Xauthority domain.
 </summary>
@@ -111240,7 +112147,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560">
+<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="533">
 <summary>
 Create a Xauthority file in the user home directory.
 </summary>
@@ -111255,7 +112162,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="584">
+<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="557">
 <summary>
 Create a ICEauthority file in
 the user home directory.
@@ -111271,7 +112178,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="603">
+<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="576">
 <summary>
 Create a .xsession-errors log
 file in the user home directory.
@@ -111282,7 +112189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_user_xauth" lineno="621">
+<interface name="xserver_read_user_xauth" lineno="594">
 <summary>
 Read all users .Xauthority.
 </summary>
@@ -111292,7 +112199,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_user_dmrc" lineno="640">
+<interface name="xserver_read_user_dmrc" lineno="613">
 <summary>
 Read all users .dmrc.
 </summary>
@@ -111302,7 +112209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_user_iceauth" lineno="659">
+<interface name="xserver_read_user_iceauth" lineno="632">
 <summary>
 Read all users .ICEauthority.
 </summary>
@@ -111312,7 +112219,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_setattr_console_pipes" lineno="678">
+<interface name="xserver_setattr_console_pipes" lineno="651">
 <summary>
 Set the attributes of the X windows console named pipes.
 </summary>
@@ -111322,7 +112229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_console" lineno="696">
+<interface name="xserver_rw_console" lineno="669">
 <summary>
 Read and write the X windows console named pipe.
 </summary>
@@ -111332,7 +112239,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_create_console_pipes" lineno="714">
+<interface name="xserver_create_console_pipes" lineno="687">
 <summary>
 Create the X windows console named pipes.
 </summary>
@@ -111342,7 +112249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_relabel_console_pipes" lineno="732">
+<interface name="xserver_relabel_console_pipes" lineno="705">
 <summary>
 relabel the X windows console named pipes.
 </summary>
@@ -111352,7 +112259,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_use_xdm_fds" lineno="750">
+<interface name="xserver_use_xdm_fds" lineno="723">
 <summary>
 Use file descriptors for xdm.
 </summary>
@@ -111362,7 +112269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_use_xdm_fds" lineno="769">
+<interface name="xserver_dontaudit_use_xdm_fds" lineno="742">
 <summary>
 Do not audit attempts to inherit
 XDM file descriptors.
@@ -111373,7 +112280,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_sigchld_xdm" lineno="787">
+<interface name="xserver_sigchld_xdm" lineno="760">
 <summary>
 Allow domain to send sigchld to xdm_t
 </summary>
@@ -111383,7 +112290,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xdm_pipes" lineno="805">
+<interface name="xserver_rw_xdm_pipes" lineno="778">
 <summary>
 Read and write XDM unnamed pipes.
 </summary>
@@ -111393,7 +112300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="824">
+<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="797">
 <summary>
 Do not audit attempts to read and write
 XDM unnamed pipes.
@@ -111404,7 +112311,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dbus_chat_xdm" lineno="844">
+<interface name="xserver_dbus_chat_xdm" lineno="817">
 <summary>
 Send and receive messages from
 xdm over dbus.
@@ -111415,7 +112322,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_state" lineno="864">
+<interface name="xserver_read_xdm_state" lineno="837">
 <summary>
 Read xdm process state files.
 </summary>
@@ -111425,7 +112332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_setsched_xdm" lineno="886">
+<interface name="xserver_setsched_xdm" lineno="859">
 <summary>
 Set the priority of the X Display
 Manager (XDM).
@@ -111436,18 +112343,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_xdm_spool_files" lineno="905">
-<summary>
-Create, read, write, and delete
-xdm_spool files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xserver_stream_connect_xdm" lineno="920">
+<interface name="xserver_stream_connect_xdm" lineno="878">
 <summary>
 Connect to XDM over a unix domain
 stream socket.
@@ -111458,7 +112354,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_rw_config" lineno="939">
+<interface name="xserver_read_xdm_rw_config" lineno="897">
 <summary>
 Read xdm-writable configuration files.
 </summary>
@@ -111468,7 +112364,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_setattr_xdm_tmp_dirs" lineno="958">
+<interface name="xserver_setattr_xdm_tmp_dirs" lineno="916">
 <summary>
 Set the attributes of XDM temporary directories.
 </summary>
@@ -111478,7 +112374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_create_xdm_tmp_sockets" lineno="977">
+<interface name="xserver_create_xdm_tmp_sockets" lineno="935">
 <summary>
 Create a named socket in a XDM
 temporary directory.
@@ -111489,7 +112385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_delete_xdm_tmp_sockets" lineno="998">
+<interface name="xserver_delete_xdm_tmp_sockets" lineno="956">
 <summary>
 Delete a named socket in a XDM
 temporary directory.
@@ -111500,9 +112396,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_pid" lineno="1017">
+<interface name="xserver_read_xdm_pid" lineno="975">
 <summary>
-Read XDM pid files.
+Read XDM pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -111510,7 +112406,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1036">
+<interface name="xserver_read_xdm_runtime_files" lineno="990">
+<summary>
+Read XDM runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xserver_read_xdm_lib_files" lineno="1009">
 <summary>
 Read XDM var lib files.
 </summary>
@@ -111520,7 +112426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_xsession_entry_type" lineno="1054">
+<interface name="xserver_xsession_entry_type" lineno="1027">
 <summary>
 Make an X session script an entrypoint for the specified domain.
 </summary>
@@ -111530,7 +112436,7 @@ The domain for which the shell is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1091">
+<interface name="xserver_xsession_spec_domtrans" lineno="1064">
 <summary>
 Execute an X session in the target domain.  This
 is an explicit transition, requiring the
@@ -111559,7 +112465,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1110">
+<interface name="xserver_write_inherited_xsession_log" lineno="1083">
 <summary>
 Write to inherited  xsession log
 files such as .xsession-errors.
@@ -111570,7 +112476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xsession_log" lineno="1130">
+<interface name="xserver_rw_xsession_log" lineno="1103">
 <summary>
 Read and write xsession log
 files such as .xsession-errors.
@@ -111581,7 +112487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_xsession_log" lineno="1149">
+<interface name="xserver_manage_xsession_log" lineno="1122">
 <summary>
 Manage xsession log files such
 as .xsession-errors.
@@ -111592,7 +112498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_write_inherited_log" lineno="1168">
+<interface name="xserver_write_inherited_log" lineno="1141">
 <summary>
 Write to inherited X server log
 files like /var/log/lightdm/lightdm.log
@@ -111603,7 +112509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_getattr_log" lineno="1186">
+<interface name="xserver_getattr_log" lineno="1159">
 <summary>
 Get the attributes of X server logs.
 </summary>
@@ -111613,7 +112519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_write_log" lineno="1206">
+<interface name="xserver_dontaudit_write_log" lineno="1179">
 <summary>
 Do not audit attempts to write the X server
 log files.
@@ -111624,7 +112530,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_delete_log" lineno="1224">
+<interface name="xserver_delete_log" lineno="1197">
 <summary>
 Delete X server log files.
 </summary>
@@ -111634,7 +112540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xkb_libs" lineno="1245">
+<interface name="xserver_read_xkb_libs" lineno="1218">
 <summary>
 Read X keyboard extension libraries.
 </summary>
@@ -111644,7 +112550,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1266">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1239">
 <summary>
 Create xdm temporary directories.
 </summary>
@@ -111654,7 +112560,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1284">
+<interface name="xserver_read_xdm_tmp_files" lineno="1257">
 <summary>
 Read xdm temporary files.
 </summary>
@@ -111664,7 +112570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1303">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1276">
 <summary>
 Do not audit attempts to read xdm temporary files.
 </summary>
@@ -111674,7 +112580,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1322">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1295">
 <summary>
 Read write xdm temporary files.
 </summary>
@@ -111684,7 +112590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1341">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1314">
 <summary>
 Create, read, write, and delete xdm temporary files.
 </summary>
@@ -111694,7 +112600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1360">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1333">
 <summary>
 Do not audit attempts to get the attributes of
 xdm temporary named sockets.
@@ -111705,7 +112611,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_list_xdm_tmp" lineno="1378">
+<interface name="xserver_list_xdm_tmp" lineno="1351">
 <summary>
 list xdm_tmp_t directories
 </summary>
@@ -111715,7 +112621,7 @@ Domain to allow
 </summary>
 </param>
 </interface>
-<interface name="xserver_domtrans" lineno="1396">
+<interface name="xserver_domtrans" lineno="1369">
 <summary>
 Execute the X server in the X server domain.
 </summary>
@@ -111725,7 +112631,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="xserver_signal" lineno="1415">
+<interface name="xserver_signal" lineno="1388">
 <summary>
 Signal X servers
 </summary>
@@ -111735,7 +112641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_kill" lineno="1433">
+<interface name="xserver_kill" lineno="1406">
 <summary>
 Kill X servers
 </summary>
@@ -111745,7 +112651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_state" lineno="1451">
+<interface name="xserver_read_state" lineno="1424">
 <summary>
 Allow reading xserver_t files to get cgroup and sessionid
 </summary>
@@ -111755,7 +112661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_shm" lineno="1471">
+<interface name="xserver_rw_shm" lineno="1444">
 <summary>
 Read and write X server Sys V Shared
 memory segments.
@@ -111766,7 +112672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1490">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1463">
 <summary>
 Do not audit attempts to read and write to
 X server sockets.
@@ -111777,7 +112683,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1509">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1482">
 <summary>
 Do not audit attempts to read and write X server
 unix domain stream sockets.
@@ -111788,7 +112694,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_stream_connect" lineno="1528">
+<interface name="xserver_stream_connect" lineno="1501">
 <summary>
 Connect to the X server over a unix domain
 stream socket.
@@ -111799,7 +112705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_tmp_files" lineno="1547">
+<interface name="xserver_read_tmp_files" lineno="1520">
 <summary>
 Read X server temporary files.
 </summary>
@@ -111809,7 +112715,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dbus_chat" lineno="1566">
+<interface name="xserver_dbus_chat" lineno="1539">
 <summary>
 talk to xserver_t by dbus
 </summary>
@@ -111819,7 +112725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_core_devices" lineno="1587">
+<interface name="xserver_manage_core_devices" lineno="1560">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Gives the domain permission to read the
@@ -111831,7 +112737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_unconfined" lineno="1610">
+<interface name="xserver_unconfined" lineno="1583">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Gives the domain complete control over the
@@ -111843,7 +112749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xdm_keys" lineno="1630">
+<interface name="xserver_rw_xdm_keys" lineno="1603">
 <summary>
 Manage keys for xdm.
 </summary>
@@ -111853,7 +112759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_link_xdm_keys" lineno="1648">
+<interface name="xserver_link_xdm_keys" lineno="1621">
 <summary>
 Manage keys for xdm.
 </summary>
@@ -111863,7 +112769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1666">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1639">
 <summary>
 Read and write the mesa shader cache.
 </summary>
@@ -111873,6 +112779,16 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="xserver_manage_mesa_shader_cache" lineno="1660">
+<summary>
+Manage the mesa shader cache.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
 <tunable name="allow_write_xshm" dftval="false">
 <desc>
 <p>
@@ -111903,6 +112819,13 @@ Support X userspace object manager
 </p>
 </desc>
 </tunable>
+<tunable name="xserver_allow_dri" dftval="false">
+<desc>
+<p>
+Allow DRI access
+</p>
+</desc>
+</tunable>
 </module>
 <module name="zabbix" filename="policy/modules/services/zabbix.if">
 <summary>Distributed infrastructure monitoring.</summary>
@@ -111949,7 +112872,7 @@ Domain allowed access.
 </interface>
 <interface name="zabbix_read_pid_files" lineno="91">
 <summary>
-Read zabbix pid files.
+Read zabbix pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -111957,7 +112880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="zabbix_agent_tcp_connect" lineno="110">
+<interface name="zabbix_agent_tcp_connect" lineno="105">
 <summary>
 Connect to zabbix agent on the TCP network.
 </summary>
@@ -111967,7 +112890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="zabbix_admin" lineno="137">
+<interface name="zabbix_admin" lineno="132">
 <summary>
 All of the rules required to
 administrate an zabbix environment.
@@ -112164,7 +113087,7 @@ Type to be used as a domain type.
 <interface name="application_executable_file" lineno="36">
 <summary>
 Make the specified type usable for files
-that are exectuables, such as binary programs.
+that are executables, such as binary programs.
 This does not include shared libraries.
 </summary>
 <param name="type">
@@ -112301,7 +113224,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_use_pam_systemd" lineno="103">
+<interface name="auth_use_pam_systemd" lineno="99">
 <summary>
 Use the pam module systemd during authentication.
 </summary>
@@ -112311,7 +113234,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_use_pam_motd_dynamic" lineno="120">
+<interface name="auth_use_pam_motd_dynamic" lineno="116">
 <summary>
 Use the pam module motd with dynamic support during authentication.
 This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071)
@@ -112323,7 +113246,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_login_pgm_domain" lineno="144">
+<interface name="auth_login_pgm_domain" lineno="140">
 <summary>
 Make the specified domain used for a login program.
 </summary>
@@ -112333,7 +113256,7 @@ Domain type used for a login program domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_login_entry_type" lineno="231">
+<interface name="auth_login_entry_type" lineno="227">
 <summary>
 Use the login program as an entry point program.
 </summary>
@@ -112343,7 +113266,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_login_program" lineno="254">
+<interface name="auth_domtrans_login_program" lineno="250">
 <summary>
 Execute a login_program in the target domain.
 </summary>
@@ -112358,7 +113281,7 @@ The type of the login_program process.
 </summary>
 </param>
 </interface>
-<interface name="auth_ranged_domtrans_login_program" lineno="284">
+<interface name="auth_ranged_domtrans_login_program" lineno="280">
 <summary>
 Execute a login_program in the target domain,
 with a range transition.
@@ -112379,7 +113302,7 @@ Range of the login program.
 </summary>
 </param>
 </interface>
-<interface name="auth_search_cache" lineno="310">
+<interface name="auth_search_cache" lineno="306">
 <summary>
 Search authentication cache
 </summary>
@@ -112389,7 +113312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_cache" lineno="328">
+<interface name="auth_read_cache" lineno="324">
 <summary>
 Read authentication cache
 </summary>
@@ -112399,7 +113322,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_cache" lineno="346">
+<interface name="auth_rw_cache" lineno="342">
 <summary>
 Read/Write authentication cache
 </summary>
@@ -112409,7 +113332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_cache" lineno="364">
+<interface name="auth_manage_cache" lineno="360">
 <summary>
 Manage authentication cache
 </summary>
@@ -112419,7 +113342,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_var_filetrans_cache" lineno="383">
+<interface name="auth_var_filetrans_cache" lineno="379">
 <summary>
 Automatic transition from cache_t to cache.
 </summary>
@@ -112429,7 +113352,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_chk_passwd" lineno="401">
+<interface name="auth_domtrans_chk_passwd" lineno="397">
 <summary>
 Run unix_chkpwd to check a password.
 </summary>
@@ -112439,7 +113362,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_chkpwd" lineno="449">
+<interface name="auth_domtrans_chkpwd" lineno="445">
 <summary>
 Run unix_chkpwd to check a password.
 Stripped down version to be called within boolean
@@ -112450,7 +113373,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_run_chk_passwd" lineno="475">
+<interface name="auth_run_chk_passwd" lineno="471">
 <summary>
 Execute chkpwd programs in the chkpwd domain.
 </summary>
@@ -112465,7 +113388,7 @@ The role to allow the chkpwd domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_upd_passwd" lineno="494">
+<interface name="auth_domtrans_upd_passwd" lineno="490">
 <summary>
 Execute a domain transition to run unix_update.
 </summary>
@@ -112475,7 +113398,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_run_upd_passwd" lineno="519">
+<interface name="auth_run_upd_passwd" lineno="515">
 <summary>
 Execute updpwd programs in the updpwd domain.
 </summary>
@@ -112490,7 +113413,7 @@ The role to allow the updpwd domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_getattr_shadow" lineno="538">
+<interface name="auth_getattr_shadow" lineno="534">
 <summary>
 Get the attributes of the shadow passwords file.
 </summary>
@@ -112500,7 +113423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_getattr_shadow" lineno="558">
+<interface name="auth_dontaudit_getattr_shadow" lineno="554">
 <summary>
 Do not audit attempts to get the attributes
 of the shadow passwords file.
@@ -112511,7 +113434,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_shadow" lineno="580">
+<interface name="auth_read_shadow" lineno="576">
 <summary>
 Read the shadow passwords file (/etc/shadow)
 </summary>
@@ -112521,7 +113444,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_can_read_shadow_passwords" lineno="604">
+<interface name="auth_map_shadow" lineno="591">
+<summary>
+Map the shadow passwords file (/etc/shadow)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_can_read_shadow_passwords" lineno="617">
 <summary>
 Pass shadow assertion for reading.
 </summary>
@@ -112540,7 +113473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_tunable_read_shadow" lineno="630">
+<interface name="auth_tunable_read_shadow" lineno="643">
 <summary>
 Read the shadow password file.
 </summary>
@@ -112558,7 +113491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_read_shadow" lineno="650">
+<interface name="auth_dontaudit_read_shadow" lineno="663">
 <summary>
 Do not audit attempts to read the shadow
 password file (/etc/shadow).
@@ -112569,7 +113502,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_shadow" lineno="668">
+<interface name="auth_rw_shadow" lineno="681">
 <summary>
 Read and write the shadow password file (/etc/shadow).
 </summary>
@@ -112579,7 +113512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_shadow" lineno="690">
+<interface name="auth_manage_shadow" lineno="703">
 <summary>
 Create, read, write, and delete the shadow
 password file.
@@ -112590,7 +113523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_etc_filetrans_shadow" lineno="710">
+<interface name="auth_etc_filetrans_shadow" lineno="723">
 <summary>
 Automatic transition from etc to shadow.
 </summary>
@@ -112600,7 +113533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabelto_shadow" lineno="729">
+<interface name="auth_relabelto_shadow" lineno="742">
 <summary>
 Relabel to the shadow
 password file type.
@@ -112611,7 +113544,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_shadow" lineno="751">
+<interface name="auth_relabel_shadow" lineno="764">
 <summary>
 Relabel from and to the shadow
 password file type.
@@ -112622,7 +113555,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_append_faillog" lineno="772">
+<interface name="auth_append_faillog" lineno="785">
 <summary>
 Append to the login failure log.
 </summary>
@@ -112632,7 +113565,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_create_faillog_files" lineno="791">
+<interface name="auth_create_faillog_files" lineno="804">
 <summary>
 Create fail log lock (in /run/faillock).
 </summary>
@@ -112642,7 +113575,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_faillog" lineno="809">
+<interface name="auth_rw_faillog" lineno="822">
 <summary>
 Read and write the login failure log.
 </summary>
@@ -112652,7 +113585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_faillog" lineno="828">
+<interface name="auth_manage_faillog" lineno="841">
 <summary>
 Manage the login failure logs.
 </summary>
@@ -112662,7 +113595,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_setattr_faillog_files" lineno="847">
+<interface name="auth_setattr_faillog_files" lineno="860">
 <summary>
 Setattr the login failure logs.
 </summary>
@@ -112672,7 +113605,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_lastlog" lineno="866">
+<interface name="auth_read_lastlog" lineno="879">
 <summary>
 Read the last logins log.
 </summary>
@@ -112683,7 +113616,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="auth_append_lastlog" lineno="885">
+<interface name="auth_append_lastlog" lineno="898">
 <summary>
 Append only to the last logins log.
 </summary>
@@ -112693,7 +113626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_lastlog" lineno="904">
+<interface name="auth_relabel_lastlog" lineno="917">
 <summary>
 relabel the last logins log.
 </summary>
@@ -112703,7 +113636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_lastlog" lineno="923">
+<interface name="auth_rw_lastlog" lineno="936">
 <summary>
 Read and write to the last logins log.
 </summary>
@@ -112713,7 +113646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_lastlog" lineno="942">
+<interface name="auth_manage_lastlog" lineno="955">
 <summary>
 Manage the last logins log.
 </summary>
@@ -112723,7 +113656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_pam" lineno="961">
+<interface name="auth_domtrans_pam" lineno="974">
 <summary>
 Execute pam programs in the pam domain.
 </summary>
@@ -112733,7 +113666,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_signal_pam" lineno="979">
+<interface name="auth_signal_pam" lineno="992">
 <summary>
 Send generic signals to pam processes.
 </summary>
@@ -112743,7 +113676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_run_pam" lineno="1002">
+<interface name="auth_run_pam" lineno="1015">
 <summary>
 Execute pam programs in the PAM domain.
 </summary>
@@ -112758,7 +113691,7 @@ The role to allow the PAM domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_exec_pam" lineno="1021">
+<interface name="auth_exec_pam" lineno="1034">
 <summary>
 Execute the pam program.
 </summary>
@@ -112768,7 +113701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_var_auth" lineno="1040">
+<interface name="auth_read_var_auth" lineno="1053">
 <summary>
 Read var auth files. Used by various other applications
 and pam applets etc.
@@ -112779,7 +113712,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_var_auth" lineno="1060">
+<interface name="auth_rw_var_auth" lineno="1073">
 <summary>
 Read and write var auth files. Used by various other applications
 and pam applets etc.
@@ -112790,7 +113723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_var_auth" lineno="1080">
+<interface name="auth_manage_var_auth" lineno="1093">
 <summary>
 Manage var auth files. Used by various other applications
 and pam applets etc.
@@ -112801,9 +113734,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_pam_pid" lineno="1101">
+<interface name="auth_read_pam_pid" lineno="1114">
 <summary>
-Read PAM PID files.
+Read PAM PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -112811,9 +113744,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_read_pam_pid" lineno="1121">
+<interface name="auth_dontaudit_read_pam_pid" lineno="1129">
 <summary>
-Do not audit attemps to read PAM PID files.
+Do not audit attempts to read PAM PID files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -112821,12 +113754,64 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_pid_filetrans_pam_var_run" lineno="1152">
+<interface name="auth_pid_filetrans_pam_var_run" lineno="1157">
 <summary>
 Create specified objects in
 pid directories with the pam var
 run file type using a
-file type transition.
+file type transition.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="auth_delete_pam_pid" lineno="1172">
+<summary>
+Delete pam PID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_pam_pid" lineno="1187">
+<summary>
+Manage pam PID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_pam_runtime_dirs" lineno="1203">
+<summary>
+Manage pam runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_runtime_filetrans_pam_runtime" lineno="1234">
+<summary>
+Create specified objects in
+pid directories with the pam runtime
+file type using a type transition.
 </summary>
 <param name="domain">
 <summary>
@@ -112844,9 +113829,9 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="auth_delete_pam_pid" lineno="1170">
+<interface name="auth_read_pam_runtime_files" lineno="1252">
 <summary>
-Delete pam PID files.
+Read PAM runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -112854,9 +113839,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_pam_pid" lineno="1190">
+<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1272">
 <summary>
-Manage pam PID files.
+Do not audit attempts to read PAM runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="auth_delete_pam_runtime_files" lineno="1290">
+<summary>
+Delete pam runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_pam_runtime_files" lineno="1309">
+<summary>
+Create, read, write, and delete pam runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -112864,7 +113869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_pam_console" lineno="1210">
+<interface name="auth_domtrans_pam_console" lineno="1328">
 <summary>
 Execute pam_console with a domain transition.
 </summary>
@@ -112874,7 +113879,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_search_pam_console_data" lineno="1229">
+<interface name="auth_search_pam_console_data" lineno="1347">
 <summary>
 Search the contents of the
 pam_console data directory.
@@ -112885,7 +113890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_list_pam_console_data" lineno="1249">
+<interface name="auth_list_pam_console_data" lineno="1367">
 <summary>
 List the contents of the pam_console
 data directory.
@@ -112896,7 +113901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1268">
+<interface name="auth_create_pam_console_data_dirs" lineno="1386">
 <summary>
 Create pam var console pid directories.
 </summary>
@@ -112906,7 +113911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1287">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1405">
 <summary>
 Relabel pam_console data directories.
 </summary>
@@ -112916,7 +113921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_pam_console_data" lineno="1305">
+<interface name="auth_read_pam_console_data" lineno="1423">
 <summary>
 Read pam_console data files.
 </summary>
@@ -112926,7 +113931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_pam_console_data" lineno="1326">
+<interface name="auth_manage_pam_console_data" lineno="1444">
 <summary>
 Create, read, write, and delete
 pam_console data files.
@@ -112937,7 +113942,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_delete_pam_console_data" lineno="1346">
+<interface name="auth_delete_pam_console_data" lineno="1464">
 <summary>
 Delete pam_console data.
 </summary>
@@ -112947,11 +113952,34 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_pid_filetrans_pam_var_console" lineno="1379">
+<interface name="auth_pid_filetrans_pam_var_console" lineno="1497">
 <summary>
 Create specified objects in
 pid directories with the pam var
 console pid file type using a
+file type transition.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="auth_runtime_filetrans_pam_var_console" lineno="1525">
+<summary>
+Create specified objects in generic
+runtime directories with the pam var
+console runtime file type using a
 file type transition.
 </summary>
 <param name="domain">
@@ -112970,7 +113998,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_utempter" lineno="1397">
+<interface name="auth_domtrans_utempter" lineno="1543">
 <summary>
 Execute utempter programs in the utempter domain.
 </summary>
@@ -112980,7 +114008,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_run_utempter" lineno="1420">
+<interface name="auth_run_utempter" lineno="1566">
 <summary>
 Execute utempter programs in the utempter domain.
 </summary>
@@ -112995,9 +114023,9 @@ The role to allow the utempter domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1439">
+<interface name="auth_dontaudit_exec_utempter" lineno="1585">
 <summary>
-Do not audit attemps to execute utempter executable.
+Do not audit attempts to execute utempter executable.
 </summary>
 <param name="domain">
 <summary>
@@ -113005,7 +114033,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_setattr_login_records" lineno="1457">
+<interface name="auth_setattr_login_records" lineno="1603">
 <summary>
 Set the attributes of login record files.
 </summary>
@@ -113015,7 +114043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_login_records" lineno="1477">
+<interface name="auth_read_login_records" lineno="1623">
 <summary>
 Read login records files (/var/log/wtmp).
 </summary>
@@ -113026,7 +114054,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1498">
+<interface name="auth_dontaudit_read_login_records" lineno="1644">
 <summary>
 Do not audit attempts to read login records
 files (/var/log/wtmp).
@@ -113038,7 +114066,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1517">
+<interface name="auth_dontaudit_write_login_records" lineno="1663">
 <summary>
 Do not audit attempts to write to
 login records files.
@@ -113049,7 +114077,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_append_login_records" lineno="1535">
+<interface name="auth_append_login_records" lineno="1681">
 <summary>
 Append to login records (wtmp).
 </summary>
@@ -113059,7 +114087,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_write_login_records" lineno="1554">
+<interface name="auth_write_login_records" lineno="1700">
 <summary>
 Write to login records (wtmp).
 </summary>
@@ -113069,7 +114097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_login_records" lineno="1572">
+<interface name="auth_rw_login_records" lineno="1718">
 <summary>
 Read and write login records.
 </summary>
@@ -113079,7 +114107,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_log_filetrans_login_records" lineno="1592">
+<interface name="auth_log_filetrans_login_records" lineno="1738">
 <summary>
 Create a login records in the log directory
 using a type transition.
@@ -113090,7 +114118,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_login_records" lineno="1611">
+<interface name="auth_manage_login_records" lineno="1757">
 <summary>
 Create, read, write, and delete login
 records files.
@@ -113101,7 +114129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_login_records" lineno="1630">
+<interface name="auth_relabel_login_records" lineno="1776">
 <summary>
 Relabel login record files.
 </summary>
@@ -113111,7 +114139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_use_nsswitch" lineno="1658">
+<interface name="auth_use_nsswitch" lineno="1804">
 <summary>
 Use nsswitch to look up user, password, group, or
 host information.
@@ -113131,7 +114159,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="auth_unconfined" lineno="1686">
+<interface name="auth_unconfined" lineno="1832">
 <summary>
 Unconfined access to the authlogin module.
 </summary>
@@ -113612,105 +114640,6 @@ Domain allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="hotplug" filename="policy/modules/system/hotplug.if">
-<summary>
-Policy for hotplug system, for supporting the
-connection and disconnection of devices at runtime.
-</summary>
-<interface name="hotplug_domtrans" lineno="16">
-<summary>
-Execute hotplug with a domain transition.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_exec" lineno="35">
-<summary>
-Execute hotplug in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_use_fds" lineno="54">
-<summary>
-Inherit and use hotplug file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_dontaudit_use_fds" lineno="73">
-<summary>
-Do not audit attempts to inherit
-hotplug file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_dontaudit_search_config" lineno="92">
-<summary>
-Do not audit attempts to search the
-hotplug configuration directories.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_getattr_config_dirs" lineno="110">
-<summary>
-Get the attributes of the hotplug configuration directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_search_config" lineno="128">
-<summary>
-Search the hotplug configuration directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_read_config" lineno="147">
-<summary>
-Read the configuration files for hotplug.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="hotplug_search_pids" lineno="168">
-<summary>
-Search the hotplug PIDs.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
 <module name="init" filename="policy/modules/system/init.if">
 <summary>System initialization programs (init and init scripts).</summary>
 <interface name="init_mountpoint" lineno="17">
@@ -113894,7 +114823,7 @@ Type of the program to be used as an entry point to this domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_ranged_daemon_domain" lineno="412">
+<interface name="init_ranged_daemon_domain" lineno="415">
 <summary>
 Create a domain for long running processes
 (daemons/services) which are started by init scripts,
@@ -113936,7 +114865,7 @@ MLS/MCS range for the domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_abstract_socket_activation" lineno="443">
+<interface name="init_abstract_socket_activation" lineno="446">
 <summary>
 Abstract socket service activation (systemd).
 </summary>
@@ -113946,7 +114875,7 @@ The domain to be started by systemd socket activation.
 </summary>
 </param>
 </interface>
-<interface name="init_named_socket_activation" lineno="468">
+<interface name="init_named_socket_activation" lineno="471">
 <summary>
 Named socket service activation (systemd).
 </summary>
@@ -113961,7 +114890,7 @@ The domain socket file type.
 </summary>
 </param>
 </interface>
-<interface name="init_system_domain" lineno="519">
+<interface name="init_system_domain" lineno="522">
 <summary>
 Create a domain for short running processes
 which are started by init scripts.
@@ -113998,7 +114927,7 @@ Type of the program to be used as an entry point to this domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_ranged_system_domain" lineno="581">
+<interface name="init_ranged_system_domain" lineno="584">
 <summary>
 Create a domain for short running processes
 which are started by init scripts.
@@ -114041,7 +114970,7 @@ Range for the domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_dyntrans" lineno="612">
+<interface name="init_dyntrans" lineno="615">
 <summary>
 Allow domain dyntransition to init_t domain.
 </summary>
@@ -114051,9 +114980,30 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_pid_file" lineno="641">
+<interface name="init_daemon_pid_file" lineno="644">
 <summary>
 Mark the file type as a daemon pid file, allowing initrc_t
+to create it  (Deprecated)
+</summary>
+<param name="filetype">
+<summary>
+Type to mark as a daemon pid file
+</summary>
+</param>
+<param name="class">
+<summary>
+Class on which the type is applied
+</summary>
+</param>
+<param name="filename">
+<summary>
+Filename of the file that the init script creates
+</summary>
+</param>
+</interface>
+<interface name="init_daemon_runtime_file" lineno="671">
+<summary>
+Mark the file type as a daemon runtime file, allowing initrc_t
 to create it
 </summary>
 <param name="filetype">
@@ -114072,7 +115022,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_lock_file" lineno="674">
+<interface name="init_daemon_lock_file" lineno="704">
 <summary>
 Mark the file type as a daemon lock file, allowing initrc_t
 to create it
@@ -114093,7 +115043,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans" lineno="696">
+<interface name="init_domtrans" lineno="726">
 <summary>
 Execute init (/sbin/init) with a domain transition.
 </summary>
@@ -114103,7 +115053,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="720">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="750">
 <summary>
 Execute init (/sbin/init) with a domain transition
 to the provided domain.
@@ -114119,7 +115069,7 @@ The type to be used as a systemd --user domain.
 </summary>
 </param>
 </interface>
-<interface name="init_exec" lineno="748">
+<interface name="init_exec" lineno="778">
 <summary>
 Execute the init program in the caller domain.
 </summary>
@@ -114130,7 +115080,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_pgm_entrypoint" lineno="769">
+<interface name="init_pgm_entrypoint" lineno="799">
 <summary>
 Allow the init program to be an entrypoint
 for the specified domain.
@@ -114142,7 +115092,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_exec_rc" lineno="798">
+<interface name="init_exec_rc" lineno="828">
 <summary>
 Execute the rc application in the caller domain.
 </summary>
@@ -114163,7 +115113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid" lineno="817">
+<interface name="init_getpgid" lineno="847">
 <summary>
 Get the process group of init.
 </summary>
@@ -114173,7 +115123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal" lineno="835">
+<interface name="init_signal" lineno="865">
 <summary>
 Send init a generic signal.
 </summary>
@@ -114183,7 +115133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull" lineno="853">
+<interface name="init_signull" lineno="883">
 <summary>
 Send init a null signal.
 </summary>
@@ -114193,7 +115143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld" lineno="871">
+<interface name="init_sigchld" lineno="901">
 <summary>
 Send init a SIGCHLD signal.
 </summary>
@@ -114203,9 +115153,20 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect" lineno="889">
+<interface name="init_stream_connect" lineno="919">
+<summary>
+Connect to init with a unix socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_unix_stream_socket_connectto" lineno="940">
 <summary>
 Connect to init with a unix socket.
+Without any additional permissions.
 </summary>
 <param name="domain">
 <summary>
@@ -114213,7 +115174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_fds" lineno="949">
+<interface name="init_use_fds" lineno="998">
 <summary>
 Inherit and use file descriptors from init.
 </summary>
@@ -114263,7 +115224,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="1"/>
 </interface>
-<interface name="init_dontaudit_use_fds" lineno="968">
+<interface name="init_dontaudit_use_fds" lineno="1017">
 <summary>
 Do not audit attempts to inherit file
 descriptors from init.
@@ -114274,7 +115235,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dgram_send" lineno="987">
+<interface name="init_dgram_send" lineno="1036">
 <summary>
 Send messages to init unix datagram sockets.
 </summary>
@@ -114285,7 +115246,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1007">
+<interface name="init_rw_inherited_stream_socket" lineno="1056">
 <summary>
 Read and write to inherited init unix streams.
 </summary>
@@ -114295,7 +115256,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_stream_sockets" lineno="1026">
+<interface name="init_rw_stream_sockets" lineno="1075">
 <summary>
 Allow the specified domain to read/write to
 init with unix domain stream sockets.
@@ -114306,7 +115267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_system" lineno="1044">
+<interface name="init_start_system" lineno="1093">
 <summary>
 start service (systemd).
 </summary>
@@ -114316,7 +115277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_system" lineno="1062">
+<interface name="init_stop_system" lineno="1111">
 <summary>
 stop service (systemd).
 </summary>
@@ -114326,7 +115287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_system_status" lineno="1080">
+<interface name="init_get_system_status" lineno="1129">
 <summary>
 Get all service status (systemd).
 </summary>
@@ -114336,7 +115297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_enable" lineno="1098">
+<interface name="init_enable" lineno="1147">
 <summary>
 Enable all systemd services (systemd).
 </summary>
@@ -114346,7 +115307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_disable" lineno="1116">
+<interface name="init_disable" lineno="1165">
 <summary>
 Disable all services (systemd).
 </summary>
@@ -114356,7 +115317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reload" lineno="1134">
+<interface name="init_reload" lineno="1183">
 <summary>
 Reload all services (systemd).
 </summary>
@@ -114366,7 +115327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reboot_system" lineno="1152">
+<interface name="init_reboot_system" lineno="1201">
 <summary>
 Reboot the system (systemd).
 </summary>
@@ -114376,7 +115337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_shutdown_system" lineno="1170">
+<interface name="init_shutdown_system" lineno="1219">
 <summary>
 Shutdown (halt) the system (systemd).
 </summary>
@@ -114386,7 +115347,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_status" lineno="1188">
+<interface name="init_service_status" lineno="1237">
 <summary>
 Allow specified domain to get init status
 </summary>
@@ -114396,7 +115357,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_start" lineno="1207">
+<interface name="init_service_start" lineno="1256">
 <summary>
 Allow specified domain to get init start
 </summary>
@@ -114406,7 +115367,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat" lineno="1227">
+<interface name="init_dbus_chat" lineno="1276">
 <summary>
 Send and receive messages from
 systemd over dbus.
@@ -114417,7 +115378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_var_lib_links" lineno="1247">
+<interface name="init_read_var_lib_links" lineno="1296">
 <summary>
 read/follow symlinks under /var/lib/systemd/
 </summary>
@@ -114427,7 +115388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_var_lib_dirs" lineno="1266">
+<interface name="init_list_var_lib_dirs" lineno="1315">
 <summary>
 List /var/lib/systemd/ dir
 </summary>
@@ -114437,7 +115398,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1284">
+<interface name="init_relabel_var_lib_dirs" lineno="1333">
 <summary>
 Relabel dirs in /var/lib/systemd/.
 </summary>
@@ -114447,7 +115408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_var_lib_files" lineno="1302">
+<interface name="init_manage_var_lib_files" lineno="1351">
 <summary>
 Manage files in /var/lib/systemd/.
 </summary>
@@ -114457,7 +115418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_var_lib_filetrans" lineno="1337">
+<interface name="init_var_lib_filetrans" lineno="1386">
 <summary>
 Create files in /var/lib/systemd
 with an automatic type transition.
@@ -114483,9 +115444,9 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_search_pids" lineno="1356">
+<interface name="init_search_pids" lineno="1405">
 <summary>
-Allow search  directory in the /run/systemd directory.
+Allow search  directory in the /run/systemd directory.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -114493,9 +115454,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_pids" lineno="1374">
+<interface name="init_list_pids" lineno="1420">
 <summary>
-Allow listing of the /run/systemd directory.
+Allow listing of the /run/systemd directory.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -114503,9 +115464,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_pid_symlinks" lineno="1393">
+<interface name="init_manage_pid_symlinks" lineno="1435">
 <summary>
-Create symbolic links in the /run/systemd directory.
+Create symbolic links in the /run/systemd directory.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -114513,9 +115474,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_pid_files" lineno="1411">
+<interface name="init_create_pid_files" lineno="1450">
 <summary>
-Create files in the /run/systemd directory.
+Create files in the /run/systemd directory.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -114523,9 +115484,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_pid_files" lineno="1429">
+<interface name="init_write_pid_files" lineno="1465">
 <summary>
-Write files in the /run/systemd directory.
+Write files in the /run/systemd directory.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -114533,7 +115494,63 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_pid_dirs" lineno="1448">
+<interface name="init_manage_pid_dirs" lineno="1481">
+<summary>
+Create, read, write, and delete
+directories in the /run/systemd directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_pid_filetrans" lineno="1511">
+<summary>
+Create files in an init PID directory.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="file_type">
+<summary>
+The type of the object to be created
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The object class.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="init_search_runtime" lineno="1526">
+<summary>
+Search init runtime directories, e.g. /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_list_runtime" lineno="1544">
+<summary>
+List init runtime directories, e.g. /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_runtime_dirs" lineno="1564">
 <summary>
 Create, read, write, and delete
 directories in the /run/systemd directory.
@@ -114544,9 +115561,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_pid_filetrans" lineno="1481">
+<interface name="init_runtime_filetrans" lineno="1597">
 <summary>
-Create files in an init PID directory.
+Create files in an init runtime directory with a private type.
 </summary>
 <param name="domain">
 <summary>
@@ -114569,7 +115586,37 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_initctl" lineno="1500">
+<interface name="init_write_runtime_files" lineno="1616">
+<summary>
+Write init runtime files, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_create_runtime_files" lineno="1634">
+<summary>
+Create init runtime files, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_runtime_symlinks" lineno="1652">
+<summary>
+Create init runtime symbolic links, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_getattr_initctl" lineno="1670">
 <summary>
 Get the attributes of initctl.
 </summary>
@@ -114579,7 +115626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1521">
+<interface name="init_dontaudit_getattr_initctl" lineno="1691">
 <summary>
 Do not audit attempts to get the
 attributes of initctl.
@@ -114590,7 +115637,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_initctl" lineno="1539">
+<interface name="init_write_initctl" lineno="1709">
 <summary>
 Write to initctl.
 </summary>
@@ -114600,7 +115647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_telinit" lineno="1560">
+<interface name="init_telinit" lineno="1730">
 <summary>
 Use telinit (Read and write initctl).
 </summary>
@@ -114611,7 +115658,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_initctl" lineno="1593">
+<interface name="init_rw_initctl" lineno="1763">
 <summary>
 Read and write initctl.
 </summary>
@@ -114621,7 +115668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1614">
+<interface name="init_dontaudit_rw_initctl" lineno="1784">
 <summary>
 Do not audit attempts to read and
 write initctl.
@@ -114632,7 +115679,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_entry_type" lineno="1633">
+<interface name="init_script_file_entry_type" lineno="1803">
 <summary>
 Make init scripts an entry point for
 the specified domain.
@@ -114643,7 +115690,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_spec_domtrans_script" lineno="1656">
+<interface name="init_spec_domtrans_script" lineno="1826">
 <summary>
 Execute init scripts with a specified domain transition.
 </summary>
@@ -114653,7 +115700,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_script" lineno="1683">
+<interface name="init_domtrans_script" lineno="1853">
 <summary>
 Execute init scripts with an automatic domain transition.
 </summary>
@@ -114663,7 +115710,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_labeled_script" lineno="1718">
+<interface name="init_domtrans_labeled_script" lineno="1888">
 <summary>
 Execute labelled init scripts with an automatic domain transition.
 </summary>
@@ -114673,7 +115720,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_domtrans" lineno="1764">
+<interface name="init_script_file_domtrans" lineno="1934">
 <summary>
 Execute a init script in a specified domain.
 </summary>
@@ -114698,7 +115745,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="init_kill_scripts" lineno="1783">
+<interface name="init_kill_scripts" lineno="1953">
 <summary>
 Send a kill signal to init scripts.
 </summary>
@@ -114708,7 +115755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_script_service" lineno="1801">
+<interface name="init_manage_script_service" lineno="1971">
 <summary>
 Allow manage service for initrc_exec_t scripts
 </summary>
@@ -114718,7 +115765,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_labeled_script_domtrans" lineno="1826">
+<interface name="init_labeled_script_domtrans" lineno="1996">
 <summary>
 Transition to the init script domain
 on a specified labeled init script.
@@ -114734,7 +115781,7 @@ Labeled init script file.
 </summary>
 </param>
 </interface>
-<interface name="init_all_labeled_script_domtrans" lineno="1848">
+<interface name="init_all_labeled_script_domtrans" lineno="2018">
 <summary>
 Transition to the init script domain
 for all labeled init script types
@@ -114745,7 +115792,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_get_script_status" lineno="1866">
+<interface name="init_get_script_status" lineno="2036">
 <summary>
 Allow getting service status of initrc_exec_t scripts
 </summary>
@@ -114755,7 +115802,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_service" lineno="1906">
+<interface name="init_startstop_service" lineno="2076">
 <summary>
 Allow the role to start and stop
 labeled services.
@@ -114786,7 +115833,7 @@ Systemd unit file type.
 </summary>
 </param>
 </interface>
-<interface name="init_run_daemon" lineno="1960">
+<interface name="init_run_daemon" lineno="2132">
 <summary>
 Start and stop daemon programs directly.
 </summary>
@@ -114808,7 +115855,7 @@ The role to be performing this action.
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_all_script_services" lineno="1982">
+<interface name="init_startstop_all_script_services" lineno="2154">
 <summary>
 Start and stop init_script_file_type services
 </summary>
@@ -114818,7 +115865,7 @@ domain that can start and stop the services
 </summary>
 </param>
 </interface>
-<interface name="init_read_state" lineno="2001">
+<interface name="init_read_state" lineno="2173">
 <summary>
 Read the process state (/proc/pid) of init.
 </summary>
@@ -114828,7 +115875,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_state" lineno="2021">
+<interface name="init_dontaudit_read_state" lineno="2193">
 <summary>
 Dontaudit read the process state (/proc/pid) of init.
 </summary>
@@ -114838,7 +115885,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_ptrace" lineno="2042">
+<interface name="init_ptrace" lineno="2214">
 <summary>
 Ptrace init
 </summary>
@@ -114849,7 +115896,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_getattr" lineno="2061">
+<interface name="init_getattr" lineno="2233">
 <summary>
 get init process stats
 </summary>
@@ -114860,7 +115907,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_read_script_pipes" lineno="2079">
+<interface name="init_read_script_pipes" lineno="2251">
 <summary>
 Read an init script unnamed pipe.
 </summary>
@@ -114870,7 +115917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_script_pipes" lineno="2097">
+<interface name="init_write_script_pipes" lineno="2269">
 <summary>
 Write an init script unnamed pipe.
 </summary>
@@ -114880,7 +115927,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_files" lineno="2115">
+<interface name="init_getattr_script_files" lineno="2287">
 <summary>
 Get the attribute of init script entrypoint files.
 </summary>
@@ -114890,7 +115937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_files" lineno="2134">
+<interface name="init_read_script_files" lineno="2306">
 <summary>
 Read init scripts.
 </summary>
@@ -114900,7 +115947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_script_files" lineno="2153">
+<interface name="init_exec_script_files" lineno="2325">
 <summary>
 Execute init scripts in the caller domain.
 </summary>
@@ -114910,7 +115957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_all_script_files" lineno="2172">
+<interface name="init_getattr_all_script_files" lineno="2344">
 <summary>
 Get the attribute of all init script entrypoint files.
 </summary>
@@ -114920,7 +115967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_all_script_files" lineno="2191">
+<interface name="init_read_all_script_files" lineno="2363">
 <summary>
 Read all init script files.
 </summary>
@@ -114930,7 +115977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2215">
+<interface name="init_dontaudit_read_all_script_files" lineno="2387">
 <summary>
 Dontaudit read all init script files.
 </summary>
@@ -114940,7 +115987,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_all_script_files" lineno="2233">
+<interface name="init_exec_all_script_files" lineno="2405">
 <summary>
 Execute all init scripts in the caller domain.
 </summary>
@@ -114950,7 +115997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_state" lineno="2252">
+<interface name="init_read_script_state" lineno="2424">
 <summary>
 Read the process state (/proc/pid) of the init scripts.
 </summary>
@@ -114960,7 +116007,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_fds" lineno="2271">
+<interface name="init_use_script_fds" lineno="2443">
 <summary>
 Inherit and use init script file descriptors.
 </summary>
@@ -114970,7 +116017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2290">
+<interface name="init_dontaudit_use_script_fds" lineno="2462">
 <summary>
 Do not audit attempts to inherit
 init script file descriptors.
@@ -114981,7 +116028,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_script_keys" lineno="2308">
+<interface name="init_search_script_keys" lineno="2480">
 <summary>
 Search init script keys.
 </summary>
@@ -114991,7 +116038,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid_script" lineno="2326">
+<interface name="init_getpgid_script" lineno="2498">
 <summary>
 Get the process group ID of init scripts.
 </summary>
@@ -115001,7 +116048,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld_script" lineno="2344">
+<interface name="init_sigchld_script" lineno="2516">
 <summary>
 Send SIGCHLD signals to init scripts.
 </summary>
@@ -115011,7 +116058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal_script" lineno="2362">
+<interface name="init_signal_script" lineno="2534">
 <summary>
 Send generic signals to init scripts.
 </summary>
@@ -115021,7 +116068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull_script" lineno="2380">
+<interface name="init_signull_script" lineno="2552">
 <summary>
 Send null signals to init scripts.
 </summary>
@@ -115031,7 +116078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_pipes" lineno="2398">
+<interface name="init_rw_script_pipes" lineno="2570">
 <summary>
 Read and write init script unnamed pipes.
 </summary>
@@ -115041,7 +116088,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect_script" lineno="2417">
+<interface name="init_stream_connect_script" lineno="2589">
 <summary>
 Allow the specified domain to connect to
 init scripts with a unix socket.
@@ -115052,7 +116099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_stream_sockets" lineno="2436">
+<interface name="init_rw_script_stream_sockets" lineno="2608">
 <summary>
 Allow the specified domain to read/write to
 init scripts with a unix domain stream sockets.
@@ -115063,7 +116110,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2455">
+<interface name="init_dontaudit_stream_connect_script" lineno="2627">
 <summary>
 Dont audit the specified domain connecting to
 init scripts with a unix domain stream socket.
@@ -115074,7 +116121,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_send_script" lineno="2472">
+<interface name="init_dbus_send_script" lineno="2644">
 <summary>
 Send messages to init scripts over dbus.
 </summary>
@@ -115084,7 +116131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat_script" lineno="2492">
+<interface name="init_dbus_chat_script" lineno="2664">
 <summary>
 Send and receive messages from
 init scripts over dbus.
@@ -115095,7 +116142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_ptys" lineno="2521">
+<interface name="init_use_script_ptys" lineno="2693">
 <summary>
 Read and write the init script pty.
 </summary>
@@ -115114,7 +116161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_inherited_script_ptys" lineno="2540">
+<interface name="init_use_inherited_script_ptys" lineno="2712">
 <summary>
 Read and write inherited init script ptys.
 </summary>
@@ -115124,7 +116171,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2562">
+<interface name="init_dontaudit_use_script_ptys" lineno="2734">
 <summary>
 Do not audit attempts to read and
 write the init script pty.
@@ -115135,7 +116182,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_status_files" lineno="2581">
+<interface name="init_getattr_script_status_files" lineno="2753">
 <summary>
 Get the attributes of init script
 status files.
@@ -115146,7 +116193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2600">
+<interface name="init_dontaudit_read_script_status_files" lineno="2772">
 <summary>
 Do not audit attempts to read init script
 status files.
@@ -115157,7 +116204,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_run" lineno="2619">
+<interface name="init_search_run" lineno="2791">
 <summary>
 Search the /run/systemd directory.
 </summary>
@@ -115167,7 +116214,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_tmp_files" lineno="2638">
+<interface name="init_read_script_tmp_files" lineno="2810">
 <summary>
 Read init script temporary data.
 </summary>
@@ -115177,7 +116224,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2657">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2829">
 <summary>
 Read and write init script inherited temporary data.
 </summary>
@@ -115187,7 +116234,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_tmp_files" lineno="2675">
+<interface name="init_rw_script_tmp_files" lineno="2847">
 <summary>
 Read and write init script temporary data.
 </summary>
@@ -115197,7 +116244,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_script_tmp_filetrans" lineno="2710">
+<interface name="init_script_tmp_filetrans" lineno="2882">
 <summary>
 Create files in a init script
 temporary data directory.
@@ -115223,7 +116270,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_utmp" lineno="2729">
+<interface name="init_getattr_utmp" lineno="2901">
 <summary>
 Get the attributes of init script process id files.
 </summary>
@@ -115233,7 +116280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_utmp" lineno="2747">
+<interface name="init_read_utmp" lineno="2919">
 <summary>
 Read utmp.
 </summary>
@@ -115243,7 +116290,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_write_utmp" lineno="2766">
+<interface name="init_dontaudit_write_utmp" lineno="2938">
 <summary>
 Do not audit attempts to write utmp.
 </summary>
@@ -115253,7 +116300,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_utmp" lineno="2784">
+<interface name="init_write_utmp" lineno="2956">
 <summary>
 Write to utmp.
 </summary>
@@ -115263,7 +116310,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_lock_utmp" lineno="2804">
+<interface name="init_dontaudit_lock_utmp" lineno="2976">
 <summary>
 Do not audit attempts to lock
 init script pid files.
@@ -115274,7 +116321,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_utmp" lineno="2822">
+<interface name="init_rw_utmp" lineno="2994">
 <summary>
 Read and write utmp.
 </summary>
@@ -115284,7 +116331,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_utmp" lineno="2841">
+<interface name="init_dontaudit_rw_utmp" lineno="3013">
 <summary>
 Do not audit attempts to read and write utmp.
 </summary>
@@ -115294,7 +116341,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_utmp" lineno="2859">
+<interface name="init_manage_utmp" lineno="3031">
 <summary>
 Create, read, write, and delete utmp.
 </summary>
@@ -115304,7 +116351,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_utmp" lineno="2878">
+<interface name="init_relabel_utmp" lineno="3050">
 <summary>
 Relabel utmp.
 </summary>
@@ -115314,7 +116361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_pid_filetrans_utmp" lineno="2897">
+<interface name="init_runtime_filetrans_utmp" lineno="3069">
 <summary>
 Create files in /var/run with the
 utmp file type.
@@ -115325,28 +116372,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_runtime_filetrans_utmp" lineno="2913">
-<summary>
-Create files in /var/run with the
-utmp file type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_create_pid_dirs" lineno="2931">
-<summary>
-Create a directory in the /run/systemd directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_create_runtime_dirs" lineno="2946">
+<interface name="init_create_runtime_dirs" lineno="3087">
 <summary>
 Create a directory in the /run/systemd directory.
 </summary>
@@ -115356,9 +116382,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rename_pid_files" lineno="2965">
+<interface name="init_read_runtime_files" lineno="3106">
 <summary>
-Rename init_runtime_t files
+Read init_runtime_t files
 </summary>
 <param name="domain">
 <summary>
@@ -115366,7 +116392,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_rename_runtime_files" lineno="2980">
+<interface name="init_rename_runtime_files" lineno="3124">
 <summary>
 Rename init_runtime_t files
 </summary>
@@ -115376,9 +116402,9 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_delete_pid_files" lineno="2998">
+<interface name="init_setattr_runtime_files" lineno="3142">
 <summary>
-Delete init_runtime_t files
+Setattr init_runtime_t files
 </summary>
 <param name="domain">
 <summary>
@@ -115386,7 +116412,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_delete_runtime_files" lineno="3013">
+<interface name="init_delete_runtime_files" lineno="3160">
 <summary>
 Delete init_runtime_t files
 </summary>
@@ -115396,7 +116422,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_write_pid_socket" lineno="3032">
+<interface name="init_write_runtime_socket" lineno="3179">
 <summary>
 Allow the specified domain to write to
 init sock file.
@@ -115407,28 +116433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_runtime_socket" lineno="3048">
-<summary>
-Allow the specified domain to write to
-init sock file.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_read_pid_pipes" lineno="3066">
-<summary>
-Read init unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_read_runtime_pipes" lineno="3081">
+<interface name="init_read_runtime_pipes" lineno="3197">
 <summary>
 Read init unnamed pipes.
 </summary>
@@ -115438,7 +116443,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_symlinks" lineno="3099">
+<interface name="init_read_runtime_symlinks" lineno="3215">
 <summary>
 read systemd unit symlinks (usually under /run/systemd/units/)
 </summary>
@@ -115448,7 +116453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3117">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3233">
 <summary>
 Allow the specified domain to connect to daemon with a tcp socket
 </summary>
@@ -115458,7 +116463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3135">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3251">
 <summary>
 Allow the specified domain to connect to daemon with a udp socket
 </summary>
@@ -115468,7 +116473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_status_files" lineno="3154">
+<interface name="init_read_script_status_files" lineno="3270">
 <summary>
 Allow reading the init script state files
 </summary>
@@ -115478,7 +116483,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_relabelto_script_state" lineno="3172">
+<interface name="init_relabelto_script_state" lineno="3288">
 <summary>
 Label to init script status files
 </summary>
@@ -115488,7 +116493,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_script_readable_type" lineno="3191">
+<interface name="init_script_readable_type" lineno="3307">
 <summary>
 Mark as a readable type for the initrc_t domain
 </summary>
@@ -115498,7 +116503,7 @@ Type that initrc_t needs read access to
 </summary>
 </param>
 </interface>
-<interface name="init_search_units" lineno="3209">
+<interface name="init_search_units" lineno="3325">
 <summary>
 Search systemd unit dirs.
 </summary>
@@ -115508,7 +116513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_unit_dirs" lineno="3234">
+<interface name="init_list_unit_dirs" lineno="3350">
 <summary>
 List systemd unit dirs.
 </summary>
@@ -115518,7 +116523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_generic_units_symlinks" lineno="3254">
+<interface name="init_read_generic_units_symlinks" lineno="3370">
 <summary>
 Read systemd unit links
 </summary>
@@ -115528,7 +116533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_generic_units_status" lineno="3272">
+<interface name="init_get_generic_units_status" lineno="3388">
 <summary>
 Get status of generic systemd units.
 </summary>
@@ -115538,7 +116543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_generic_units" lineno="3291">
+<interface name="init_start_generic_units" lineno="3407">
 <summary>
 Start generic systemd units.
 </summary>
@@ -115548,7 +116553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_generic_units" lineno="3310">
+<interface name="init_stop_generic_units" lineno="3426">
 <summary>
 Stop generic systemd units.
 </summary>
@@ -115558,7 +116563,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_generic_units" lineno="3329">
+<interface name="init_reload_generic_units" lineno="3445">
 <summary>
 Reload generic systemd units.
 </summary>
@@ -115568,7 +116573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_all_units_status" lineno="3348">
+<interface name="init_get_all_units_status" lineno="3464">
 <summary>
 Get status of all systemd units.
 </summary>
@@ -115578,7 +116583,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_all_units" lineno="3367">
+<interface name="init_manage_all_units" lineno="3483">
 <summary>
 All perms on all systemd units.
 </summary>
@@ -115588,7 +116593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_all_units" lineno="3387">
+<interface name="init_start_all_units" lineno="3503">
 <summary>
 Start all systemd units.
 </summary>
@@ -115598,7 +116603,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_all_units" lineno="3406">
+<interface name="init_stop_all_units" lineno="3522">
 <summary>
 Stop all systemd units.
 </summary>
@@ -115608,7 +116613,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_all_units" lineno="3425">
+<interface name="init_reload_all_units" lineno="3541">
 <summary>
 Reload all systemd units.
 </summary>
@@ -115618,7 +116623,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_admin" lineno="3444">
+<interface name="init_manage_all_unit_files" lineno="3560">
+<summary>
+Manage systemd unit dirs and the files in them
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_admin" lineno="3580">
 <summary>
 Allow unconfined access to send instructions to init
 </summary>
@@ -115628,7 +116643,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_getrlimit" lineno="3476">
+<interface name="init_getrlimit" lineno="3612">
 <summary>
 Allow getting init_t rlimit
 </summary>
@@ -115797,7 +116812,7 @@ Domain allowed access.
 </interface>
 <interface name="ipsec_write_pid" lineno="259">
 <summary>
-write the ipsec_runtime_t files.
+write the ipsec_runtime_t files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -115805,9 +116820,30 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_manage_pid" lineno="278">
+<interface name="ipsec_manage_pid" lineno="275">
 <summary>
 Create, read, write, and delete the IPSEC pid files.
+(Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ipsec_write_runtime_files" lineno="290">
+<summary>
+Write ipsec runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ipsec_manage_runtime_files" lineno="309">
+<summary>
+Create, read, write, and delete the IPSEC runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -115815,7 +116851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_domtrans_racoon" lineno="297">
+<interface name="ipsec_domtrans_racoon" lineno="328">
 <summary>
 Execute racoon in the racoon domain.
 </summary>
@@ -115825,7 +116861,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_run_racoon" lineno="321">
+<interface name="ipsec_run_racoon" lineno="352">
 <summary>
 Execute racoon and allow the specified role the domain.
 </summary>
@@ -115841,7 +116877,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="ipsec_domtrans_setkey" lineno="340">
+<interface name="ipsec_domtrans_setkey" lineno="371">
 <summary>
 Execute setkey in the setkey domain.
 </summary>
@@ -115851,7 +116887,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_run_setkey" lineno="364">
+<interface name="ipsec_run_setkey" lineno="395">
 <summary>
 Execute setkey and allow the specified role the domains.
 </summary>
@@ -115867,7 +116903,7 @@ Role allowed access..
 </param>
 <rolecap/>
 </interface>
-<interface name="ipsec_admin" lineno="390">
+<interface name="ipsec_admin" lineno="421">
 <summary>
 All of the rules required to
 administrate an ipsec environment.
@@ -115985,7 +117021,7 @@ Domain allowed access.
 </interface>
 <interface name="iptables_dontaudit_read_pids" lineno="177">
 <summary>
-dontaudit reading iptables_runtime_t
+dontaudit reading iptables_runtime_t  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -115993,7 +117029,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="iptables_startstop" lineno="195">
+<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
+<summary>
+Do not audit reading iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="iptables_startstop" lineno="210">
 <summary>
 Allow specified domain to start and stop iptables service
 </summary>
@@ -116003,7 +117049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_status" lineno="214">
+<interface name="iptables_status" lineno="229">
 <summary>
 Allow specified domain to get status of iptables service
 </summary>
@@ -116013,7 +117059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_admin" lineno="241">
+<interface name="iptables_admin" lineno="256">
 <summary>
 All of the rules required to
 administrate an iptables
@@ -116746,7 +117792,17 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="logging_status_syslog" lineno="440">
+<interface name="logging_startstop_syslog" lineno="440">
+<summary>
+Allow specified domain to start/stop syslog units
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_status_syslog" lineno="459">
 <summary>
 Allow specified domain to check status of syslog unit
 </summary>
@@ -116756,7 +117812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_setattr_syslogd_tmp_files" lineno="460">
+<interface name="logging_setattr_syslogd_tmp_files" lineno="479">
 <summary>
 Set the attributes of syslog temporary files.
 </summary>
@@ -116767,7 +117823,18 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_relabel_syslogd_tmp_files" lineno="479">
+<interface name="logging_audit_socket_activation" lineno="498">
+<summary>
+Allow the domain to create the audit socket
+for syslogd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_relabel_syslogd_tmp_files" lineno="517">
 <summary>
 Relabel to and from syslog temporary file type.
 </summary>
@@ -116778,7 +117845,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_setattr_syslogd_tmp_dirs" lineno="498">
+<interface name="logging_setattr_syslogd_tmp_dirs" lineno="536">
 <summary>
 Set the attributes of syslog temporary directories.
 </summary>
@@ -116789,7 +117856,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_relabel_syslogd_tmp_dirs" lineno="517">
+<interface name="logging_relabel_syslogd_tmp_dirs" lineno="555">
 <summary>
 Relabel to and from syslog temporary directory type.
 </summary>
@@ -116800,7 +117867,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_log_filetrans" lineno="578">
+<interface name="logging_log_filetrans" lineno="616">
 <summary>
 Create an object in the log directory, with a private type.
 </summary>
@@ -116853,7 +117920,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="logging_send_syslog_msg" lineno="620">
+<interface name="logging_send_syslog_msg" lineno="658">
 <summary>
 Send system log messages.
 </summary>
@@ -116885,7 +117952,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_relabelto_devlog_sock_files" lineno="663">
+<interface name="logging_use_syslogd_fd" lineno="701">
+<summary>
+Allow domain to use a file descriptor
+from syslogd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_relabelto_devlog_sock_files" lineno="720">
 <summary>
 Allow domain to relabelto devlog sock_files
 </summary>
@@ -116896,7 +117974,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_create_devlog" lineno="681">
+<interface name="logging_create_devlog" lineno="738">
 <summary>
 Connect to the syslog control unix stream socket.
 </summary>
@@ -116906,7 +117984,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_read_audit_config" lineno="702">
+<interface name="logging_read_audit_config" lineno="759">
 <summary>
 Read the auditd configuration files.
 </summary>
@@ -116917,7 +117995,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_dontaudit_search_audit_config" lineno="725">
+<interface name="logging_dontaudit_search_audit_config" lineno="782">
 <summary>
 dontaudit search of auditd configuration files.
 </summary>
@@ -116928,7 +118006,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_read_syslog_config" lineno="744">
+<interface name="logging_read_syslog_config" lineno="801">
 <summary>
 Read syslog configuration files.
 </summary>
@@ -116939,7 +118017,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_watch_runtime_dirs" lineno="762">
+<interface name="logging_watch_runtime_dirs" lineno="819">
 <summary>
 Watch syslog runtime dirs.
 </summary>
@@ -116949,7 +118027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_delete_devlog_socket" lineno="781">
+<interface name="logging_delete_devlog_socket" lineno="838">
 <summary>
 Delete the syslog socket files
 </summary>
@@ -116960,7 +118038,17 @@ Domain allowed access
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_manage_pid_sockets" lineno="799">
+<interface name="logging_manage_pid_sockets" lineno="856">
+<summary>
+Create, read, write, and delete syslog PID sockets.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_manage_runtime_sockets" lineno="871">
 <summary>
 Create, read, write, and delete syslog PID sockets.
 </summary>
@@ -116970,7 +118058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_search_logs" lineno="820">
+<interface name="logging_search_logs" lineno="892">
 <summary>
 Allows the domain to open a file in the
 log directory, but does not allow the listing
@@ -116982,7 +118070,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_dontaudit_search_logs" lineno="840">
+<interface name="logging_dontaudit_search_logs" lineno="912">
 <summary>
 Do not audit attempts to search the var log directory.
 </summary>
@@ -116992,7 +118080,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_list_logs" lineno="858">
+<interface name="logging_list_logs" lineno="930">
 <summary>
 List the contents of the generic log directory (/var/log).
 </summary>
@@ -117002,7 +118090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_generic_log_dirs" lineno="878">
+<interface name="logging_rw_generic_log_dirs" lineno="950">
 <summary>
 Read and write the generic log directory (/var/log).
 </summary>
@@ -117012,7 +118100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_search_all_logs" lineno="899">
+<interface name="logging_search_all_logs" lineno="971">
 <summary>
 Search through all log dirs.
 </summary>
@@ -117023,7 +118111,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_setattr_all_log_dirs" lineno="918">
+<interface name="logging_setattr_all_log_dirs" lineno="990">
 <summary>
 Set attributes on all log dirs.
 </summary>
@@ -117034,7 +118122,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="937">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="1009">
 <summary>
 Do not audit attempts to get the attributes
 of any log files.
@@ -117045,9 +118133,9 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_getattr_all_logs" lineno="955">
+<interface name="logging_getattr_all_logs" lineno="1027">
 <summary>
-Read the atttributes of any log file
+Read the attributes of any log file
 </summary>
 <param name="domain">
 <summary>
@@ -117055,7 +118143,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="logging_append_all_logs" lineno="973">
+<interface name="logging_append_all_logs" lineno="1045">
 <summary>
 Append to all log files.
 </summary>
@@ -117065,7 +118153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_append_all_inherited_logs" lineno="994">
+<interface name="logging_append_all_inherited_logs" lineno="1066">
 <summary>
 Append to all log files.
 </summary>
@@ -117075,7 +118163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_read_all_logs" lineno="1013">
+<interface name="logging_read_all_logs" lineno="1085">
 <summary>
 Read all log files.
 </summary>
@@ -117086,7 +118174,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_exec_all_logs" lineno="1035">
+<interface name="logging_exec_all_logs" lineno="1107">
 <summary>
 Execute all log files in the caller domain.
 </summary>
@@ -117096,7 +118184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_all_logs" lineno="1055">
+<interface name="logging_rw_all_logs" lineno="1127">
 <summary>
 read/write to all log files.
 </summary>
@@ -117106,7 +118194,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_manage_all_logs" lineno="1075">
+<interface name="logging_manage_all_logs" lineno="1147">
 <summary>
 Create, read, write, and delete all log files.
 </summary>
@@ -117117,7 +118205,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1096">
+<interface name="logging_manage_generic_log_dirs" lineno="1168">
 <summary>
 Create, read, write, and delete generic log directories.
 </summary>
@@ -117128,7 +118216,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1116">
+<interface name="logging_relabel_generic_log_dirs" lineno="1188">
 <summary>
 Relabel from and to generic log directory type.
 </summary>
@@ -117139,7 +118227,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_read_generic_logs" lineno="1136">
+<interface name="logging_read_generic_logs" lineno="1208">
 <summary>
 Read generic log files.
 </summary>
@@ -117150,7 +118238,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_mmap_generic_logs" lineno="1157">
+<interface name="logging_mmap_generic_logs" lineno="1229">
 <summary>
 Map generic log files.
 </summary>
@@ -117161,7 +118249,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_write_generic_logs" lineno="1175">
+<interface name="logging_write_generic_logs" lineno="1247">
 <summary>
 Write generic log files.
 </summary>
@@ -117171,7 +118259,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1196">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1268">
 <summary>
 Dontaudit Write generic log files.
 </summary>
@@ -117181,7 +118269,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_generic_logs" lineno="1214">
+<interface name="logging_rw_generic_logs" lineno="1286">
 <summary>
 Read and write generic log files.
 </summary>
@@ -117191,7 +118279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_manage_generic_logs" lineno="1237">
+<interface name="logging_manage_generic_logs" lineno="1309">
 <summary>
 Create, read, write, and delete
 generic log files.
@@ -117203,7 +118291,17 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_admin_audit" lineno="1263">
+<interface name="logging_watch_generic_logs_dir" lineno="1328">
+<summary>
+Watch generic log dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_admin_audit" lineno="1353">
 <summary>
 All of the rules required to administrate
 the audit environment
@@ -117220,7 +118318,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_admin_syslog" lineno="1307">
+<interface name="logging_admin_syslog" lineno="1397">
 <summary>
 All of the rules required to administrate
 the syslog environment
@@ -117237,7 +118335,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_admin" lineno="1363">
+<interface name="logging_admin" lineno="1453">
 <summary>
 All of the rules required to administrate
 the logging environment
@@ -117254,7 +118352,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_syslog_managed_log_file" lineno="1386">
+<interface name="logging_syslog_managed_log_file" lineno="1476">
 <summary>
 Mark the type as a syslog managed log file
 and introduce the proper file transition when
@@ -117272,7 +118370,7 @@ Name to use for the file
 </summary>
 </param>
 </interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1425">
+<interface name="logging_syslog_managed_log_dir" lineno="1515">
 <summary>
 Mark the type as a syslog managed log dir
 and introduce the proper file transition when
@@ -117299,7 +118397,7 @@ Name to use for the directory
 </summary>
 </param>
 </interface>
-<interface name="logging_mmap_journal" lineno="1447">
+<interface name="logging_mmap_journal" lineno="1537">
 <summary>
 Map files in /run/log/journal/ directory.
 </summary>
@@ -117369,7 +118467,28 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="lvm_manage_config" lineno="116">
+<interface name="lvm_map_config" lineno="126">
+<summary>
+Map lvm config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to map lvm config files.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>lvm_read_config()</li>
+</ul>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="lvm_manage_config" lineno="145">
 <summary>
 Manage LVM configuration files.
 </summary>
@@ -117380,7 +118499,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="lvm_create_lock_dirs" lineno="137">
+<interface name="lvm_create_lock_dirs" lineno="166">
 <summary>
 Create lvm_lock_t directories
 </summary>
@@ -117391,9 +118510,9 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="lvm_rw_inherited_pid_pipes" lineno="156">
+<interface name="lvm_rw_inherited_pid_pipes" lineno="185">
 <summary>
-Read and write a lvm unnamed pipe.
+Read and write a lvm unnamed pipe.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -117401,7 +118520,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="lvm_domtrans_clvmd" lineno="174">
+<interface name="lvm_domtrans_clvmd" lineno="199">
 <summary>
 Execute a domain transition to run clvmd.
 </summary>
@@ -117411,7 +118530,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="lvm_admin" lineno="199">
+<interface name="lvm_admin" lineno="224">
 <summary>
 All of the rules required to
 administrate an lvm environment.
@@ -117610,7 +118729,19 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_fonts" lineno="296">
+<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297">
+<summary>
+Manage generic SSL/TLS private
+keys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_read_fonts" lineno="316">
 <summary>
 Read fonts.
 </summary>
@@ -117621,7 +118752,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_setattr_fonts_dirs" lineno="327">
+<interface name="miscfiles_setattr_fonts_dirs" lineno="347">
 <summary>
 Set the attributes on a fonts directory.
 </summary>
@@ -117632,7 +118763,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="347">
+<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367">
 <summary>
 Do not audit attempts to set the attributes
 on a fonts directory.
@@ -117644,7 +118775,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_dontaudit_write_fonts" lineno="366">
+<interface name="miscfiles_dontaudit_write_fonts" lineno="386">
 <summary>
 Do not audit attempts to write fonts.
 </summary>
@@ -117655,7 +118786,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_fonts" lineno="386">
+<interface name="miscfiles_manage_fonts" lineno="406">
 <summary>
 Create, read, write, and delete fonts.
 </summary>
@@ -117666,7 +118797,18 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="410">
+<interface name="miscfiles_watch_fonts_dirs" lineno="431">
+<summary>
+Watch fonts directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449">
 <summary>
 Set the attributes on a fonts cache directory.
 </summary>
@@ -117676,7 +118818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="429">
+<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468">
 <summary>
 Do not audit attempts to set the attributes
 on a fonts cache directory.
@@ -117687,7 +118829,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_fonts_cache" lineno="448">
+<interface name="miscfiles_manage_fonts_cache" lineno="487">
 <summary>
 Create, read, write, and delete fonts cache.
 </summary>
@@ -117698,7 +118840,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_hwdata" lineno="470">
+<interface name="miscfiles_read_hwdata" lineno="509">
 <summary>
 Read hardware identification data.
 </summary>
@@ -117708,7 +118850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_setattr_localization" lineno="490">
+<interface name="miscfiles_setattr_localization" lineno="529">
 <summary>
 Allow process to setattr localization info
 </summary>
@@ -117718,7 +118860,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_localization" lineno="522">
+<interface name="miscfiles_read_localization" lineno="561">
 <summary>
 Allow process to read localization information.
 </summary>
@@ -117740,7 +118882,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="miscfiles_rw_localization" lineno="545">
+<interface name="miscfiles_rw_localization" lineno="584">
 <summary>
 Allow process to write localization info
 </summary>
@@ -117750,7 +118892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_relabel_localization" lineno="565">
+<interface name="miscfiles_relabel_localization" lineno="604">
 <summary>
 Allow process to relabel localization info
 </summary>
@@ -117760,7 +118902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_legacy_read_localization" lineno="584">
+<interface name="miscfiles_legacy_read_localization" lineno="623">
 <summary>
 Allow process to read legacy time localization info
 </summary>
@@ -117770,7 +118912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_watch_localization" lineno="603">
+<interface name="miscfiles_watch_localization" lineno="642">
 <summary>
 Watch time localization info
 </summary>
@@ -117780,7 +118922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_search_man_pages" lineno="621">
+<interface name="miscfiles_search_man_pages" lineno="660">
 <summary>
 Search man pages.
 </summary>
@@ -117790,7 +118932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_dontaudit_search_man_pages" lineno="640">
+<interface name="miscfiles_dontaudit_search_man_pages" lineno="679">
 <summary>
 Do not audit attempts to search man pages.
 </summary>
@@ -117800,7 +118942,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_man_pages" lineno="659">
+<interface name="miscfiles_read_man_pages" lineno="698">
 <summary>
 Read man pages
 </summary>
@@ -117811,7 +118953,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_delete_man_pages" lineno="681">
+<interface name="miscfiles_delete_man_pages" lineno="720">
 <summary>
 Delete man pages
 </summary>
@@ -117821,7 +118963,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_man_pages" lineno="703">
+<interface name="miscfiles_manage_man_pages" lineno="742">
 <summary>
 Create, read, write, and delete man pages
 </summary>
@@ -117831,7 +118973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_man_cache" lineno="724">
+<interface name="miscfiles_read_man_cache" lineno="763">
 <summary>
 Read man cache content.
 </summary>
@@ -117841,7 +118983,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_map_man_cache" lineno="745">
+<interface name="miscfiles_map_man_cache" lineno="784">
 <summary>
 Map man cache content.
 </summary>
@@ -117851,7 +118993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_man_cache" lineno="764">
+<interface name="miscfiles_manage_man_cache" lineno="803">
 <summary>
 Create, read, write, and delete
 man cache content.
@@ -117862,7 +119004,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_relabel_man_cache" lineno="785">
+<interface name="miscfiles_relabel_man_cache" lineno="824">
 <summary>
 Relabel from and to man cache.
 </summary>
@@ -117872,7 +119014,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_public_files" lineno="806">
+<interface name="miscfiles_read_public_files" lineno="845">
 <summary>
 Read public files used for file
 transfer services.
@@ -117884,7 +119026,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_public_files" lineno="828">
+<interface name="miscfiles_manage_public_files" lineno="867">
 <summary>
 Create, read, write, and delete public files
 and directories used for file transfer services.
@@ -117896,7 +119038,17 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_tetex_data" lineno="848">
+<interface name="miscfiles_watch_public_dirs" lineno="887">
+<summary>
+Watch public files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_tetex_data" lineno="905">
 <summary>
 Read TeX data
 </summary>
@@ -117906,7 +119058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_exec_tetex_data" lineno="872">
+<interface name="miscfiles_exec_tetex_data" lineno="929">
 <summary>
 Execute TeX data programs in the caller domain.
 </summary>
@@ -117916,7 +119068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_domain_entry_test_files" lineno="896">
+<interface name="miscfiles_domain_entry_test_files" lineno="953">
 <summary>
 Let test files be an entry point for
 a specified domain.
@@ -117927,7 +119079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_test_files" lineno="914">
+<interface name="miscfiles_read_test_files" lineno="971">
 <summary>
 Read test files and directories.
 </summary>
@@ -117937,7 +119089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_exec_test_files" lineno="933">
+<interface name="miscfiles_exec_test_files" lineno="990">
 <summary>
 Execute test files.
 </summary>
@@ -117947,7 +119099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_etc_filetrans_localization" lineno="953">
+<interface name="miscfiles_etc_filetrans_localization" lineno="1010">
 <summary>
 Create files in etc directories
 with localization file type.
@@ -117958,7 +119110,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_localization" lineno="973">
+<interface name="miscfiles_manage_localization" lineno="1030">
 <summary>
 Create, read, write, and delete localization
 </summary>
@@ -117982,7 +119134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_read_module_deps" lineno="31">
+<interface name="modutils_read_module_deps" lineno="32">
 <summary>
 Read the dependencies of kernel modules.
 </summary>
@@ -117992,9 +119144,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_read_module_objects" lineno="50">
+<interface name="modutils_read_module_objects" lineno="51">
 <summary>
-Read the kernel modules.
+Read the kernel modules.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -118002,7 +119154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_read_module_config" lineno="71">
+<interface name="modutils_read_module_config" lineno="68">
 <summary>
 Read the configuration options used when
 loading modules.
@@ -118014,7 +119166,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="modutils_rename_module_config" lineno="97">
+<interface name="modutils_rename_module_config" lineno="94">
 <summary>
 Rename a file with the configuration options used when
 loading modules.
@@ -118025,7 +119177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_delete_module_config" lineno="116">
+<interface name="modutils_delete_module_config" lineno="113">
 <summary>
 Unlink a file with the configuration options used when
 loading modules.
@@ -118036,7 +119188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_manage_module_config" lineno="135">
+<interface name="modutils_manage_module_config" lineno="132">
 <summary>
 Manage files with the configuration options used when
 loading modules.
@@ -118047,7 +119199,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_domtrans" lineno="155">
+<interface name="modutils_domtrans" lineno="152">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -118059,7 +119211,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="modutils_run" lineno="184">
+<interface name="modutils_run" lineno="181">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -118079,7 +119231,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="modutils_exec" lineno="205">
+<interface name="modutils_exec" lineno="202">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -118091,137 +119243,6 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_domtrans_insmod_uncond" lineno="226">
-<summary>
-Unconditionally execute insmod in the insmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_insmod" lineno="241">
-<summary>
-Execute insmod in the insmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_insmod" lineno="265">
-<summary>
-Execute insmod in the insmod domain, and
-allow the specified role the insmod domain,
-and use the caller's terminal.  Has a sigchld
-backchannel.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_insmod" lineno="280">
-<summary>
-Execute insmod in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_depmod" lineno="295">
-<summary>
-Execute depmod in the depmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_depmod" lineno="316">
-<summary>
-Execute depmod in the depmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_depmod" lineno="331">
-<summary>
-Execute depmod in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_update_mods" lineno="346">
-<summary>
-Execute update_modules in the update_modules domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_update_mods" lineno="367">
-<summary>
-Execute update_modules in the update_modules domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_update_mods" lineno="382">
-<summary>
-Execute update_modules in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_read_var_run_files" lineno="397">
-<summary>
-Read kmod lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
 </module>
 <module name="mount" filename="policy/modules/system/mount.if">
 <summary>Policy for mount.</summary>
@@ -118419,41 +119440,12 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
-<module name="pcmcia" filename="policy/modules/system/pcmcia.if">
-<summary>PCMCIA card management services.</summary>
-<interface name="pcmcia_stub" lineno="13">
-<summary>
-PCMCIA stub interface.  No access allowed.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_domtrans_cardmgr" lineno="29">
-<summary>
-Execute cardmgr in the cardmgr domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_use_cardmgr_fds" lineno="48">
-<summary>
-Inherit and use cardmgr file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_domtrans_cardctl" lineno="66">
+<module name="raid" filename="policy/modules/system/raid.if">
+<summary>RAID array management tools.</summary>
+<interface name="raid_domtrans_mdadm" lineno="14">
 <summary>
-Execute cardctl in the cardmgr domain.
+Execute software raid tools in
+the mdadm domain.
 </summary>
 <param name="domain">
 <summary>
@@ -118461,38 +119453,26 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="pcmcia_run_cardctl" lineno="93">
+<interface name="raid_run_mdadm" lineno="40">
 <summary>
-Execute cardctl in the cardmgr
+Execute mdadm in the mdadm
 domain, and allow the specified
-role the cardmgr domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
+role the mdadm domain.
 </summary>
-</param>
 <param name="role">
 <summary>
 Role allowed access.
 </summary>
 </param>
-<rolecap/>
-</interface>
-<interface name="pcmcia_read_pid" lineno="112">
-<summary>
-Read cardmgr pid files.
-</summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="pcmcia_manage_pid" lineno="132">
+<interface name="raid_read_mdadm_pid" lineno="59">
 <summary>
-Create, read, write, and delete
-cardmgr pid files.
+read mdadm pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -118500,10 +119480,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="pcmcia_manage_pid_chr_files" lineno="152">
+<interface name="raid_manage_mdadm_pid" lineno="75">
 <summary>
 Create, read, write, and delete
-cardmgr runtime character nodes.
+mdadm pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -118511,40 +119491,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-</module>
-<module name="raid" filename="policy/modules/system/raid.if">
-<summary>RAID array management tools.</summary>
-<interface name="raid_domtrans_mdadm" lineno="14">
+<interface name="raid_read_mdadm_runtime_files" lineno="90">
 <summary>
-Execute software raid tools in
-the mdadm domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="raid_run_mdadm" lineno="40">
-<summary>
-Execute mdadm in the mdadm
-domain, and allow the specified
-role the mdadm domain.
-</summary>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="raid_read_mdadm_pid" lineno="59">
-<summary>
-read mdadm pid files.
+Read mdadm runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -118552,10 +119501,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="raid_manage_mdadm_pid" lineno="80">
+<interface name="raid_manage_mdadm_runtime_files" lineno="111">
 <summary>
 Create, read, write, and delete
-mdadm pid files.
+mdadm runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -118563,7 +119512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="raid_admin_mdadm" lineno="106">
+<interface name="raid_admin_mdadm" lineno="137">
 <summary>
 All of the rules required to
 administrate an mdadm environment.
@@ -119265,7 +120214,7 @@ Domain allowed to transition.
 </interface>
 <interface name="setrans_translate_context" lineno="32">
 <summary>
-Allow a domain to translate contexts.  (Deprecated)
+Allow a domain to translate contexts.
 </summary>
 <param name="domain">
 <summary>
@@ -119273,7 +120222,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="setrans_admin" lineno="52">
+<interface name="setrans_admin" lineno="58">
 <summary>
 All of the rules required to
 administrate an setrans environment.
@@ -119497,7 +120446,39 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dontaudit_read_config" lineno="377">
+<interface name="sysnet_mmap_config_files" lineno="385">
+<summary>
+Map network config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to mmap the
+general network configuration files.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_mmap_read_config" lineno="410">
+<summary>
+map network config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to mmap the
+general network configuration files.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_dontaudit_read_config" lineno="429">
 <summary>
 Do not audit attempts to read network config files.
 </summary>
@@ -119507,7 +120488,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_write_config" lineno="395">
+<interface name="sysnet_write_config" lineno="447">
 <summary>
 Write network config files.
 </summary>
@@ -119517,7 +120498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_create_config" lineno="414">
+<interface name="sysnet_create_config" lineno="466">
 <summary>
 Create network config files.
 </summary>
@@ -119527,7 +120508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_relabel_config" lineno="433">
+<interface name="sysnet_relabel_config" lineno="485">
 <summary>
 Relabel network config files.
 </summary>
@@ -119537,7 +120518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_etc_filetrans_config" lineno="458">
+<interface name="sysnet_etc_filetrans_config" lineno="510">
 <summary>
 Create files in /etc with the type used for
 the network config files.
@@ -119553,7 +120534,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_manage_config" lineno="476">
+<interface name="sysnet_manage_config" lineno="528">
 <summary>
 Create, read, write, and delete network config files.
 </summary>
@@ -119563,9 +120544,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_read_dhcpc_pid" lineno="504">
+<interface name="sysnet_read_dhcpc_pid" lineno="556">
+<summary>
+Read the dhcp client pid file.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_delete_dhcpc_pid" lineno="571">
 <summary>
-Read the dhcp client pid file.
+Delete the dhcp client pid file.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -119573,9 +120564,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_delete_dhcpc_pid" lineno="523">
+<interface name="sysnet_read_dhcpc_runtime_files" lineno="586">
 <summary>
-Delete the dhcp client pid file.
+Read dhcp client runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -119583,7 +120574,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="541">
+<interface name="sysnet_delete_dhcpc_runtime_files" lineno="605">
+<summary>
+Delete the dhcp client runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_domtrans_ifconfig" lineno="623">
 <summary>
 Execute ifconfig in the ifconfig domain.
 </summary>
@@ -119593,7 +120594,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_run_ifconfig" lineno="568">
+<interface name="sysnet_run_ifconfig" lineno="650">
 <summary>
 Execute ifconfig in the ifconfig domain, and
 allow the specified role the ifconfig domain,
@@ -119611,7 +120612,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_exec_ifconfig" lineno="588">
+<interface name="sysnet_exec_ifconfig" lineno="670">
 <summary>
 Execute ifconfig in the caller domain.
 </summary>
@@ -119621,7 +120622,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_signal_ifconfig" lineno="608">
+<interface name="sysnet_signal_ifconfig" lineno="690">
 <summary>
 Send a generic signal to ifconfig.
 </summary>
@@ -119632,7 +120633,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_signull_ifconfig" lineno="627">
+<interface name="sysnet_signull_ifconfig" lineno="709">
 <summary>
 Send null signals to ifconfig.
 </summary>
@@ -119643,7 +120644,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_read_dhcp_config" lineno="645">
+<interface name="sysnet_read_dhcp_config" lineno="727">
 <summary>
 Read the DHCP configuration files.
 </summary>
@@ -119653,7 +120654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_search_dhcp_state" lineno="665">
+<interface name="sysnet_search_dhcp_state" lineno="747">
 <summary>
 Search the DHCP state data directory.
 </summary>
@@ -119663,7 +120664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="709">
+<interface name="sysnet_dhcp_state_filetrans" lineno="791">
 <summary>
 Create DHCP state data.
 </summary>
@@ -119698,7 +120699,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dns_name_resolve" lineno="729">
+<interface name="sysnet_dns_name_resolve" lineno="811">
 <summary>
 Perform a DNS name resolution.
 </summary>
@@ -119709,7 +120710,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_use_ldap" lineno="780">
+<interface name="sysnet_use_ldap" lineno="861">
 <summary>
 Connect and use a LDAP server.
 </summary>
@@ -119719,7 +120720,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_use_portmap" lineno="808">
+<interface name="sysnet_use_portmap" lineno="888">
 <summary>
 Connect and use remote port mappers.
 </summary>
@@ -119729,7 +120730,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="843">
+<interface name="sysnet_dhcpc_script_entry" lineno="922">
 <summary>
 Make the specified program domain
 accessable from the DHCP hooks/scripts.
@@ -119745,6 +120746,14 @@ The type of the file used as an entrypoint to this domain.
 </summary>
 </param>
 </interface>
+<tunable name="dhcpc_manage_samba" dftval="false">
+<desc>
+<p>
+Determine whether DHCP client
+can manage samba
+</p>
+</desc>
+</tunable>
 </module>
 <module name="systemd" filename="policy/modules/system/systemd.if">
 <summary>Systemd components (not PID 1)</summary>
@@ -119768,7 +120777,7 @@ The user domain for the role.
 </summary>
 </param>
 </template>
-<interface name="systemd_log_parse_environment" lineno="74">
+<interface name="systemd_log_parse_environment" lineno="82">
 <summary>
 Make the specified type usable as an
 log parse environment type.
@@ -119779,7 +120788,7 @@ Type to be used as a log parse environment type.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_nss" lineno="94">
+<interface name="systemd_use_nss" lineno="102">
 <summary>
 Allow domain to use systemd's Name Service Switch (NSS) module.
 This module provides UNIX user and group name resolution for dynamic users
@@ -119791,7 +120800,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_PrivateDevices" lineno="121">
+<interface name="systemd_PrivateDevices" lineno="129">
 <summary>
 Allow domain to be used as a systemd service with a unit
 that uses PrivateDevices=yes in section [Service].
@@ -119802,7 +120811,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_hwdb" lineno="138">
+<interface name="systemd_read_hwdb" lineno="146">
 <summary>
 Allow domain to read udev hwdb file
 </summary>
@@ -119812,7 +120821,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_map_hwdb" lineno="156">
+<interface name="systemd_map_hwdb" lineno="164">
 <summary>
 Allow domain to map udev hwdb file
 </summary>
@@ -119822,9 +120831,19 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_pids" lineno="174">
+<interface name="systemd_read_logind_pids" lineno="182">
+<summary>
+Read systemd_login PID files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_logind_pid_pipes" lineno="197">
 <summary>
-Read systemd_login PID files.
+Manage systemd_login PID pipes.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -119832,9 +120851,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="194">
+<interface name="systemd_write_logind_pid_pipes" lineno="212">
 <summary>
-Manage systemd_login PID pipes.
+Write systemd_login named pipe.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -119842,9 +120861,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="213">
+<interface name="systemd_read_logind_runtime_files" lineno="227">
 <summary>
-Write systemd_login named pipe.
+Read systemd-logind runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -119852,7 +120871,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_logind_fds" lineno="234">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="247">
+<summary>
+Manage systemd-logind runtime pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_write_logind_runtime_pipes" lineno="266">
+<summary>
+Write systemd-logind runtime named pipe.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_use_logind_fds" lineno="287">
 <summary>
 Use inherited systemd
 logind file descriptors.
@@ -119863,7 +120902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_sessions_files" lineno="252">
+<interface name="systemd_read_logind_sessions_files" lineno="305">
 <summary>
 Read logind sessions files.
 </summary>
@@ -119873,7 +120912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="273">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="326">
 <summary>
 Write inherited logind sessions pipes.
 </summary>
@@ -119883,7 +120922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="293">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="346">
 <summary>
 Write inherited logind inhibit pipes.
 </summary>
@@ -119893,7 +120932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_logind" lineno="314">
+<interface name="systemd_dbus_chat_logind" lineno="367">
 <summary>
 Send and receive messages from
 systemd logind over dbus.
@@ -119904,20 +120943,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_kmod_files" lineno="335">
+<interface name="systemd_status_logind" lineno="387">
 <summary>
-Allow process to write to systemd_kmod_conf_t.
+Get the system status information from systemd_login
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<rolecap/>
 </interface>
-<interface name="systemd_status_logind" lineno="349">
+<interface name="systemd_signull_logind" lineno="406">
 <summary>
-Get the system status information from systemd_login
+Send systemd_login a null signal.
 </summary>
 <param name="domain">
 <summary>
@@ -119925,9 +120963,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_signull_logind" lineno="368">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="424">
 <summary>
-Send systemd_login a null signal.
+Manage systemd userdb runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="442">
+<summary>
+Manage socket files under /run/systemd/userdb .
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_stream_connect_userdb" lineno="460">
+<summary>
+Connect to /run/systemd/userdb/io.systemd.DynamicUser .
 </summary>
 <param name="domain">
 <summary>
@@ -119935,7 +120993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_machines" lineno="386">
+<interface name="systemd_read_machines" lineno="481">
 <summary>
 Allow reading /run/systemd/machines
 </summary>
@@ -119945,7 +121003,7 @@ Domain that can access the machines files
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="406">
+<interface name="systemd_dbus_chat_hostnamed" lineno="501">
 <summary>
 Send and receive messages from
 systemd hostnamed over dbus.
@@ -119956,7 +121014,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="426">
+<interface name="systemd_use_passwd_agent_fds" lineno="521">
 <summary>
 allow systemd_passwd_agent to inherit fds
 </summary>
@@ -119966,7 +121024,7 @@ Domain that owns the fds
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent" lineno="445">
+<interface name="systemd_use_passwd_agent" lineno="540">
 <summary>
 Allow a systemd_passwd_agent_t process to interact with a daemon
 that needs a password from the sysadmin.
@@ -119977,7 +121035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="469">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="564">
 <summary>
 Transition to systemd_passwd_runtime_t when creating dirs
 </summary>
@@ -119987,7 +121045,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="488">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="585">
+<summary>
+Transition to systemd_userdb_runtime_t when
+creating the userdb directory inside an init runtime
+directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="603">
 <summary>
 Allow to domain to create systemd-passwd symlink
 </summary>
@@ -119997,9 +121067,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_all_units" lineno="506">
+<interface name="systemd_manage_all_units" lineno="621">
 <summary>
-manage systemd unit dirs and the files in them
+manage systemd unit dirs and the files in them  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120007,7 +121077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_journal_files" lineno="526">
+<interface name="systemd_read_journal_files" lineno="636">
 <summary>
 Allow domain to read systemd_journal_t files
 </summary>
@@ -120017,7 +121087,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_journal_files" lineno="545">
+<interface name="systemd_manage_journal_files" lineno="655">
 <summary>
 Allow domain to create/manage systemd_journal_t files
 </summary>
@@ -120027,7 +121097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="565">
+<interface name="systemd_relabelto_journal_dirs" lineno="675">
 <summary>
 Relabel to systemd-journald directory type.
 </summary>
@@ -120037,7 +121107,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_files" lineno="584">
+<interface name="systemd_relabelto_journal_files" lineno="694">
 <summary>
 Relabel to systemd-journald file type.
 </summary>
@@ -120047,7 +121117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_units" lineno="604">
+<interface name="systemd_read_networkd_units" lineno="714">
 <summary>
 Allow domain to read systemd_networkd_t unit files
 </summary>
@@ -120057,7 +121127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_networkd_units" lineno="624">
+<interface name="systemd_manage_networkd_units" lineno="734">
 <summary>
 Allow domain to create/manage systemd_networkd_t unit files
 </summary>
@@ -120067,7 +121137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_enabledisable_networkd" lineno="644">
+<interface name="systemd_enabledisable_networkd" lineno="754">
 <summary>
 Allow specified domain to enable systemd-networkd units
 </summary>
@@ -120077,7 +121147,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_startstop_networkd" lineno="663">
+<interface name="systemd_startstop_networkd" lineno="773">
 <summary>
 Allow specified domain to start systemd-networkd units
 </summary>
@@ -120087,7 +121157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_networkd" lineno="682">
+<interface name="systemd_status_networkd" lineno="792">
 <summary>
 Allow specified domain to get status of systemd-networkd
 </summary>
@@ -120097,7 +121167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="701">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="811">
 <summary>
 Relabel systemd_networkd tun socket.
 </summary>
@@ -120107,7 +121177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="719">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="829">
 <summary>
 Read/Write from systemd_networkd netlink route socket.
 </summary>
@@ -120117,7 +121187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_networkd_runtime" lineno="737">
+<interface name="systemd_list_networkd_runtime" lineno="847">
 <summary>
 Allow domain to list dirs under /run/systemd/netif
 </summary>
@@ -120127,7 +121197,7 @@ domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="756">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="866">
 <summary>
 Watch directories under /run/systemd/netif
 </summary>
@@ -120137,7 +121207,7 @@ Domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_runtime" lineno="775">
+<interface name="systemd_read_networkd_runtime" lineno="885">
 <summary>
 Allow domain to read files generated by systemd_networkd
 </summary>
@@ -120147,7 +121217,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_state" lineno="794">
+<interface name="systemd_read_logind_state" lineno="904">
 <summary>
 Allow systemd_logind_t to read process state for cgroup file
 </summary>
@@ -120157,7 +121227,7 @@ Domain systemd_logind_t may access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_power_units" lineno="813">
+<interface name="systemd_start_power_units" lineno="923">
 <summary>
 Allow specified domain to start power units
 </summary>
@@ -120167,7 +121237,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_power_units" lineno="832">
+<interface name="systemd_status_power_units" lineno="942">
 <summary>
 Get the system status information about power units
 </summary>
@@ -120177,7 +121247,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="852">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="961">
+<summary>
+Allows connections to the systemd-socket-proxyd's socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_tmpfiles_conf_file" lineno="980">
 <summary>
 Make the specified type usable for
 systemd tmpfiles config files.
@@ -120188,7 +121268,7 @@ Type to be used for systemd tmpfiles config files.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_creator" lineno="873">
+<interface name="systemd_tmpfiles_creator" lineno="1001">
 <summary>
 Allow the specified domain to create
 the tmpfiles config directory with
@@ -120200,7 +121280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="909">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="1037">
 <summary>
 Create an object in the systemd tmpfiles config
 directory, with a private type
@@ -120227,7 +121307,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="928">
+<interface name="systemd_list_tmpfiles_conf" lineno="1056">
 <summary>
 Allow domain to list systemd tmpfiles config directory
 </summary>
@@ -120237,7 +121317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="946">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="1074">
 <summary>
 Allow domain to relabel to systemd tmpfiles config directory
 </summary>
@@ -120247,7 +121327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="964">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="1092">
 <summary>
 Allow domain to relabel to systemd tmpfiles config files
 </summary>
@@ -120257,7 +121337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfilesd_managed" lineno="987">
+<interface name="systemd_tmpfilesd_managed" lineno="1115">
 <summary>
 Allow systemd_tmpfiles_t to manage filesystem objects
 </summary>
@@ -120272,7 +121352,7 @@ object class to manage
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_resolved" lineno="1006">
+<interface name="systemd_dbus_chat_resolved" lineno="1134">
 <summary>
 Send and receive messages from
 systemd resolved over dbus.
@@ -120283,7 +121363,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_resolved_runtime" lineno="1026">
+<interface name="systemd_read_resolved_runtime" lineno="1154">
 <summary>
 Allow domain to read resolv.conf file generated by systemd_resolved
 </summary>
@@ -120293,7 +121373,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_getattr_updated_runtime" lineno="1044">
+<interface name="systemd_getattr_updated_runtime" lineno="1172">
 <summary>
 Allow domain to getattr on .updated file (generated by systemd-update-done
 </summary>
@@ -120303,7 +121383,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_all_user_keys" lineno="1062">
+<interface name="systemd_search_all_user_keys" lineno="1190">
 <summary>
 Search keys for the all systemd --user domains.
 </summary>
@@ -120313,7 +121393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_all_user_keys" lineno="1080">
+<interface name="systemd_create_all_user_keys" lineno="1208">
 <summary>
 Create keys for the all systemd --user domains.
 </summary>
@@ -120323,7 +121403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_all_user_keys" lineno="1098">
+<interface name="systemd_write_all_user_keys" lineno="1226">
 <summary>
 Write keys for the all systemd --user domains.
 </summary>
@@ -120333,6 +121413,33 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="systemd_domtrans_sysusers" lineno="1245">
+<summary>
+Execute systemd-sysusers in the
+systemd sysusers domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_run_sysusers" lineno="1270">
+<summary>
+Run systemd-sysusers with a domain transition.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
 <tunable name="systemd_tmpfiles_manage_all" dftval="false">
 <desc>
 <p>
@@ -120357,6 +121464,22 @@ BootLoaderEntries, etc.)
 </p>
 </desc>
 </tunable>
+<tunable name="systemd_socket_proxyd_bind_any" dftval="false">
+<desc>
+<p>
+Allow systemd-socket-proxyd to bind any port instead of one labelled
+with systemd_socket_proxyd_port_t.
+</p>
+</desc>
+</tunable>
+<tunable name="systemd_socket_proxyd_connect_any" dftval="false">
+<desc>
+<p>
+Allow systemd-socket-proxyd to connect to any port instead of
+labelled ones.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="tmpfiles" filename="policy/modules/system/tmpfiles.if">
 <summary>Policy for tmpfiles, a boot-time temporary file handler</summary>
@@ -120580,7 +121703,7 @@ Domain allowed access.
 </interface>
 <interface name="udev_dontaudit_search_db" lineno="236">
 <summary>
-Do not audit search of udev database directories.
+Do not audit search of udev database directories.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120588,13 +121711,13 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="udev_read_db" lineno="260">
+<interface name="udev_read_db" lineno="256">
 <summary>
-Read the udev device table.
+Read the udev device table.  (Deprecated)
 </summary>
 <desc>
 <p>
-Allow the specified domain to read the udev device table.
+Allow the specified domain to read the udev device table.  (Deprecated)
 </p>
 </desc>
 <param name="domain">
@@ -120604,9 +121727,9 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="udev_rw_db" lineno="288">
+<interface name="udev_rw_db" lineno="270">
 <summary>
-Allow process to modify list of devices.
+Allow process to modify list of devices.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120614,7 +121737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_create_db_dirs" lineno="307">
+<interface name="udev_create_db_dirs" lineno="284">
 <summary>
 Create udev database directories
 </summary>
@@ -120624,7 +121747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_pid_filetrans_db" lineno="338">
+<interface name="udev_pid_filetrans_db" lineno="315">
 <summary>
 Write in /var/run/udev with the udev_tbl_t (udev database) file type
 </summary>
@@ -120644,9 +121767,9 @@ Name of the directory that the file transition will work on
 </summary>
 </param>
 </interface>
-<interface name="udev_relabelto_db" lineno="357">
+<interface name="udev_relabelto_db" lineno="334">
 <summary>
-Allow process to relabelto udev database
+Allow process to relabelto udev database  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120654,9 +121777,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_relabelto_db_sockets" lineno="377">
+<interface name="udev_relabelto_db_sockets" lineno="348">
 <summary>
-Allow process to relabelto sockets in /run/udev
+Allow process to relabelto sockets in /run/udev  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120664,9 +121787,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_search_pids" lineno="395">
+<interface name="udev_search_pids" lineno="362">
 <summary>
-Search through udev pid content
+Search through udev pid content  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120674,9 +121797,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_list_pids" lineno="414">
+<interface name="udev_list_pids" lineno="377">
 <summary>
-list udev pid content
+list udev pid content  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120684,10 +121807,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_manage_pid_dirs" lineno="434">
+<interface name="udev_manage_pid_dirs" lineno="393">
 <summary>
 Create, read, write, and delete
-udev run directories
+udev pid directories  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120695,9 +121818,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_read_pid_files" lineno="453">
+<interface name="udev_read_pid_files" lineno="408">
 <summary>
-Read udev pid files
+Read udev pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120705,9 +121828,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_dontaudit_rw_pid_files" lineno="473">
+<interface name="udev_dontaudit_rw_pid_files" lineno="423">
 <summary>
-dontaudit attempts to read/write udev pidfiles
+dontaudit attempts to read/write udev pidfiles  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120715,10 +121838,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_manage_pid_files" lineno="492">
+<interface name="udev_manage_pid_files" lineno="439">
 <summary>
 Create, read, write, and delete
-udev pid files.
+udev pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120726,10 +121849,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_generic_pid_filetrans_run_dirs" lineno="517">
+<interface name="udev_generic_pid_filetrans_run_dirs" lineno="459">
 <summary>
-Write dirs in /var/run with the udev_runtime file type.
-This method is deprecated in favor of the init_daemon_run_dir call.
+Create directories in the run location with udev_runtime_t type  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -120738,11 +121860,73 @@ Domain allowed access.
 </param>
 <param name="name" optional="true">
 <summary>
-Name of the directory that the file transition will work on
+Name of the directory that is created
+</summary>
+</param>
+</interface>
+<interface name="udev_search_runtime" lineno="473">
+<summary>
+Search through udev runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_list_runtime" lineno="492">
+<summary>
+List udev runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udevadm_domtrans" lineno="531">
+<interface name="udev_manage_runtime_dirs" lineno="512">
+<summary>
+Create, read, write, and delete
+udev runtime directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_read_runtime_files" lineno="531">
+<summary>
+Read udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_dontaudit_rw_runtime_files" lineno="551">
+<summary>
+dontaudit attempts to read/write udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_manage_runtime_files" lineno="570">
+<summary>
+Create, read, write, and delete
+udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_domtrans_udevadm" lineno="589">
 <summary>
 Execute udev admin in the udevadm domain.
 </summary>
@@ -120752,7 +121936,34 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="udevadm_run" lineno="556">
+<interface name="udevadm_domtrans" lineno="607">
+<summary>
+Execute udev admin in the udevadm domain.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="udevadm_run" lineno="629">
+<summary>
+Execute udevadm in the udevadm domain, and
+allow the specified role the udevadm domain.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="udev_run_udevadm" lineno="651">
 <summary>
 Execute udevadm in the udevadm domain, and
 allow the specified role the udevadm domain.
@@ -120769,7 +121980,17 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="udevadm_exec" lineno="575">
+<interface name="udevadm_exec" lineno="670">
+<summary>
+Execute udevadm in the caller domain.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_exec_udevadm" lineno="685">
 <summary>
 Execute udevadm in the caller domain.
 </summary>
@@ -120779,7 +122000,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_pid_filetrans_rules" lineno="605">
+<interface name="udev_pid_filetrans_rules" lineno="715">
 <summary>
 Write in /var/run/udev with the udev_rules_t (udev rules) file type
 </summary>
@@ -120799,7 +122020,7 @@ Name of the directory that the file transition will work on
 </summary>
 </param>
 </interface>
-<interface name="udev_create_rules_dirs" lineno="624">
+<interface name="udev_create_rules_dirs" lineno="734">
 <summary>
 Create udev rules directories
 </summary>
@@ -120812,7 +122033,17 @@ Domain allowed access.
 </module>
 <module name="unconfined" filename="policy/modules/system/unconfined.if">
 <summary>The unconfined domain.</summary>
-<interface name="unconfined_domain_noaudit" lineno="13">
+<interface name="unconfined_stub" lineno="13">
+<summary>
+Unconfined stub interface.  No access allowed.
+</summary>
+<param name="domain" unused="true">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="unconfined_domain_noaudit" lineno="29">
 <summary>
 Make the specified domain unconfined.
 </summary>
@@ -120822,7 +122053,7 @@ Domain to make unconfined.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_domain" lineno="133">
+<interface name="unconfined_domain" lineno="150">
 <summary>
 Make the specified domain unconfined and
 audit executable heap usage.
@@ -120850,7 +122081,7 @@ Domain to make unconfined.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_domtrans" lineno="151">
+<interface name="unconfined_domtrans" lineno="168">
 <summary>
 Transition to the unconfined domain.
 </summary>
@@ -120860,7 +122091,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_run" lineno="174">
+<interface name="unconfined_run" lineno="191">
 <summary>
 Execute specified programs in the unconfined domain.
 </summary>
@@ -120875,7 +122106,7 @@ The role to allow the unconfined domain.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_shell_domtrans" lineno="193">
+<interface name="unconfined_shell_domtrans" lineno="210">
 <summary>
 Transition to the unconfined domain by executing a shell.
 </summary>
@@ -120885,7 +122116,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_domtrans_to" lineno="231">
+<interface name="unconfined_domtrans_to" lineno="248">
 <summary>
 Allow unconfined to execute the specified program in
 the specified domain.
@@ -120912,7 +122143,7 @@ Domain entry point file.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_run_to" lineno="268">
+<interface name="unconfined_run_to" lineno="285">
 <summary>
 Allow unconfined to execute the specified program in
 the specified domain.  Allow the specified domain the
@@ -120941,7 +122172,7 @@ Domain entry point file.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_use_fds" lineno="289">
+<interface name="unconfined_use_fds" lineno="306">
 <summary>
 Inherit file descriptors from the unconfined domain.
 </summary>
@@ -120951,7 +122182,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_sigchld" lineno="307">
+<interface name="unconfined_sigchld" lineno="324">
 <summary>
 Send a SIGCHLD signal to the unconfined domain.
 </summary>
@@ -120961,7 +122192,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_signull" lineno="325">
+<interface name="unconfined_signull" lineno="342">
 <summary>
 Send a SIGNULL signal to the unconfined domain.
 </summary>
@@ -120971,7 +122202,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_signal" lineno="343">
+<interface name="unconfined_signal" lineno="360">
 <summary>
 Send generic signals to the unconfined domain.
 </summary>
@@ -120981,7 +122212,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_read_pipes" lineno="361">
+<interface name="unconfined_read_pipes" lineno="378">
 <summary>
 Read unconfined domain unnamed pipes.
 </summary>
@@ -120991,7 +122222,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dontaudit_read_pipes" lineno="379">
+<interface name="unconfined_dontaudit_read_pipes" lineno="396">
 <summary>
 Do not audit attempts to read unconfined domain unnamed pipes.
 </summary>
@@ -121001,7 +122232,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_rw_pipes" lineno="397">
+<interface name="unconfined_rw_pipes" lineno="414">
 <summary>
 Read and write unconfined domain unnamed pipes.
 </summary>
@@ -121011,7 +122242,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dontaudit_rw_pipes" lineno="416">
+<interface name="unconfined_dontaudit_rw_pipes" lineno="433">
 <summary>
 Do not audit attempts to read and write
 unconfined domain unnamed pipes.
@@ -121022,7 +122253,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_stream_connect" lineno="435">
+<interface name="unconfined_stream_connect" lineno="452">
 <summary>
 Connect to the unconfined domain using
 a unix domain stream socket.
@@ -121033,7 +122264,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="454">
+<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="471">
 <summary>
 Do not audit attempts to read and write
 unconfined domain stream.
@@ -121044,7 +122275,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="483">
+<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="500">
 <summary>
 Do not audit attempts to read or write
 unconfined domain tcp sockets.
@@ -121065,7 +122296,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_search_keys" lineno="501">
+<interface name="unconfined_search_keys" lineno="518">
 <summary>
 Search keys for the unconfined domain.
 </summary>
@@ -121075,7 +122306,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_create_keys" lineno="519">
+<interface name="unconfined_create_keys" lineno="536">
 <summary>
 Create keys for the unconfined domain.
 </summary>
@@ -121085,7 +122316,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_write_keys" lineno="537">
+<interface name="unconfined_write_keys" lineno="554">
 <summary>
 Write keys for the unconfined domain.
 </summary>
@@ -121095,7 +122326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dbus_send" lineno="555">
+<interface name="unconfined_dbus_send" lineno="572">
 <summary>
 Send messages to the unconfined domain over dbus.
 </summary>
@@ -121105,7 +122336,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dbus_chat" lineno="575">
+<interface name="unconfined_dbus_chat" lineno="592">
 <summary>
 Send and receive messages from
 unconfined_t over dbus.
@@ -121116,7 +122347,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="unconfined_dbus_connect" lineno="596">
+<interface name="unconfined_dbus_connect" lineno="613">
 <summary>
 Connect to the the unconfined DBUS
 for service (acquire_svc).
@@ -121151,7 +122382,7 @@ is the prefix for user_t).
 </param>
 <rolebase/>
 </template>
-<template name="userdom_user_content_access_template" lineno="175">
+<template name="userdom_user_content_access_template" lineno="179">
 <summary>
 Template for handling user content through standard tunables
 </summary>
@@ -121180,7 +122411,7 @@ The application domain which is granted the necessary privileges
 </param>
 <rolebase/>
 </template>
-<interface name="userdom_ro_home_role" lineno="266">
+<interface name="userdom_ro_home_role" lineno="270">
 <summary>
 Allow a home directory for which the
 role has read-only access.
@@ -121206,7 +122437,7 @@ The user domain
 </param>
 <rolebase/>
 </interface>
-<interface name="userdom_manage_home_role" lineno="337">
+<interface name="userdom_manage_home_role" lineno="347">
 <summary>
 Allow a home directory for which the
 role has full access.
@@ -121232,7 +122463,7 @@ The user domain
 </param>
 <rolebase/>
 </interface>
-<interface name="userdom_manage_tmp_role" lineno="417">
+<interface name="userdom_manage_tmp_role" lineno="433">
 <summary>
 Manage user temporary files
 </summary>
@@ -121248,7 +122479,7 @@ Domain allowed access.
 </param>
 <rolebase/>
 </interface>
-<interface name="userdom_exec_user_tmp_files" lineno="444">
+<interface name="userdom_exec_user_tmp_files" lineno="460">
 <summary>
 The execute access user temporary files.
 </summary>
@@ -121259,7 +122490,7 @@ Domain allowed access.
 </param>
 <rolebase/>
 </interface>
-<interface name="userdom_manage_tmpfs_role" lineno="480">
+<interface name="userdom_manage_tmpfs_role" lineno="496">
 <summary>
 Role access for the user tmpfs type
 that the user has full access.
@@ -121285,7 +122516,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<template name="userdom_basic_networking_template" lineno="506">
+<template name="userdom_basic_networking_template" lineno="522">
 <summary>
 The template allowing the user basic
 network permissions
@@ -121298,7 +122529,7 @@ is the prefix for user_t).
 </param>
 <rolebase/>
 </template>
-<template name="userdom_change_password_template" lineno="547">
+<template name="userdom_change_password_template" lineno="562">
 <summary>
 The template for allowing the user to change passwords.
 </summary>
@@ -121310,7 +122541,7 @@ is the prefix for user_t).
 </param>
 <rolebase/>
 </template>
-<template name="userdom_common_user_template" lineno="577">
+<template name="userdom_common_user_template" lineno="592">
 <summary>
 The template containing rules common to unprivileged
 users and administrative users.
@@ -121328,7 +122559,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_login_user_template" lineno="906">
+<template name="userdom_login_user_template" lineno="914">
 <summary>
 The template for creating a login user.
 </summary>
@@ -121346,7 +122577,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_restricted_user_template" lineno="1029">
+<template name="userdom_restricted_user_template" lineno="1037">
 <summary>
 The template for creating a unprivileged login user.
 </summary>
@@ -121364,7 +122595,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1070">
+<template name="userdom_restricted_xwindows_user_template" lineno="1078">
 <summary>
 The template for creating a unprivileged xwindows login user.
 </summary>
@@ -121385,7 +122616,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_unpriv_user_template" lineno="1157">
+<template name="userdom_unpriv_user_template" lineno="1161">
 <summary>
 The template for creating a unprivileged user roughly
 equivalent to a regular linux user.
@@ -121408,7 +122639,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_admin_user_template" lineno="1255">
+<template name="userdom_admin_user_template" lineno="1281">
 <summary>
 The template for creating an administrative user.
 </summary>
@@ -121437,7 +122668,7 @@ is the prefix for sysadm_t).
 </summary>
 </param>
 </template>
-<template name="userdom_security_admin_template" lineno="1429">
+<template name="userdom_security_admin_template" lineno="1456">
 <summary>
 Allow user to run as a secadm
 </summary>
@@ -121463,7 +122694,28 @@ The role  of the object to create.
 </summary>
 </param>
 </template>
-<interface name="userdom_user_application_type" lineno="1509">
+<template name="userdom_xdg_user_template" lineno="1554">
+<summary>
+Allow user to interact with xdg content types
+</summary>
+<desc>
+<p>
+Create rules to allow a user to manage xdg
+content in a user home directory with an
+automatic type transition to those types.
+</p>
+<p>
+This is a templated interface, and should only
+be called from a per-userdomain template.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</template>
+<interface name="userdom_user_application_type" lineno="1603">
 <summary>
 Make the specified type usable as
 a user application domain type.
@@ -121474,7 +122726,7 @@ Type to be used as a user application domain.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_application_domain" lineno="1530">
+<interface name="userdom_user_application_domain" lineno="1624">
 <summary>
 Make the specified type usable as
 a user application domain.
@@ -121490,7 +122742,7 @@ Type to be used as the domain entry point.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content" lineno="1547">
+<interface name="userdom_user_home_content" lineno="1641">
 <summary>
 Make the specified type usable in a
 user home directory.
@@ -121502,7 +122754,7 @@ user home directory.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_file" lineno="1573">
+<interface name="userdom_user_tmp_file" lineno="1667">
 <summary>
 Make the specified type usable as a
 user temporary file.
@@ -121514,7 +122766,7 @@ temporary directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmpfs_file" lineno="1590">
+<interface name="userdom_user_tmpfs_file" lineno="1684">
 <summary>
 Make the specified type usable as a
 user tmpfs file.
@@ -121526,7 +122778,7 @@ tmpfs directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1605">
+<interface name="userdom_attach_admin_tun_iface" lineno="1699">
 <summary>
 Allow domain to attach to TUN devices created by administrative users.
 </summary>
@@ -121536,7 +122788,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ptys" lineno="1624">
+<interface name="userdom_setattr_user_ptys" lineno="1718">
 <summary>
 Set the attributes of a user pty.
 </summary>
@@ -121546,7 +122798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_pty" lineno="1642">
+<interface name="userdom_create_user_pty" lineno="1736">
 <summary>
 Create a user pty.
 </summary>
@@ -121556,7 +122808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1660">
+<interface name="userdom_getattr_user_home_dirs" lineno="1754">
 <summary>
 Get the attributes of user home directories.
 </summary>
@@ -121566,7 +122818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1679">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1773">
 <summary>
 Do not audit attempts to get the attributes of user home directories.
 </summary>
@@ -121576,7 +122828,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_dirs" lineno="1697">
+<interface name="userdom_search_user_home_dirs" lineno="1791">
 <summary>
 Search user home directories.
 </summary>
@@ -121586,7 +122838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1724">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1818">
 <summary>
 Do not audit attempts to search user home directories.
 </summary>
@@ -121604,7 +122856,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_list_user_home_dirs" lineno="1742">
+<interface name="userdom_list_user_home_dirs" lineno="1836">
 <summary>
 List user home directories.
 </summary>
@@ -121614,7 +122866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1761">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1855">
 <summary>
 Do not audit attempts to list user home subdirectories.
 </summary>
@@ -121624,7 +122876,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_home_dirs" lineno="1779">
+<interface name="userdom_create_user_home_dirs" lineno="1873">
 <summary>
 Create user home directories.
 </summary>
@@ -121634,7 +122886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1797">
+<interface name="userdom_manage_user_home_dirs" lineno="1891">
 <summary>
 Manage user home directories.
 </summary>
@@ -121644,7 +122896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1815">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1909">
 <summary>
 Relabel to user home directories.
 </summary>
@@ -121654,7 +122906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1839">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="1933">
 <summary>
 Create directories in the home dir root with
 the user home directory type.
@@ -121670,7 +122922,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_domtrans" lineno="1876">
+<interface name="userdom_user_home_domtrans" lineno="1970">
 <summary>
 Do a domain transition to the specified
 domain when executing a program in the
@@ -121699,7 +122951,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="1896">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="1990">
 <summary>
 Do not audit attempts to search user home content directories.
 </summary>
@@ -121709,7 +122961,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_home_content" lineno="1914">
+<interface name="userdom_list_all_user_home_content" lineno="2008">
 <summary>
 List all users home content directories.
 </summary>
@@ -121719,7 +122971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_home_content" lineno="1933">
+<interface name="userdom_list_user_home_content" lineno="2027">
 <summary>
 List contents of users home directory.
 </summary>
@@ -121729,7 +122981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="1952">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2046">
 <summary>
 Create, read, write, and delete directories
 in a user home subdirectory.
@@ -121740,7 +122992,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="1971">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2065">
 <summary>
 Delete all user home content directories.
 </summary>
@@ -121750,7 +123002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="1991">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2085">
 <summary>
 Delete directories in a user home subdirectory.
 </summary>
@@ -121760,7 +123012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2009">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2103">
 <summary>
 Set attributes of all user home content directories.
 </summary>
@@ -121770,7 +123022,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2029">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2123">
 <summary>
 Do not audit attempts to set the
 attributes of user home files.
@@ -121781,7 +123033,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_home_content_files" lineno="2047">
+<interface name="userdom_map_user_home_content_files" lineno="2141">
 <summary>
 Map user home files.
 </summary>
@@ -121791,7 +123043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2065">
+<interface name="userdom_mmap_user_home_content_files" lineno="2159">
 <summary>
 Mmap user home files.
 </summary>
@@ -121801,7 +123053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_files" lineno="2084">
+<interface name="userdom_read_user_home_content_files" lineno="2178">
 <summary>
 Read user home files.
 </summary>
@@ -121811,7 +123063,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2103">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2197">
 <summary>
 Do not audit attempts to read user home files.
 </summary>
@@ -121821,7 +123073,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_user_home_content" lineno="2122">
+<interface name="userdom_read_all_user_home_content" lineno="2216">
 <summary>
 Read all user home content, including application-specific resources.
 </summary>
@@ -121831,7 +123083,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2144">
+<interface name="userdom_manage_all_user_home_content" lineno="2238">
 <summary>
 Manage all user home content, including application-specific resources.
 </summary>
@@ -121841,7 +123093,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2166">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2260">
 <summary>
 Do not audit attempts to append user home files.
 </summary>
@@ -121851,7 +123103,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2184">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2278">
 <summary>
 Do not audit attempts to write user home files.
 </summary>
@@ -121861,7 +123113,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2202">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2296">
 <summary>
 Delete all user home content files.
 </summary>
@@ -121871,7 +123123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2222">
+<interface name="userdom_delete_user_home_content_files" lineno="2316">
 <summary>
 Delete files in a user home subdirectory.
 </summary>
@@ -121881,7 +123133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2240">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2334">
 <summary>
 Do not audit attempts to relabel user home files.
 </summary>
@@ -121891,7 +123143,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2258">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2352">
 <summary>
 Read user home subdirectory symbolic links.
 </summary>
@@ -121901,7 +123153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2278">
+<interface name="userdom_exec_user_home_content_files" lineno="2372">
 <summary>
 Execute user home files.
 </summary>
@@ -121912,7 +123164,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2305">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2399">
 <summary>
 Do not audit attempts to execute user home files.
 </summary>
@@ -121922,7 +123174,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2324">
+<interface name="userdom_manage_user_home_content_files" lineno="2418">
 <summary>
 Create, read, write, and delete files
 in a user home subdirectory.
@@ -121933,7 +123185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2345">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2439">
 <summary>
 Do not audit attempts to create, read, write, and delete directories
 in a user home subdirectory.
@@ -121944,7 +123196,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2364">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2458">
 <summary>
 Create, read, write, and delete symbolic links
 in a user home subdirectory.
@@ -121955,7 +123207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2384">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2478">
 <summary>
 Delete all user home content symbolic links.
 </summary>
@@ -121965,7 +123217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2404">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2498">
 <summary>
 Delete symbolic links in a user home directory.
 </summary>
@@ -121975,7 +123227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2423">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2517">
 <summary>
 Create, read, write, and delete named pipes
 in a user home subdirectory.
@@ -121986,7 +123238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2444">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2538">
 <summary>
 Create, read, write, and delete named sockets
 in a user home subdirectory.
@@ -121997,7 +123249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2481">
+<interface name="userdom_user_home_dir_filetrans" lineno="2575">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -122024,7 +123276,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2518">
+<interface name="userdom_user_home_content_filetrans" lineno="2612">
 <summary>
 Create objects in a directory located
 in a user home directory with an
@@ -122052,7 +123304,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2549">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2643">
 <summary>
 Automatically use the user_cert_t label for selected resources
 created in a users home directory
@@ -122073,7 +123325,7 @@ Name of the resource that is being created
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2579">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2673">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -122095,7 +123347,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_certs" lineno="2599">
+<interface name="userdom_read_user_certs" lineno="2693">
 <summary>
 Read user SSL certificates.
 </summary>
@@ -122106,7 +123358,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2622">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2716">
 <summary>
 Do not audit attempts to manage
 the user SSL certificates.
@@ -122118,7 +123370,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_manage_user_certs" lineno="2642">
+<interface name="userdom_manage_user_certs" lineno="2736">
 <summary>
 Manage user SSL certificates.
 </summary>
@@ -122128,7 +123380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2663">
+<interface name="userdom_write_user_tmp_sockets" lineno="2757">
 <summary>
 Write to user temporary named sockets.
 </summary>
@@ -122138,7 +123390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_tmp" lineno="2683">
+<interface name="userdom_list_user_tmp" lineno="2777">
 <summary>
 List user temporary directories.
 </summary>
@@ -122148,7 +123400,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2705">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2799">
 <summary>
 Do not audit attempts to list user
 temporary directories.
@@ -122159,7 +123411,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2723">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2817">
 <summary>
 Delete users temporary directories.
 </summary>
@@ -122169,7 +123421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2742">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2836">
 <summary>
 Do not audit attempts to manage users
 temporary directories.
@@ -122180,7 +123432,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_files" lineno="2760">
+<interface name="userdom_read_user_tmp_files" lineno="2854">
 <summary>
 Read user temporary files.
 </summary>
@@ -122190,7 +123442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmp_files" lineno="2781">
+<interface name="userdom_map_user_tmp_files" lineno="2875">
 <summary>
 Map user temporary files.
 </summary>
@@ -122200,7 +123452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2800">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2894">
 <summary>
 Do not audit attempts to read users
 temporary files.
@@ -122211,7 +123463,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2819">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2913">
 <summary>
 Do not audit attempts to append users
 temporary files.
@@ -122222,7 +123474,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmp_files" lineno="2837">
+<interface name="userdom_rw_user_tmp_files" lineno="2931">
 <summary>
 Read and write user temporary files.
 </summary>
@@ -122232,7 +123484,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_files" lineno="2858">
+<interface name="userdom_delete_user_tmp_files" lineno="2952">
 <summary>
 Delete users temporary files.
 </summary>
@@ -122242,7 +123494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2877">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2971">
 <summary>
 Do not audit attempts to manage users
 temporary files.
@@ -122253,7 +123505,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="2895">
+<interface name="userdom_read_user_tmp_symlinks" lineno="2989">
 <summary>
 Read user temporary symbolic links.
 </summary>
@@ -122263,7 +123515,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="2916">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3010">
 <summary>
 Delete users temporary symbolic links.
 </summary>
@@ -122273,7 +123525,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="2935">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3029">
 <summary>
 Create, read, write, and delete user
 temporary directories.
@@ -122284,7 +123536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="2955">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3049">
 <summary>
 Delete users temporary named pipes.
 </summary>
@@ -122294,7 +123546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_files" lineno="2974">
+<interface name="userdom_manage_user_tmp_files" lineno="3068">
 <summary>
 Create, read, write, and delete user
 temporary files.
@@ -122305,7 +123557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="2994">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3088">
 <summary>
 Delete users temporary named sockets.
 </summary>
@@ -122315,7 +123567,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3013">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3107">
 <summary>
 Create, read, write, and delete user
 temporary symbolic links.
@@ -122326,7 +123578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3034">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3128">
 <summary>
 Create, read, write, and delete user
 temporary named pipes.
@@ -122337,7 +123589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3055">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3149">
 <summary>
 Create, read, write, and delete user
 temporary named sockets.
@@ -122348,7 +123600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3092">
+<interface name="userdom_user_tmp_filetrans" lineno="3186">
 <summary>
 Create objects in a user temporary directory
 with an automatic type transition to
@@ -122375,7 +123627,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3124">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3218">
 <summary>
 Create objects in the temporary directory
 with an automatic type transition to
@@ -122397,7 +123649,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3142">
+<interface name="userdom_map_user_tmpfs_files" lineno="3236">
 <summary>
 Map user tmpfs files.
 </summary>
@@ -122407,7 +123659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3160">
+<interface name="userdom_read_user_tmpfs_files" lineno="3254">
 <summary>
 Read user tmpfs files.
 </summary>
@@ -122417,7 +123669,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3180">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3274">
 <summary>
 dontaudit Read attempts of user tmpfs files.
 </summary>
@@ -122427,7 +123679,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3199">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3293">
 <summary>
 relabel to/from user tmpfs dirs
 </summary>
@@ -122437,7 +123689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3218">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3312">
 <summary>
 relabel to/from user tmpfs files
 </summary>
@@ -122447,7 +123699,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_content" lineno="3240">
+<interface name="userdom_user_runtime_content" lineno="3334">
 <summary>
 Make the specified type usable in
 the directory /run/user/%{USERID}/.
@@ -122459,7 +123711,7 @@ user_runtime_content_dir_t.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime" lineno="3260">
+<interface name="userdom_search_user_runtime" lineno="3354">
 <summary>
 Search users runtime directories.
 </summary>
@@ -122469,7 +123721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime_root" lineno="3279">
+<interface name="userdom_search_user_runtime_root" lineno="3373">
 <summary>
 Search user runtime root directories.
 </summary>
@@ -122479,7 +123731,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3299">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3393">
 <summary>
 Create, read, write, and delete user
 runtime root dirs.
@@ -122490,7 +123742,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3318">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3412">
 <summary>
 Relabel to and from user runtime root dirs.
 </summary>
@@ -122500,7 +123752,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3337">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3431">
 <summary>
 Create, read, write, and delete user
 runtime dirs.
@@ -122511,7 +123763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3357">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3451">
 <summary>
 Mount a filesystem on user runtime dir
 directories.
@@ -122522,7 +123774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3375">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3469">
 <summary>
 Relabel to user runtime directories.
 </summary>
@@ -122532,7 +123784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3393">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3487">
 <summary>
 Relabel from user runtime directories.
 </summary>
@@ -122542,7 +123794,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3411">
+<interface name="userdom_delete_user_runtime_files" lineno="3505">
 <summary>
 delete user runtime files
 </summary>
@@ -122552,7 +123804,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_all_user_runtime" lineno="3430">
+<interface name="userdom_search_all_user_runtime" lineno="3524">
 <summary>
 Search users runtime directories.
 </summary>
@@ -122562,7 +123814,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_runtime" lineno="3449">
+<interface name="userdom_list_all_user_runtime" lineno="3543">
 <summary>
 List user runtime directories.
 </summary>
@@ -122572,7 +123824,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3468">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3562">
 <summary>
 delete user runtime directories
 </summary>
@@ -122582,7 +123834,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3486">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3580">
 <summary>
 delete user runtime files
 </summary>
@@ -122592,7 +123844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3505">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3599">
 <summary>
 delete user runtime symlink files
 </summary>
@@ -122602,7 +123854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3524">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3618">
 <summary>
 delete user runtime fifo files
 </summary>
@@ -122612,7 +123864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3543">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3637">
 <summary>
 delete user runtime socket files
 </summary>
@@ -122622,10 +123874,32 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3574">
+<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3668">
 <summary>
 Create objects in the pid directory
 with an automatic type transition to
+the user runtime root type.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The class of the object to be created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3695">
+<summary>
+Create objects in the runtime directory
+with an automatic type transition to
 the user runtime root type.
 </summary>
 <param name="domain">
@@ -122644,7 +123918,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3610">
+<interface name="userdom_user_runtime_filetrans" lineno="3731">
 <summary>
 Create objects in a user runtime
 directory with an automatic type
@@ -122672,7 +123946,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3641">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3762">
 <summary>
 Create objects in the user runtime directory
 with an automatic type transition to
@@ -122694,7 +123968,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3671">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3792">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -122716,7 +123990,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="3702">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="3823">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -122738,7 +124012,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="3720">
+<interface name="userdom_rw_user_tmpfs_files" lineno="3841">
 <summary>
 Read and write user tmpfs files.
 </summary>
@@ -122748,7 +124022,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="3741">
+<interface name="userdom_delete_user_tmpfs_files" lineno="3862">
 <summary>
 Delete user tmpfs files.
 </summary>
@@ -122758,7 +124032,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="3760">
+<interface name="userdom_manage_user_tmpfs_files" lineno="3881">
 <summary>
 Create, read, write, and delete user tmpfs files.
 </summary>
@@ -122768,7 +124042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_ttys" lineno="3780">
+<interface name="userdom_getattr_user_ttys" lineno="3901">
 <summary>
 Get the attributes of a user domain tty.
 </summary>
@@ -122778,7 +124052,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3798">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3919">
 <summary>
 Do not audit attempts to get the attributes of a user domain tty.
 </summary>
@@ -122788,7 +124062,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ttys" lineno="3816">
+<interface name="userdom_setattr_user_ttys" lineno="3937">
 <summary>
 Set the attributes of a user domain tty.
 </summary>
@@ -122798,7 +124072,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3834">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3955">
 <summary>
 Do not audit attempts to set the attributes of a user domain tty.
 </summary>
@@ -122808,7 +124082,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ttys" lineno="3852">
+<interface name="userdom_use_user_ttys" lineno="3973">
 <summary>
 Read and write a user domain tty.
 </summary>
@@ -122818,7 +124092,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ptys" lineno="3870">
+<interface name="userdom_use_user_ptys" lineno="3991">
 <summary>
 Read and write a user domain pty.
 </summary>
@@ -122828,7 +124102,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="3905">
+<interface name="userdom_use_inherited_user_terminals" lineno="4026">
 <summary>
 Read and write a user TTYs and PTYs.
 </summary>
@@ -122854,7 +124128,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_use_user_terminals" lineno="3946">
+<interface name="userdom_use_user_terminals" lineno="4067">
 <summary>
 Read, write and open a user TTYs and PTYs.
 </summary>
@@ -122886,7 +124160,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="3962">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4083">
 <summary>
 Do not audit attempts to read and write
 a user domain tty and pty.
@@ -122897,7 +124171,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="3983">
+<interface name="userdom_spec_domtrans_all_users" lineno="4104">
 <summary>
 Execute a shell in all user domains.  This
 is an explicit transition, requiring the
@@ -122909,7 +124183,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4006">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4127">
 <summary>
 Execute an Xserver session in all user domains.  This
 is an explicit transition, requiring the
@@ -122921,7 +124195,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4029">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4150">
 <summary>
 Execute a shell in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -122933,7 +124207,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4052">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4173">
 <summary>
 Execute an Xserver session in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -122945,7 +124219,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4073">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4194">
 <summary>
 Read and write unpriviledged user SysV sempaphores.
 </summary>
@@ -122955,7 +124229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4091">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4212">
 <summary>
 Manage unpriviledged user SysV sempaphores.
 </summary>
@@ -122965,7 +124239,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4110">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4231">
 <summary>
 Read and write unpriviledged user SysV shared
 memory segments.
@@ -122976,7 +124250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4129">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4250">
 <summary>
 Manage unpriviledged user SysV shared
 memory segments.
@@ -122987,7 +124261,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4149">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4270">
 <summary>
 Execute bin_t in the unprivileged user domains. This
 is an explicit transition, requiring the
@@ -122999,7 +124273,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4172">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4293">
 <summary>
 Execute all entrypoint files in unprivileged user
 domains. This is an explicit transition, requiring the
@@ -123011,7 +124285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_content" lineno="4193">
+<interface name="userdom_search_user_home_content" lineno="4314">
 <summary>
 Search users home directories.
 </summary>
@@ -123021,7 +124295,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signull_unpriv_users" lineno="4212">
+<interface name="userdom_signull_unpriv_users" lineno="4333">
 <summary>
 Send signull to unprivileged user domains.
 </summary>
@@ -123031,7 +124305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_unpriv_users" lineno="4230">
+<interface name="userdom_signal_unpriv_users" lineno="4351">
 <summary>
 Send general signals to unprivileged user domains.
 </summary>
@@ -123041,7 +124315,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4248">
+<interface name="userdom_use_unpriv_users_fds" lineno="4369">
 <summary>
 Inherit the file descriptors from unprivileged user domains.
 </summary>
@@ -123051,7 +124325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4276">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4397">
 <summary>
 Do not audit attempts to inherit the file descriptors
 from unprivileged user domains.
@@ -123071,7 +124345,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4294">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4415">
 <summary>
 Do not audit attempts to use user ptys.
 </summary>
@@ -123081,7 +124355,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4312">
+<interface name="userdom_relabelto_user_ptys" lineno="4433">
 <summary>
 Relabel files to unprivileged user pty types.
 </summary>
@@ -123091,7 +124365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4331">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4452">
 <summary>
 Do not audit attempts to relabel files from
 user pty types.
@@ -123102,7 +124376,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_files" lineno="4349">
+<interface name="userdom_write_user_tmp_files" lineno="4470">
 <summary>
 Write all users files in /tmp
 </summary>
@@ -123112,7 +124386,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4368">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4489">
 <summary>
 Do not audit attempts to write users
 temporary files.
@@ -123123,7 +124397,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4386">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4507">
 <summary>
 Do not audit attempts to use user ttys.
 </summary>
@@ -123133,7 +124407,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_state" lineno="4404">
+<interface name="userdom_read_all_users_state" lineno="4525">
 <summary>
 Read the process state of all user domains.
 </summary>
@@ -123143,7 +124417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_all_users" lineno="4423">
+<interface name="userdom_getattr_all_users" lineno="4545">
 <summary>
 Get the attributes of all user domains.
 </summary>
@@ -123153,7 +124427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_all_users_fds" lineno="4441">
+<interface name="userdom_use_all_users_fds" lineno="4563">
 <summary>
 Inherit the file descriptors from all user domains
 </summary>
@@ -123163,7 +124437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4460">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4582">
 <summary>
 Do not audit attempts to inherit the file
 descriptors from any user domains.
@@ -123174,7 +124448,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_all_users" lineno="4478">
+<interface name="userdom_signal_all_users" lineno="4600">
 <summary>
 Send general signals to all user domains.
 </summary>
@@ -123184,7 +124458,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_sigchld_all_users" lineno="4496">
+<interface name="userdom_sigchld_all_users" lineno="4618">
 <summary>
 Send a SIGCHLD signal to all user domains.
 </summary>
@@ -123194,7 +124468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_keys" lineno="4514">
+<interface name="userdom_read_all_users_keys" lineno="4636">
 <summary>
 Read keys for all user domains.
 </summary>
@@ -123204,7 +124478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_all_users_keys" lineno="4532">
+<interface name="userdom_write_all_users_keys" lineno="4654">
 <summary>
 Write keys for all user domains.
 </summary>
@@ -123214,7 +124488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_all_users_keys" lineno="4550">
+<interface name="userdom_rw_all_users_keys" lineno="4672">
 <summary>
 Read and write keys for all user domains.
 </summary>
@@ -123224,7 +124498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_all_users_keys" lineno="4568">
+<interface name="userdom_create_all_users_keys" lineno="4690">
 <summary>
 Create keys for all user domains.
 </summary>
@@ -123234,7 +124508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_users_keys" lineno="4586">
+<interface name="userdom_manage_all_users_keys" lineno="4708">
 <summary>
 Manage keys for all user domains.
 </summary>
@@ -123244,7 +124518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dbus_send_all_users" lineno="4604">
+<interface name="userdom_dbus_send_all_users" lineno="4726">
 <summary>
 Send a dbus message to all user domains.
 </summary>
@@ -123254,7 +124528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4626">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4748">
 <summary>
 Create, read, write, and delete user
 temporary character files.
@@ -123265,7 +124539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_certs" lineno="4647">
+<interface name="userdom_relabel_user_certs" lineno="4769">
 <summary>
 Allow relabeling resources to user_cert_t
 </summary>
@@ -123275,7 +124549,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4670">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4792">
 <summary>
 Do not audit attempts to read and write
 unserdomain stream.
@@ -123391,7 +124665,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_cache_files" lineno="96">
+<interface name="xdg_watch_cache_dirs" lineno="96">
+<summary>
+Watch the xdg cache home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_cache_dirs" lineno="114">
+<summary>
+Watch all the xdg cache home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_cache_files" lineno="132">
 <summary>
 Read the xdg cache home files
 </summary>
@@ -123401,7 +124695,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_cache_files" lineno="119">
+<interface name="xdg_read_all_cache_files" lineno="155">
 <summary>
 Read all xdg_cache_type files
 </summary>
@@ -123411,7 +124705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_cache_filetrans" lineno="159">
+<interface name="xdg_cache_filetrans" lineno="195">
 <summary>
 Create objects in an xdg_cache directory
 with an automatic type transition to
@@ -123438,7 +124732,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="192">
+<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="228">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_cache_t type.
@@ -123459,7 +124753,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_cache_dirs" lineno="210">
+<interface name="xdg_create_cache_dirs" lineno="246">
 <summary>
 Create xdg cache home directories
 </summary>
@@ -123469,7 +124763,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_cache" lineno="228">
+<interface name="xdg_manage_cache" lineno="264">
 <summary>
 Manage the xdg cache home files
 </summary>
@@ -123479,7 +124773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_cache" lineno="253">
+<interface name="xdg_manage_all_cache" lineno="289">
 <summary>
 Manage all the xdg cache home files regardless of their specific type
 </summary>
@@ -123489,7 +124783,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_cache" lineno="278">
+<interface name="xdg_relabel_cache" lineno="314">
 <summary>
 Allow relabeling the xdg cache home files
 </summary>
@@ -123499,7 +124793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_cache" lineno="302">
+<interface name="xdg_relabel_all_cache" lineno="338">
 <summary>
 Allow relabeling the xdg cache home files, regardless of their specific type
 </summary>
@@ -123509,7 +124803,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_search_config_dirs" lineno="326">
+<interface name="xdg_search_config_dirs" lineno="362">
 <summary>
 Search through the xdg config home directories
 </summary>
@@ -123519,7 +124813,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_config_files" lineno="346">
+<interface name="xdg_watch_config_dirs" lineno="382">
+<summary>
+Watch the xdg config home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_config_dirs" lineno="400">
+<summary>
+Watch all the xdg config home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_config_files" lineno="418">
 <summary>
 Read the xdg config home files
 </summary>
@@ -123529,7 +124843,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_config_files" lineno="369">
+<interface name="xdg_read_all_config_files" lineno="441">
 <summary>
 Read all xdg_config_type files
 </summary>
@@ -123539,7 +124853,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_filetrans" lineno="409">
+<interface name="xdg_config_filetrans" lineno="481">
 <summary>
 Create objects in an xdg_config directory
 with an automatic type transition to
@@ -123566,7 +124880,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="442">
+<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_config_t type.
@@ -123587,7 +124901,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_config_dirs" lineno="460">
+<interface name="xdg_create_config_dirs" lineno="532">
 <summary>
 Create xdg config home directories
 </summary>
@@ -123597,7 +124911,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_config" lineno="478">
+<interface name="xdg_manage_config" lineno="550">
 <summary>
 Manage the xdg config home files
 </summary>
@@ -123607,7 +124921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_config" lineno="503">
+<interface name="xdg_manage_all_config" lineno="575">
 <summary>
 Manage all the xdg config home files regardless of their specific type
 </summary>
@@ -123617,7 +124931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_config" lineno="528">
+<interface name="xdg_relabel_config" lineno="600">
 <summary>
 Allow relabeling the xdg config home files
 </summary>
@@ -123627,7 +124941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_config" lineno="552">
+<interface name="xdg_relabel_all_config" lineno="624">
 <summary>
 Allow relabeling the xdg config home files, regardless of their specific type
 </summary>
@@ -123637,7 +124951,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_data_files" lineno="576">
+<interface name="xdg_watch_data_dirs" lineno="648">
+<summary>
+Watch the xdg data home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_data_dirs" lineno="666">
+<summary>
+Watch all the xdg data home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_data_files" lineno="684">
 <summary>
 Read the xdg data home files
 </summary>
@@ -123647,7 +124981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_data_files" lineno="599">
+<interface name="xdg_read_all_data_files" lineno="707">
 <summary>
 Read all xdg_data_type files
 </summary>
@@ -123657,7 +124991,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_filetrans" lineno="639">
+<interface name="xdg_data_filetrans" lineno="747">
 <summary>
 Create objects in an xdg_data directory
 with an automatic type transition to
@@ -123684,7 +125018,7 @@ Optional name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="672">
+<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="780">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_data_t type.
@@ -123705,7 +125039,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_data_dirs" lineno="690">
+<interface name="xdg_create_data_dirs" lineno="798">
 <summary>
 Create xdg data home directories
 </summary>
@@ -123715,7 +125049,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_data" lineno="708">
+<interface name="xdg_manage_data" lineno="816">
 <summary>
 Manage the xdg data home files
 </summary>
@@ -123725,7 +125059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_data" lineno="733">
+<interface name="xdg_manage_all_data" lineno="841">
 <summary>
 Manage all the xdg data home files, regardless of their specific type
 </summary>
@@ -123735,7 +125069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_data" lineno="758">
+<interface name="xdg_relabel_data" lineno="866">
 <summary>
 Allow relabeling the xdg data home files
 </summary>
@@ -123745,7 +125079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_data" lineno="782">
+<interface name="xdg_relabel_all_data" lineno="890">
 <summary>
 Allow relabeling the xdg data home files, regardless of their type
 </summary>
@@ -123755,7 +125089,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="817">
+<interface name="xdg_watch_documents_dirs" lineno="914">
+<summary>
+Watch the xdg documents home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="943">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_documents_t type.
@@ -123776,7 +125120,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_documents" lineno="835">
+<interface name="xdg_manage_documents" lineno="961">
 <summary>
 Manage documents content
 </summary>
@@ -123786,7 +125130,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_documents" lineno="856">
+<interface name="xdg_relabel_documents" lineno="982">
 <summary>
 Allow relabeling the documents resources
 </summary>
@@ -123796,7 +125140,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_downloads" lineno="878">
+<interface name="xdg_watch_downloads_dirs" lineno="1004">
+<summary>
+Watch the xdg downloads home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_downloads" lineno="1022">
 <summary>
 Read downloaded content
 </summary>
@@ -123806,7 +125160,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_downloads" lineno="901">
+<interface name="xdg_create_downloads" lineno="1045">
 <summary>
 Create downloaded content
 </summary>
@@ -123816,7 +125170,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_write_downloads" lineno="924">
+<interface name="xdg_write_downloads" lineno="1068">
 <summary>
 Write downloaded content
 </summary>
@@ -123826,7 +125180,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="958">
+<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1102">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_downloads_t type.
@@ -123847,7 +125201,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_downloads" lineno="976">
+<interface name="xdg_manage_downloads" lineno="1120">
 <summary>
 Manage downloaded content
 </summary>
@@ -123857,7 +125211,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_downloads" lineno="997">
+<interface name="xdg_relabel_downloads" lineno="1141">
 <summary>
 Allow relabeling the downloads resources
 </summary>
@@ -123867,7 +125221,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_pictures" lineno="1019">
+<interface name="xdg_watch_pictures_dirs" lineno="1163">
+<summary>
+Watch the xdg pictures home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_pictures" lineno="1181">
 <summary>
 Read user pictures content
 </summary>
@@ -123877,7 +125241,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1053">
+<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1215">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_pictures_t type.
@@ -123898,7 +125262,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_pictures" lineno="1071">
+<interface name="xdg_manage_pictures" lineno="1233">
 <summary>
 Manage pictures content
 </summary>
@@ -123908,7 +125272,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_pictures" lineno="1092">
+<interface name="xdg_relabel_pictures" lineno="1254">
 <summary>
 Allow relabeling the pictures resources
 </summary>
@@ -123918,7 +125282,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_music" lineno="1114">
+<interface name="xdg_watch_music_dirs" lineno="1276">
+<summary>
+Watch the xdg music home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_music" lineno="1294">
 <summary>
 Read user music content
 </summary>
@@ -123928,7 +125302,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1148">
+<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1328">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_pictures_t type.
@@ -123949,7 +125323,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_music" lineno="1166">
+<interface name="xdg_manage_music" lineno="1346">
 <summary>
 Manage music content
 </summary>
@@ -123959,7 +125333,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_music" lineno="1187">
+<interface name="xdg_relabel_music" lineno="1367">
 <summary>
 Allow relabeling the music resources
 </summary>
@@ -123969,7 +125343,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_videos" lineno="1209">
+<interface name="xdg_watch_videos_dirs" lineno="1389">
+<summary>
+Watch the xdg video content
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_videos" lineno="1407">
 <summary>
 Read user video content
 </summary>
@@ -123979,7 +125363,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1243">
+<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1441">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_videos_t type.
@@ -124000,7 +125384,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_videos" lineno="1261">
+<interface name="xdg_manage_videos" lineno="1459">
 <summary>
 Manage video content
 </summary>
@@ -124010,7 +125394,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_videos" lineno="1282">
+<interface name="xdg_relabel_videos" lineno="1480">
 <summary>
 Allow relabeling the videos resources
 </summary>
@@ -124020,7 +125404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_cache_home_content" lineno="1308">
+<interface name="xdg_cache_home_content" lineno="1506">
 <summary>
 Mark the selected type as an xdg_cache_home_type
 </summary>
@@ -124030,7 +125414,7 @@ Type to give the xdg_cache_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_home_content" lineno="1322">
+<interface name="xdg_config_home_content" lineno="1520">
 <summary>
 Mark the selected type as an xdg_config_home_type
 </summary>
@@ -124040,7 +125424,7 @@ Type to give the xdg_config_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_home_content" lineno="1336">
+<interface name="xdg_data_home_content" lineno="1534">
 <summary>
 Mark the selected type as an xdg_data_home_type
 </summary>
@@ -124050,7 +125434,7 @@ Type to give the xdg_data_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_cache_home_files" lineno="1350">
+<interface name="xdg_read_cache_home_files" lineno="1548">
 <summary>
 Read the xdg cache home files
 </summary>
@@ -124060,7 +125444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_cache_home_files" lineno="1364">
+<interface name="xdg_read_all_cache_home_files" lineno="1562">
 <summary>
 Read all xdg_cache_home_type files
 </summary>
@@ -124070,7 +125454,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_cache_home_filetrans" lineno="1395">
+<interface name="xdg_cache_home_filetrans" lineno="1593">
 <summary>
 Create objects in an xdg_cache_home directory
 with an automatic type transition to
@@ -124097,7 +125481,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1420">
+<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1618">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_cache_home_t type.
@@ -124118,7 +125502,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_cache_home_dirs" lineno="1434">
+<interface name="xdg_create_cache_home_dirs" lineno="1632">
 <summary>
 Create xdg cache home directories
 </summary>
@@ -124128,7 +125512,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_cache_home" lineno="1448">
+<interface name="xdg_manage_cache_home" lineno="1646">
 <summary>
 Manage the xdg cache home files
 </summary>
@@ -124138,7 +125522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_cache_home" lineno="1462">
+<interface name="xdg_manage_all_cache_home" lineno="1660">
 <summary>
 Manage all the xdg cache home files regardless of their specific type
 </summary>
@@ -124148,7 +125532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_cache_home" lineno="1476">
+<interface name="xdg_relabel_cache_home" lineno="1674">
 <summary>
 Allow relabeling the xdg cache home files
 </summary>
@@ -124158,7 +125542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_cache_home" lineno="1490">
+<interface name="xdg_relabel_all_cache_home" lineno="1688">
 <summary>
 Allow relabeling the xdg cache home files, regardless of their specific type
 </summary>
@@ -124168,7 +125552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_search_config_home_dirs" lineno="1504">
+<interface name="xdg_search_config_home_dirs" lineno="1702">
 <summary>
 Search through the xdg config home directories
 </summary>
@@ -124178,7 +125562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_config_home_files" lineno="1518">
+<interface name="xdg_read_config_home_files" lineno="1716">
 <summary>
 Read the xdg config home files
 </summary>
@@ -124188,7 +125572,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_config_home_files" lineno="1532">
+<interface name="xdg_read_all_config_home_files" lineno="1730">
 <summary>
 Read all xdg_config_home_type files
 </summary>
@@ -124198,7 +125582,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_home_filetrans" lineno="1563">
+<interface name="xdg_config_home_filetrans" lineno="1761">
 <summary>
 Create objects in an xdg_config_home directory
 with an automatic type transition to
@@ -124225,7 +125609,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1588">
+<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1786">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_config_home_t type.
@@ -124246,7 +125630,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_config_home_dirs" lineno="1602">
+<interface name="xdg_create_config_home_dirs" lineno="1800">
 <summary>
 Create xdg config home directories
 </summary>
@@ -124256,7 +125640,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_config_home" lineno="1616">
+<interface name="xdg_manage_config_home" lineno="1814">
 <summary>
 Manage the xdg config home files
 </summary>
@@ -124266,7 +125650,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_config_home" lineno="1630">
+<interface name="xdg_manage_all_config_home" lineno="1828">
 <summary>
 Manage all the xdg config home files regardless of their specific type
 </summary>
@@ -124276,7 +125660,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_config_home" lineno="1644">
+<interface name="xdg_relabel_config_home" lineno="1842">
 <summary>
 Allow relabeling the xdg config home files
 </summary>
@@ -124286,7 +125670,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_config_home" lineno="1658">
+<interface name="xdg_relabel_all_config_home" lineno="1856">
 <summary>
 Allow relabeling the xdg config home files, regardless of their specific type
 </summary>
@@ -124296,7 +125680,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_data_home_files" lineno="1672">
+<interface name="xdg_read_data_home_files" lineno="1870">
 <summary>
 Read the xdg data home files
 </summary>
@@ -124306,7 +125690,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_data_home_files" lineno="1686">
+<interface name="xdg_read_all_data_home_files" lineno="1884">
 <summary>
 Read all xdg_data_home_type files
 </summary>
@@ -124316,7 +125700,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_home_filetrans" lineno="1717">
+<interface name="xdg_data_home_filetrans" lineno="1915">
 <summary>
 Create objects in an xdg_data_home directory
 with an automatic type transition to
@@ -124343,7 +125727,7 @@ Optional name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1742">
+<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1940">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_data_home_t type.
@@ -124364,7 +125748,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_data_home_dirs" lineno="1756">
+<interface name="xdg_create_data_home_dirs" lineno="1954">
 <summary>
 Create xdg data home directories
 </summary>
@@ -124374,7 +125758,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_data_home" lineno="1770">
+<interface name="xdg_manage_data_home" lineno="1968">
 <summary>
 Manage the xdg data home files
 </summary>
@@ -124384,7 +125768,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_data_home" lineno="1784">
+<interface name="xdg_manage_all_data_home" lineno="1982">
 <summary>
 Manage all the xdg data home files, regardless of their specific type
 </summary>
@@ -124394,7 +125778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_data_home" lineno="1798">
+<interface name="xdg_relabel_data_home" lineno="1996">
 <summary>
 Allow relabeling the xdg data home files
 </summary>
@@ -124404,7 +125788,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_data_home" lineno="1812">
+<interface name="xdg_relabel_all_data_home" lineno="2010">
 <summary>
 Allow relabeling the xdg data home files, regardless of their type
 </summary>
@@ -124414,7 +125798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_downloads_home" lineno="1826">
+<interface name="xdg_read_downloads_home" lineno="2024">
 <summary>
 Read downloaded content
 </summary>
@@ -124424,7 +125808,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_videos_home" lineno="1840">
+<interface name="xdg_read_videos_home" lineno="2038">
 <summary>
 Read user video content
 </summary>
@@ -124434,7 +125818,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_pictures_home" lineno="1854">
+<interface name="xdg_read_pictures_home" lineno="2052">
 <summary>
 Read user pictures content
 </summary>
@@ -124444,7 +125828,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_music_home" lineno="1868">
+<interface name="xdg_read_music_home" lineno="2066">
 <summary>
 Read user music content
 </summary>
@@ -124454,7 +125838,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_downloads_home" lineno="1882">
+<interface name="xdg_create_downloads_home" lineno="2080">
 <summary>
 Create downloaded content
 </summary>
@@ -124464,7 +125848,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_write_downloads_home" lineno="1896">
+<interface name="xdg_write_downloads_home" lineno="2094">
 <summary>
 Write downloaded content
 </summary>
@@ -124474,7 +125858,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_downloads_home" lineno="1910">
+<interface name="xdg_manage_downloads_home" lineno="2108">
 <summary>
 Manage downloaded content
 </summary>
@@ -124484,7 +125868,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_documents_home" lineno="1924">
+<interface name="xdg_manage_documents_home" lineno="2122">
 <summary>
 Manage documents content
 </summary>
@@ -124494,7 +125878,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_music_home" lineno="1938">
+<interface name="xdg_manage_music_home" lineno="2136">
 <summary>
 Manage music content
 </summary>
@@ -124504,7 +125888,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_pictures_home" lineno="1952">
+<interface name="xdg_manage_pictures_home" lineno="2150">
 <summary>
 Manage pictures content
 </summary>
@@ -124514,7 +125898,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_videos_home" lineno="1966">
+<interface name="xdg_manage_videos_home" lineno="2164">
 <summary>
 Manage video content
 </summary>
@@ -124622,7 +126006,7 @@ Domain allowed access.
 </interface>
 <interface name="xen_read_xenstored_pid_files" lineno="189">
 <summary>
-Read xenstored pid files.
+Read xenstored pid files.  (Deprecated)
 </summary>
 <param name="domain">
 <summary>
@@ -124630,7 +126014,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209">
+<interface name="xen_read_xenstored_runtime_files" lineno="204">
+<summary>
+Read xenstored runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224">
 <summary>
 Do not audit attempts to read and write
 Xen unix domain stream sockets.
@@ -124641,7 +126035,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect_xenstore" lineno="228">
+<interface name="xen_stream_connect_xenstore" lineno="243">
 <summary>
 Connect to xenstored with a unix
 domain stream socket.
@@ -124652,7 +126046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect" lineno="248">
+<interface name="xen_stream_connect" lineno="263">
 <summary>
 Connect to xend with a unix
 domain stream socket.
@@ -124663,7 +126057,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_pid_filetrans" lineno="280">
+<interface name="xen_pid_filetrans" lineno="295">
+<summary>
+Create in a xend_runtime_t directory  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="xen_runtime_filetrans" lineno="320">
 <summary>
 Create in a xend_runtime_t directory
 </summary>
@@ -124683,7 +126097,7 @@ The object class of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="xen_domtrans_xm" lineno="298">
+<interface name="xen_domtrans_xm" lineno="338">
 <summary>
 Execute a domain transition to run xm.
 </summary>
@@ -124693,7 +126107,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect_xm" lineno="318">
+<interface name="xen_stream_connect_xm" lineno="358">
 <summary>
 Connect to xm with a unix
 domain stream socket.
@@ -124766,6 +126180,16 @@ Allow unconfined executables to make their stack executable.  This should never,
 </p>
 </desc>
 </tunable>
+<tunable name="allow_raw_memory_access" dftval="false">
+<desc>
+<p>
+Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
+dev/oldmem, /dev/port) access for confined executables.  This is
+extremely dangerous as it can bypass the SELinux protections, and
+should only be used by trusted domains.
+</p>
+</desc>
+</tunable>
 <tunable name="allow_polyinstantiation" dftval="false">
 <desc>
 <p>

diff --git a/policy/booleans.conf b/policy/booleans.conf
index 1d130d20..4b1ccd81 100644
--- a/policy/booleans.conf
+++ b/policy/booleans.conf
@@ -118,6 +118,22 @@ puppet_manage_all_files = false
 # 
 rkhunter_connect_http = false
 
+#
+# Determine whether all sudo domains
+# can connect to TCP HTTP ports. This
+# is needed if an additional authentication
+# mechanism via an HTTP server is
+# required for users to use sudo.
+# 
+sudo_all_tcp_connect_http_port = false
+
+#
+# Determine whether authorized users can control the daemon,
+# which requires usbguard-daemon to be able modify its rules in
+# /etc/usbguard.
+# 
+usbguard_user_modify_rule_files = false
+
 #
 # Determine whether attempts by
 # vbetool to mmap low regions should
@@ -147,6 +163,16 @@ allow_httpd_awstats_script_anon_write = false
 # 
 cdrecord_read_content = false
 
+#
+# Allow chromium to access direct rendering interface
+# 
+# 
+# 
+# 
+# Needed for good performance on complex sites
+# 
+chromium_dri = true
+
 #
 # Allow chromium to read system information
 # 
@@ -745,6 +771,12 @@ dbadm_read_user_files = false
 # 
 allow_ptrace = false
 
+#
+# Allow sysadm to read/write to fifo files inherited from
+# a domain allowed to change role.
+# 
+sysadm_allow_rw_inherited_fifo = false
+
 #
 # Determine whether webadm can
 # manage generic user files.
@@ -878,7 +910,7 @@ httpd_can_sendmail = false
 httpd_dbus_avahi = false
 
 #
-# Determine wether httpd can use support.
+# Determine whether httpd can use support.
 # 
 httpd_enable_cgi = false
 
@@ -1163,6 +1195,13 @@ allow_cvs_read_shadow = false
 # 
 allow_httpd_cvs_script_anon_write = false
 
+#
+# Allow dbus-daemon system bus to access /dev/net/tun
+# which is needed to pass tun/tap device file descriptors
+# over D-Bus.  This is needed by openvpn3-linux.
+# 
+dbus_pass_tuntap_fd = false
+
 #
 # Determine whether DHCP daemon
 # can use LDAP backends.
@@ -1464,6 +1503,11 @@ openvpn_enable_homedirs = false
 # 
 openvpn_can_network_connect = false
 
+#
+# Allow pacemaker to start/stop services
+# 
+pacemaker_startstop_all_services = false
+
 #
 # Determine whether Polipo system
 # daemon can access CIFS file systems.
@@ -1744,6 +1788,12 @@ spamassassin_can_network = false
 # 
 spamd_enable_home_dirs = false
 
+#
+# Determine whether extra rules should
+# be enabled to support rspamd.
+# 
+rspamd_spamd = false
+
 #
 # Determine whether squid can
 # connect to all TCP ports.
@@ -1867,12 +1917,10 @@ virt_use_xserver = false
 virt_use_vfio = false
 
 #
-# Determine whether the script domain can
-# modify public files used for public file
-# transfer services. Directories/Files must
-# be labeled public_content_rw_t.
+# Determine whether confined virtual guests
+# can use input devices via evdev pass through.
 # 
-allow_httpd_w3c_validator_script_anon_write = false
+virt_use_evdev = false
 
 #
 # Allows clients to write to the X server shared
@@ -1896,6 +1944,11 @@ xserver_gnome_xdm = false
 # 
 xserver_object_manager = false
 
+#
+# Allow DRI access
+# 
+xserver_allow_dri = false
+
 #
 # Determine whether zabbix can
 # connect to all TCP ports
@@ -1938,6 +1991,12 @@ racoon_read_shadow = false
 # 
 allow_mount_anyfile = false
 
+#
+# Determine whether DHCP client
+# can manage samba
+# 
+dhcpc_manage_samba = false
+
 #
 # Enable support for systemd-tmpfiles to manage all non-security files.
 # 
@@ -1956,6 +2015,18 @@ systemd_nspawn_labeled_namespace = false
 # 
 systemd_logind_get_bootloader = false
 
+#
+# Allow systemd-socket-proxyd to bind any port instead of one labelled
+# with systemd_socket_proxyd_port_t.
+# 
+systemd_socket_proxyd_bind_any = false
+
+#
+# Allow systemd-socket-proxyd to connect to any port instead of
+# labelled ones.
+# 
+systemd_socket_proxyd_connect_any = false
+
 #
 # Determine whether tmpfiles can manage
 # all non-security sensitive resources.
@@ -2052,6 +2123,14 @@ allow_execmod = false
 # 
 allow_execstack = false
 
+#
+# Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
+# dev/oldmem, /dev/port) access for confined executables.  This is
+# extremely dangerous as it can bypass the SELinux protections, and
+# should only be used by trusted domains.
+# 
+allow_raw_memory_access = false
+
 #
 # Enable polyinstantiated directory support.
 # 

diff --git a/policy/modules.conf b/policy/modules.conf
index 2fdd98bc..205c52fe 100644
--- a/policy/modules.conf
+++ b/policy/modules.conf
@@ -291,13 +291,6 @@ hwloc = module
 # 
 kdump = module
 
-# Layer: admin
-# Module: kdumpgui
-#
-# System-config-kdump GUI.
-# 
-kdumpgui = module
-
 # Layer: admin
 # Module: kismet
 #
@@ -305,13 +298,6 @@ kdumpgui = module
 # 
 kismet = module
 
-# Layer: admin
-# Module: kudzu
-#
-# Hardware detection and configuration tools.
-# 
-kudzu = module
-
 # Layer: admin
 # Module: logrotate
 #
@@ -389,13 +375,6 @@ puppet = module
 # 
 quota = module
 
-# Layer: admin
-# Module: readahead
-#
-# Read files into page cache for improved performance.
-# 
-readahead = module
-
 # Layer: admin
 # Module: rkhunter
 #
@@ -424,13 +403,6 @@ samhain = module
 # 
 sblim = module
 
-# Layer: admin
-# Module: sectoolm
-#
-# Sectool security audit tool.
-# 
-sectoolm = module
-
 # Layer: admin
 # Module: shorewall
 #
@@ -445,13 +417,6 @@ shorewall = module
 # 
 shutdown = module
 
-# Layer: admin
-# Module: smoltclient
-#
-# The Fedora hardware profiler client.
-# 
-smoltclient = module
-
 # Layer: admin
 # Module: sosreport
 #
@@ -515,6 +480,14 @@ tzdata = module
 # 
 updfstab = module
 
+# Layer: admin
+# Module: usbguard
+#
+# Usbguard enforces the USB device authorization policy for all USB
+# devices.
+# 
+usbguard = module
+
 # Layer: admin
 # Module: usbmodules
 #
@@ -543,13 +516,6 @@ vbetool = module
 # 
 vpn = module
 
-# Layer: apps
-# Module: ada
-#
-# GNAT Ada95 compiler.
-# 
-ada = module
-
 # Layer: apps
 # Module: awstats
 #
@@ -599,13 +565,6 @@ cryfs = module
 # 
 evolution = module
 
-# Layer: apps
-# Module: firewallgui
-#
-# system-config-firewall dbus system service.
-# 
-firewallgui = module
-
 # Layer: apps
 # Module: games
 #
@@ -613,13 +572,6 @@ firewallgui = module
 # 
 games = module
 
-# Layer: apps
-# Module: gift
-#
-# Peer to peer file sharing tool.
-# 
-gift = module
-
 # Layer: apps
 # Module: gitosis
 #
@@ -732,20 +684,6 @@ mplayer = module
 # 
 openoffice = module
 
-# Layer: apps
-# Module: podsleuth
-#
-# Podsleuth is a tool to get information about an Apple (TM) iPod (TM).
-# 
-podsleuth = module
-
-# Layer: apps
-# Module: ptchown
-#
-# helper function for grantpt(3), changes ownship and permissions of pseudotty.
-# 
-ptchown = module
-
 # Layer: apps
 # Module: pulseaudio
 #
@@ -767,13 +705,6 @@ qemu = module
 # 
 rssh = module
 
-# Layer: apps
-# Module: sambagui
-#
-# system-config-samba dbus service.
-# 
-sambagui = module
-
 # Layer: apps
 # Module: screen
 #
@@ -900,13 +831,6 @@ wm = module
 # 
 xscreensaver = module
 
-# Layer: apps
-# Module: yam
-#
-# Yum/Apt Mirroring.
-# 
-yam = module
-
 # Layer: contrib
 # Module: android
 #
@@ -1113,7 +1037,7 @@ dbadm = module
 # Layer: roles
 # Module: guest
 #
-# Least privledge terminal user role.
+# Least privilege terminal user role.
 # 
 guest = module
 
@@ -1162,7 +1086,7 @@ webadm = module
 # Layer: roles
 # Module: xguest
 #
-# Least privledge xwindows user role.
+# Least privilege xwindows user role.
 # 
 xguest = module
 
@@ -1229,6 +1153,13 @@ apache = module
 # 
 apcupsd = module
 
+# Layer: services
+# Module: aptcacher
+#
+# apt-cacher, cache for Debian APT repositories.
+# 
+aptcacher = module
+
 # Layer: services
 # Module: arpwatch
 #
@@ -1327,6 +1258,13 @@ canna = module
 # 
 ccs = module
 
+# Layer: services
+# Module: certbot
+#
+# SSL certificate requesting tool certbot AKA letsencrypt.
+# 
+certbot = module
+
 # Layer: services
 # Module: certmaster
 #
@@ -1432,13 +1370,6 @@ comsat = module
 # 
 condor = module
 
-# Layer: services
-# Module: consolekit
-#
-# Framework for facilitating multiple user sessions on desktops.
-# 
-consolekit = module
-
 # Layer: services
 # Module: consolesetup
 #
@@ -1614,13 +1545,6 @@ dkim = module
 # 
 dnsmasq = module
 
-# Layer: services
-# Module: dnssectrigger
-#
-# Enables DNSSEC protection for DNS traffic.
-# 
-dnssectrigger = module
-
 # Layer: services
 # Module: dovecot
 #
@@ -1782,13 +1706,6 @@ gssproxy = module
 # 
 hadoop = module
 
-# Layer: services
-# Module: hal
-#
-# Hardware abstraction layer.
-# 
-hal = module
-
 # Layer: services
 # Module: hddtemp
 #
@@ -1915,13 +1832,6 @@ kerberos = module
 # 
 kerneloops = module
 
-# Layer: services
-# Module: keyboardd
-#
-# Xorg.conf keyboard layout callout.
-# 
-keyboardd = module
-
 # Layer: services
 # Module: keystone
 #
@@ -2027,6 +1937,13 @@ mediawiki = module
 # 
 memcached = module
 
+# Layer: services
+# Module: memlockd
+#
+# memory lock daemon, keeps important files in RAM.
+# 
+memlockd = module
+
 # Layer: services
 # Module: milter
 #
@@ -2552,13 +2469,6 @@ rgmanager = module
 # 
 rhcs = module
 
-# Layer: services
-# Module: rhgb
-#
-# Red Hat Graphical Boot.
-# 
-rhgb = module
-
 # Layer: services
 # Module: rhsmcertd
 #
@@ -2587,13 +2497,6 @@ rlogin = module
 # 
 rngd = module
 
-# Layer: services
-# Module: roundup
-#
-# Roundup Issue Tracking System.
-# 
-roundup = module
-
 # Layer: services
 # Module: rpc
 #
@@ -2681,7 +2584,7 @@ setroubleshoot = module
 # Layer: services
 # Module: shibboleth
 #
-# Shibboleth authentication deamon
+# Shibboleth authentication daemon
 # 
 shibboleth = module
 
@@ -2748,13 +2651,6 @@ soundserver = module
 # 
 spamassassin = module
 
-# Layer: services
-# Module: speedtouch
-#
-# Alcatel speedtouch USB ADSL modem
-# 
-speedtouch = module
-
 # Layer: services
 # Module: squid
 #
@@ -2965,13 +2861,6 @@ virt = module
 # 
 vnstatd = module
 
-# Layer: services
-# Module: w3c
-#
-# W3C Markup Validator.
-# 
-w3c = module
-
 # Layer: services
 # Module: watchdog
 #
@@ -3000,13 +2889,6 @@ wireguard = module
 # 
 xfs = module
 
-# Layer: services
-# Module: xprint
-#
-# A X11-based print system and API.
-# 
-xprint = module
-
 # Layer: services
 # Module: xserver
 #
@@ -3091,14 +2973,6 @@ getty = module
 # 
 hostname = module
 
-# Layer: system
-# Module: hotplug
-#
-# Policy for hotplug system, for supporting the
-# connection and disconnection of devices at runtime.
-# 
-hotplug = module
-
 # Layer: system
 # Module: init
 #
@@ -3183,13 +3057,6 @@ mount = module
 # 
 netlabel = module
 
-# Layer: system
-# Module: pcmcia
-#
-# PCMCIA card management services.
-# 
-pcmcia = module
-
 # Layer: system
 # Module: raid
 #

diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
index 368ad3b7..086f0fe8 100644
--- a/policy/modules/kernel/corenetwork.if
+++ b/policy/modules/kernel/corenetwork.if
@@ -29333,427 +29333,6 @@ interface(`corenet_relabelto_gds_db_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_giftd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Bind TCP sockets to the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_tcp_bind_giftd_port',`
-	gen_require(`
-		type giftd_port_t;
-	')
-
-	allow $1 giftd_port_t:tcp_socket name_bind;
-	
-')
-
-########################################
-## <summary>
-##	Bind UDP sockets to the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_udp_bind_giftd_port',`
-	gen_require(`
-		type giftd_port_t;
-	')
-
-	allow $1 giftd_port_t:udp_socket name_bind;
-	
-')
-
-########################################
-## <summary>
-##	Make a TCP connection to the giftd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-#
-interface(`corenet_tcp_connect_giftd_port',`
-	gen_require(`
-		type giftd_port_t;
-	')
-
-	allow $1 giftd_port_t:tcp_socket name_connect;
-')
-
-
-########################################
-## <summary>
-##	Send giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_send_giftd_client_packets',`
-	gen_require(`
-		type giftd_client_packet_t;
-	')
-
-	allow $1 giftd_client_packet_t:packet send;
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_send_giftd_client_packets',`
-	gen_require(`
-		type giftd_client_packet_t;
-	')
-
-	dontaudit $1 giftd_client_packet_t:packet send;
-')
-
-########################################
-## <summary>
-##	Receive giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_receive_giftd_client_packets',`
-	gen_require(`
-		type giftd_client_packet_t;
-	')
-
-	allow $1 giftd_client_packet_t:packet recv;
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_receive_giftd_client_packets',`
-	gen_require(`
-		type giftd_client_packet_t;
-	')
-
-	dontaudit $1 giftd_client_packet_t:packet recv;
-')
-
-########################################
-## <summary>
-##	Send and receive giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_sendrecv_giftd_client_packets',`
-	corenet_send_giftd_client_packets($1)
-	corenet_receive_giftd_client_packets($1)
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive giftd_client packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_sendrecv_giftd_client_packets',`
-	corenet_dontaudit_send_giftd_client_packets($1)
-	corenet_dontaudit_receive_giftd_client_packets($1)
-')
-
-########################################
-## <summary>
-##	Relabel packets to giftd_client the packet type.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-#
-interface(`corenet_relabelto_giftd_client_packets',`
-	gen_require(`
-		type giftd_client_packet_t;
-	')
-
-	allow $1 giftd_client_packet_t:packet relabelto;
-')
-
-
-########################################
-## <summary>
-##	Send giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_send_giftd_server_packets',`
-	gen_require(`
-		type giftd_server_packet_t;
-	')
-
-	allow $1 giftd_server_packet_t:packet send;
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_send_giftd_server_packets',`
-	gen_require(`
-		type giftd_server_packet_t;
-	')
-
-	dontaudit $1 giftd_server_packet_t:packet send;
-')
-
-########################################
-## <summary>
-##	Receive giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_receive_giftd_server_packets',`
-	gen_require(`
-		type giftd_server_packet_t;
-	')
-
-	allow $1 giftd_server_packet_t:packet recv;
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_receive_giftd_server_packets',`
-	gen_require(`
-		type giftd_server_packet_t;
-	')
-
-	dontaudit $1 giftd_server_packet_t:packet recv;
-')
-
-########################################
-## <summary>
-##	Send and receive giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_sendrecv_giftd_server_packets',`
-	corenet_send_giftd_server_packets($1)
-	corenet_receive_giftd_server_packets($1)
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive giftd_server packets.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_sendrecv_giftd_server_packets',`
-	corenet_dontaudit_send_giftd_server_packets($1)
-	corenet_dontaudit_receive_giftd_server_packets($1)
-')
-
-########################################
-## <summary>
-##	Relabel packets to giftd_server the packet type.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-#
-interface(`corenet_relabelto_giftd_server_packets',`
-	gen_require(`
-		type giftd_server_packet_t;
-	')
-
-	allow $1 giftd_server_packet_t:packet relabelto;
-')
-
-
-
-
 ########################################
 ## <summary>
 ##	Send and receive TCP traffic on the git port.

diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
index 030df0c0..1d0367c8 100644
--- a/policy/modules/kernel/corenetwork.te
+++ b/policy/modules/kernel/corenetwork.te
@@ -2,7 +2,7 @@
 # This is a generated file!  Instead of modifying this file, the
 # corenetwork.te.in or corenetwork.te.m4 file should be modified.
 #
-policy_module(corenetwork, 1.28.0)
+policy_module(corenetwork, 1.28.1)
 
 ########################################
 #
@@ -584,13 +584,6 @@ portcon tcp 3050 gen_context(system_u:object_r:gds_db_port_t,s0)
 portcon udp 3050 gen_context(system_u:object_r:gds_db_port_t,s0)
 
 
-type giftd_port_t, port_type, defined_port_type;
-type giftd_client_packet_t, packet_type, client_packet_type;
-type giftd_server_packet_t, packet_type, server_packet_type;
-typeattribute giftd_port_t unreserved_port_type;
-portcon tcp 1213 gen_context(system_u:object_r:giftd_port_t,s0)
-
-
 type git_port_t, port_type, defined_port_type;
 type git_client_packet_t, packet_type, client_packet_type;
 type git_server_packet_t, packet_type, server_packet_type;


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/
@ 2022-09-03 19:54 Jason Zaman
  0 siblings, 0 replies; 3+ messages in thread
From: Jason Zaman @ 2022-09-03 19:54 UTC (permalink / raw
  To: gentoo-commits

commit:     7cd9bdfa316e15e20ac537746de9e17b1c740faa
Author:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
AuthorDate: Sat Sep  3 19:25:21 2022 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Sep  3 19:25:21 2022 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=7cd9bdfa

Update generated policy and doc files

Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 doc/policy.xml                       | 15408 +++++++++++++++++----------------
 policy/booleans.conf                 |    44 +
 policy/modules.conf                  |    21 +
 policy/modules/kernel/corenetwork.if |    18 +
 policy/modules/kernel/corenetwork.te |     1 +
 5 files changed, 8226 insertions(+), 7266 deletions(-)

diff --git a/doc/policy.xml b/doc/policy.xml
index 35687d71..6dd4831a 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -940,6 +940,70 @@ Role allowed access.
 </param>
 </interface>
 </module>
+<module name="cloudinit" filename="policy/modules/admin/cloudinit.if">
+<summary>Init scripts for cloud VMs</summary>
+<interface name="cloudinit_create_runtime_dirs" lineno="13">
+<summary>
+Create cloud-init runtime directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_write_runtime_files" lineno="32">
+<summary>
+Write cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_create_runtime_files" lineno="51">
+<summary>
+Create cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_filetrans_runtime" lineno="81">
+<summary>
+Create files in /run with the type used for
+cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The class of the object to be created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_getattr_state_files" lineno="99">
+<summary>
+Get the attribute of cloud-init state files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
 <module name="consoletype" filename="policy/modules/admin/consoletype.if">
 <summary>
 Determine of the console connected to the controlling terminal.
@@ -954,7 +1018,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="consoletype_run" lineno="44">
+<interface name="consoletype_run" lineno="42">
 <summary>
 Execute consoletype in the consoletype domain, and
 allow the specified role the consoletype domain.
@@ -970,7 +1034,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="consoletype_exec" lineno="64">
+<interface name="consoletype_exec" lineno="62">
 <summary>
 Execute consoletype in the caller domain.
 </summary>
@@ -2482,7 +2546,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="prelink_exec" lineno="37">
+<interface name="prelink_exec" lineno="35">
 <summary>
 Execute prelink in the caller domain.
 </summary>
@@ -2492,7 +2556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_run" lineno="64">
+<interface name="prelink_run" lineno="62">
 <summary>
 Execute prelink in the prelink
 domain, and allow the specified role
@@ -2510,7 +2574,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="prelink_object_file" lineno="83">
+<interface name="prelink_object_file" lineno="81">
 <summary>
 Make the specified file type prelinkable.
 </summary>
@@ -2520,7 +2584,7 @@ File type to be prelinked.
 </summary>
 </param>
 </interface>
-<interface name="prelink_read_cache" lineno="101">
+<interface name="prelink_read_cache" lineno="99">
 <summary>
 Read prelink cache files.
 </summary>
@@ -2530,7 +2594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_delete_cache" lineno="120">
+<interface name="prelink_delete_cache" lineno="118">
 <summary>
 Delete prelink cache files.
 </summary>
@@ -2540,7 +2604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_manage_log" lineno="140">
+<interface name="prelink_manage_log" lineno="138">
 <summary>
 Create, read, write, and delete
 prelink log files.
@@ -2551,7 +2615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_manage_lib" lineno="160">
+<interface name="prelink_manage_lib" lineno="158">
 <summary>
 Create, read, write, and delete
 prelink var_lib files.
@@ -2562,7 +2626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_relabelfrom_lib" lineno="179">
+<interface name="prelink_relabelfrom_lib" lineno="177">
 <summary>
 Relabel from prelink lib files.
 </summary>
@@ -2572,7 +2636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="prelink_relabel_lib" lineno="198">
+<interface name="prelink_relabel_lib" lineno="196">
 <summary>
 Relabel prelink lib files.
 </summary>
@@ -3753,7 +3817,7 @@ Role allowed access
 </summary>
 </param>
 </template>
-<interface name="sudo_sigchld" lineno="215">
+<interface name="sudo_sigchld" lineno="220">
 <summary>
 Send a SIGCHLD signal to the sudo domain.
 </summary>
@@ -4068,7 +4132,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_run_chfn" lineno="42">
+<interface name="usermanage_run_chfn" lineno="40">
 <summary>
 Execute chfn in the chfn domain, and
 allow the specified role the chfn domain.
@@ -4084,7 +4148,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_domtrans_groupadd" lineno="61">
+<interface name="usermanage_domtrans_groupadd" lineno="59">
 <summary>
 Execute groupadd in the groupadd domain.
 </summary>
@@ -4094,7 +4158,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_run_groupadd" lineno="91">
+<interface name="usermanage_run_groupadd" lineno="87">
 <summary>
 Execute groupadd in the groupadd domain, and
 allow the specified role the groupadd domain.
@@ -4111,7 +4175,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="usermanage_domtrans_passwd" lineno="110">
+<interface name="usermanage_domtrans_passwd" lineno="106">
 <summary>
 Execute passwd in the passwd domain.
 </summary>
@@ -4121,7 +4185,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_kill_passwd" lineno="133">
+<interface name="usermanage_kill_passwd" lineno="127">
 <summary>
 Send sigkills to passwd.
 </summary>
@@ -4131,7 +4195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_check_exec_passwd" lineno="151">
+<interface name="usermanage_check_exec_passwd" lineno="145">
 <summary>
 Check if the passwd binary is executable.
 </summary>
@@ -4141,7 +4205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_run_passwd" lineno="175">
+<interface name="usermanage_run_passwd" lineno="169">
 <summary>
 Execute passwd in the passwd domain, and
 allow the specified role the passwd domain.
@@ -4157,7 +4221,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_domtrans_admin_passwd" lineno="195">
+<interface name="usermanage_domtrans_admin_passwd" lineno="189">
 <summary>
 Execute password admin functions in
 the admin passwd domain.
@@ -4168,7 +4232,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_run_admin_passwd" lineno="222">
+<interface name="usermanage_run_admin_passwd" lineno="216">
 <summary>
 Execute passwd admin functions in the admin
 passwd domain, and allow the specified role
@@ -4186,7 +4250,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="usermanage_dontaudit_use_useradd_fds" lineno="241">
+<interface name="usermanage_dontaudit_use_useradd_fds" lineno="235">
 <summary>
 Do not audit attempts to use useradd fds.
 </summary>
@@ -4196,7 +4260,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_domtrans_useradd" lineno="259">
+<interface name="usermanage_domtrans_useradd" lineno="253">
 <summary>
 Execute useradd in the useradd domain.
 </summary>
@@ -4206,7 +4270,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_check_exec_useradd" lineno="282">
+<interface name="usermanage_check_exec_useradd" lineno="274">
 <summary>
 Check if the useradd binaries are executable.
 </summary>
@@ -4216,7 +4280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="usermanage_run_useradd" lineno="307">
+<interface name="usermanage_run_useradd" lineno="299">
 <summary>
 Execute useradd in the useradd domain, and
 allow the specified role the useradd domain.
@@ -4233,7 +4297,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="usermanage_read_crack_db" lineno="326">
+<interface name="usermanage_read_crack_db" lineno="318">
 <summary>
 Read the crack database.
 </summary>
@@ -7667,7 +7731,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seunshare_role" lineno="69">
+<interface name="seunshare_role" lineno="67">
 <summary>
 Role access for seunshare
 </summary>
@@ -9868,7 +9932,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_getattr_bin_files" lineno="155">
+<interface name="corecmd_watch_bin_dirs" lineno="155">
+<summary>
+Watch bin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_getattr_bin_files" lineno="173">
 <summary>
 Get the attributes of files in bin directories.
 </summary>
@@ -9878,7 +9952,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_dontaudit_getattr_bin_files" lineno="174">
+<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192">
 <summary>
 Do not audit attempts to get the attributes of files in bin directories.
 </summary>
@@ -9888,7 +9962,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_check_exec_bin_files" lineno="193">
+<interface name="corecmd_check_exec_bin_files" lineno="211">
 <summary>
 Check if files in bin directories are executable (DAC-wise)
 </summary>
@@ -9898,7 +9972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_files" lineno="212">
+<interface name="corecmd_read_bin_files" lineno="230">
 <summary>
 Read files in bin directories.
 </summary>
@@ -9908,7 +9982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_dontaudit_write_bin_files" lineno="231">
+<interface name="corecmd_dontaudit_write_bin_files" lineno="249">
 <summary>
 Do not audit attempts to write bin files.
 </summary>
@@ -9918,7 +9992,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_pipes" lineno="249">
+<interface name="corecmd_read_bin_pipes" lineno="267">
 <summary>
 Read pipes in bin directories.
 </summary>
@@ -9928,7 +10002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_sockets" lineno="268">
+<interface name="corecmd_read_bin_sockets" lineno="286">
 <summary>
 Read named sockets in bin directories.
 </summary>
@@ -9938,7 +10012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_bin" lineno="308">
+<interface name="corecmd_exec_bin" lineno="326">
 <summary>
 Execute generic programs in bin directories,
 in the caller domain.
@@ -9969,7 +10043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_bin_files" lineno="327">
+<interface name="corecmd_manage_bin_files" lineno="345">
 <summary>
 Create, read, write, and delete bin files.
 </summary>
@@ -9979,7 +10053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_bin_symlinks" lineno="346">
+<interface name="corecmd_manage_bin_symlinks" lineno="364">
 <summary>
 Manage symlinks for bin files.
 </summary>
@@ -9989,7 +10063,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_files" lineno="365">
+<interface name="corecmd_relabel_bin_files" lineno="383">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -9999,7 +10073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_mmap_bin_files" lineno="384">
+<interface name="corecmd_mmap_bin_files" lineno="402">
 <summary>
 Mmap a bin file as executable.
 </summary>
@@ -10009,7 +10083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="429">
+<interface name="corecmd_bin_spec_domtrans" lineno="447">
 <summary>
 Execute a file in a bin directory
 in the specified domain but do not
@@ -10045,7 +10119,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_domtrans" lineno="472">
+<interface name="corecmd_bin_domtrans" lineno="490">
 <summary>
 Execute a file in a bin directory
 in the specified domain.
@@ -10079,7 +10153,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_check_exec_shell" lineno="491">
+<interface name="corecmd_check_exec_shell" lineno="509">
 <summary>
 Check if a shell is executable (DAC-wise).
 </summary>
@@ -10089,7 +10163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_shell" lineno="528">
+<interface name="corecmd_exec_shell" lineno="546">
 <summary>
 Execute shells in the caller domain.
 </summary>
@@ -10117,7 +10191,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="566">
+<interface name="corecmd_shell_spec_domtrans" lineno="584">
 <summary>
 Execute a shell in the target domain.  This
 is an explicit transition, requiring the
@@ -10146,7 +10220,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_domtrans" lineno="600">
+<interface name="corecmd_shell_domtrans" lineno="618">
 <summary>
 Execute a shell in the specified domain.
 </summary>
@@ -10171,7 +10245,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_chroot" lineno="619">
+<interface name="corecmd_exec_chroot" lineno="637">
 <summary>
 Execute chroot in the caller domain.
 </summary>
@@ -10181,7 +10255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_getattr_all_executables" lineno="640">
+<interface name="corecmd_getattr_all_executables" lineno="658">
 <summary>
 Get the attributes of all executable files.
 </summary>
@@ -10192,7 +10266,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_read_all_executables" lineno="661">
+<interface name="corecmd_read_all_executables" lineno="679">
 <summary>
 Read all executable files.
 </summary>
@@ -10203,7 +10277,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_exec_all_executables" lineno="681">
+<interface name="corecmd_exec_all_executables" lineno="699">
 <summary>
 Execute all executable files.
 </summary>
@@ -10214,7 +10288,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="702">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="720">
 <summary>
 Do not audit attempts to execute all executables.
 </summary>
@@ -10224,7 +10298,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_all_executables" lineno="721">
+<interface name="corecmd_manage_all_executables" lineno="739">
 <summary>
 Create, read, write, and all executable files.
 </summary>
@@ -10235,7 +10309,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_relabel_all_executables" lineno="743">
+<interface name="corecmd_relabel_all_executables" lineno="761">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10246,7 +10320,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_mmap_all_executables" lineno="763">
+<interface name="corecmd_mmap_all_executables" lineno="781">
 <summary>
 Mmap all executables as executable.
 </summary>
@@ -10256,7 +10330,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="785">
+<interface name="corecmd_relabel_bin_dirs" lineno="803">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10266,7 +10340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="803">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="821">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10893,7 +10967,17 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="1"/>
 </interface>
-<interface name="corenet_udp_bind_generic_node" lineno="942">
+<interface name="corenet_dontaudit_tcp_bind_generic_node" lineno="927">
+<summary>
+Do not audit denials on binding TCP sockets to generic nodes.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="corenet_udp_bind_generic_node" lineno="960">
 <summary>
 Bind UDP sockets to generic nodes.
 </summary>
@@ -10918,7 +11002,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="1"/>
 </interface>
-<interface name="corenet_raw_bind_generic_node" lineno="961">
+<interface name="corenet_raw_bind_generic_node" lineno="979">
 <summary>
 Bind raw sockets to generic nodes.
 </summary>
@@ -10928,7 +11012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_out_generic_node" lineno="980">
+<interface name="corenet_out_generic_node" lineno="998">
 <summary>
 Allow outgoing network traffic to generic nodes.
 </summary>
@@ -10939,7 +11023,7 @@ The peer label of the outgoing network traffic.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_in_generic_node" lineno="999">
+<interface name="corenet_in_generic_node" lineno="1017">
 <summary>
 Allow incoming network traffic from generic nodes.
 </summary>
@@ -10950,7 +11034,7 @@ The peer label of the incoming network traffic.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_inout_generic_node" lineno="1018">
+<interface name="corenet_inout_generic_node" lineno="1036">
 <summary>
 Allow incoming and outgoing network traffic with generic nodes.
 </summary>
@@ -10961,7 +11045,7 @@ The peer label of the network traffic.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1033">
+<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1051">
 <summary>
 Send and receive TCP network traffic on all nodes.
 </summary>
@@ -10971,7 +11055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_send_all_nodes" lineno="1051">
+<interface name="corenet_udp_send_all_nodes" lineno="1069">
 <summary>
 Send UDP network traffic on all nodes.
 </summary>
@@ -10981,7 +11065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1070">
+<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1088">
 <summary>
 Do not audit attempts to send UDP network
 traffic on any nodes.
@@ -10992,7 +11076,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1088">
+<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1106">
 <summary>
 Send and receive SCTP network traffic on all nodes.
 </summary>
@@ -11002,7 +11086,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_receive_all_nodes" lineno="1106">
+<interface name="corenet_udp_receive_all_nodes" lineno="1124">
 <summary>
 Receive UDP network traffic on all nodes.
 </summary>
@@ -11012,7 +11096,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1125">
+<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1143">
 <summary>
 Do not audit attempts to receive UDP
 network traffic on all nodes.
@@ -11023,7 +11107,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_sendrecv_all_nodes" lineno="1143">
+<interface name="corenet_udp_sendrecv_all_nodes" lineno="1161">
 <summary>
 Send and receive UDP network traffic on all nodes.
 </summary>
@@ -11033,7 +11117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1159">
+<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1177">
 <summary>
 Do not audit attempts to send and receive UDP
 network traffic on any nodes nodes.
@@ -11044,7 +11128,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_send_all_nodes" lineno="1174">
+<interface name="corenet_raw_send_all_nodes" lineno="1192">
 <summary>
 Send raw IP packets on all nodes.
 </summary>
@@ -11054,7 +11138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_receive_all_nodes" lineno="1192">
+<interface name="corenet_raw_receive_all_nodes" lineno="1210">
 <summary>
 Receive raw IP packets on all nodes.
 </summary>
@@ -11064,7 +11148,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_sendrecv_all_nodes" lineno="1210">
+<interface name="corenet_raw_sendrecv_all_nodes" lineno="1228">
 <summary>
 Send and receive raw IP packets on all nodes.
 </summary>
@@ -11074,7 +11158,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_all_nodes" lineno="1225">
+<interface name="corenet_tcp_bind_all_nodes" lineno="1243">
 <summary>
 Bind TCP sockets to all nodes.
 </summary>
@@ -11084,7 +11168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_all_nodes" lineno="1243">
+<interface name="corenet_udp_bind_all_nodes" lineno="1261">
 <summary>
 Bind UDP sockets to all nodes.
 </summary>
@@ -11094,7 +11178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_bind_all_nodes" lineno="1262">
+<interface name="corenet_raw_bind_all_nodes" lineno="1280">
 <summary>
 Bind raw sockets to all nodes.
 </summary>
@@ -11104,7 +11188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_generic_port" lineno="1280">
+<interface name="corenet_tcp_sendrecv_generic_port" lineno="1298">
 <summary>
 Send and receive TCP network traffic on generic ports.
 </summary>
@@ -11114,7 +11198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_all_nodes" lineno="1294">
+<interface name="corenet_sctp_bind_all_nodes" lineno="1312">
 <summary>
 Bind SCTP sockets to all nodes.
 </summary>
@@ -11124,7 +11208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313">
+<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1331">
 <summary>
 Do not audit send and receive TCP network traffic on generic ports.
 </summary>
@@ -11134,7 +11218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_send_generic_port" lineno="1327">
+<interface name="corenet_udp_send_generic_port" lineno="1345">
 <summary>
 Send UDP network traffic on generic ports.
 </summary>
@@ -11144,7 +11228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_receive_generic_port" lineno="1341">
+<interface name="corenet_udp_receive_generic_port" lineno="1359">
 <summary>
 Receive UDP network traffic on generic ports.
 </summary>
@@ -11154,7 +11238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_sendrecv_generic_port" lineno="1355">
+<interface name="corenet_udp_sendrecv_generic_port" lineno="1373">
 <summary>
 Send and receive UDP network traffic on generic ports.
 </summary>
@@ -11164,7 +11248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_generic_port" lineno="1369">
+<interface name="corenet_tcp_bind_generic_port" lineno="1387">
 <summary>
 Bind TCP sockets to generic ports.
 </summary>
@@ -11174,7 +11258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389">
+<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1407">
 <summary>
 Do not audit bind TCP sockets to generic ports.
 </summary>
@@ -11184,7 +11268,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_generic_port" lineno="1407">
+<interface name="corenet_udp_bind_generic_port" lineno="1425">
 <summary>
 Bind UDP sockets to generic ports.
 </summary>
@@ -11194,7 +11278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_generic_port" lineno="1427">
+<interface name="corenet_tcp_connect_generic_port" lineno="1445">
 <summary>
 Connect TCP sockets to generic ports.
 </summary>
@@ -11204,7 +11288,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471">
+<interface name="corenet_tcp_sendrecv_all_ports" lineno="1489">
 <summary>
 Send and receive TCP network traffic on all ports.
 </summary>
@@ -11240,7 +11324,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_all_ports" lineno="1485">
+<interface name="corenet_udp_send_all_ports" lineno="1503">
 <summary>
 Send UDP network traffic on all ports.
 </summary>
@@ -11250,7 +11334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_generic_port" lineno="1499">
+<interface name="corenet_sctp_bind_generic_port" lineno="1517">
 <summary>
 Bind SCTP sockets to generic ports.
 </summary>
@@ -11260,7 +11344,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_receive_all_ports" lineno="1519">
+<interface name="corenet_udp_receive_all_ports" lineno="1537">
 <summary>
 Receive UDP network traffic on all ports.
 </summary>
@@ -11270,7 +11354,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_sendrecv_all_ports" lineno="1557">
+<interface name="corenet_udp_sendrecv_all_ports" lineno="1575">
 <summary>
 Send and receive UDP network traffic on all ports.
 </summary>
@@ -11304,7 +11388,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572">
+<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1590">
 <summary>
 Do not audit attempts to bind SCTP
 sockets to generic ports.
@@ -11315,7 +11399,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_all_ports" lineno="1590">
+<interface name="corenet_tcp_bind_all_ports" lineno="1608">
 <summary>
 Bind TCP sockets to all ports.
 </summary>
@@ -11325,7 +11409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609">
+<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1627">
 <summary>
 Do not audit attepts to bind TCP sockets to any ports.
 </summary>
@@ -11335,7 +11419,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_all_ports" lineno="1627">
+<interface name="corenet_udp_bind_all_ports" lineno="1645">
 <summary>
 Bind UDP sockets to all ports.
 </summary>
@@ -11345,7 +11429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_connect_generic_port" lineno="1646">
+<interface name="corenet_sctp_connect_generic_port" lineno="1664">
 <summary>
 Connect SCTP sockets to generic ports.
 </summary>
@@ -11355,7 +11439,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664">
+<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1682">
 <summary>
 Do not audit attepts to bind UDP sockets to any ports.
 </summary>
@@ -11365,7 +11449,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_all_ports" lineno="1710">
+<interface name="corenet_tcp_connect_all_ports" lineno="1728">
 <summary>
 Connect TCP sockets to all ports.
 </summary>
@@ -11403,7 +11487,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="1"/>
 </interface>
-<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729">
+<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1747">
 <summary>
 Do not audit attempts to connect TCP sockets
 to all ports.
@@ -11414,7 +11498,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747">
+<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1765">
 <summary>
 Send and receive TCP network traffic on generic reserved ports.
 </summary>
@@ -11424,7 +11508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_send_reserved_port" lineno="1761">
+<interface name="corenet_udp_send_reserved_port" lineno="1779">
 <summary>
 Send UDP network traffic on generic reserved ports.
 </summary>
@@ -11434,7 +11518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_receive_reserved_port" lineno="1775">
+<interface name="corenet_udp_receive_reserved_port" lineno="1793">
 <summary>
 Receive UDP network traffic on generic reserved ports.
 </summary>
@@ -11444,7 +11528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789">
+<interface name="corenet_udp_sendrecv_reserved_port" lineno="1807">
 <summary>
 Send and receive UDP network traffic on generic reserved ports.
 </summary>
@@ -11454,7 +11538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_reserved_port" lineno="1803">
+<interface name="corenet_tcp_bind_reserved_port" lineno="1821">
 <summary>
 Bind TCP sockets to generic reserved ports.
 </summary>
@@ -11464,7 +11548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_all_ports" lineno="1822">
+<interface name="corenet_sctp_bind_all_ports" lineno="1840">
 <summary>
 Bind SCTP sockets to all ports.
 </summary>
@@ -11474,7 +11558,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_reserved_port" lineno="1841">
+<interface name="corenet_udp_bind_reserved_port" lineno="1859">
 <summary>
 Bind UDP sockets to generic reserved ports.
 </summary>
@@ -11484,7 +11568,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_reserved_port" lineno="1860">
+<interface name="corenet_tcp_connect_reserved_port" lineno="1878">
 <summary>
 Connect TCP sockets to generic reserved ports.
 </summary>
@@ -11494,7 +11578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878">
+<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1896">
 <summary>
 Do not audit attempts to bind SCTP sockets to any ports.
 </summary>
@@ -11504,7 +11588,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896">
+<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1914">
 <summary>
 Send and receive TCP network traffic on all reserved ports.
 </summary>
@@ -11514,7 +11598,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_send_all_reserved_ports" lineno="1910">
+<interface name="corenet_udp_send_all_reserved_ports" lineno="1928">
 <summary>
 Send UDP network traffic on all reserved ports.
 </summary>
@@ -11524,7 +11608,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924">
+<interface name="corenet_udp_receive_all_reserved_ports" lineno="1942">
 <summary>
 Receive UDP network traffic on all reserved ports.
 </summary>
@@ -11534,7 +11618,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938">
+<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1956">
 <summary>
 Send and receive UDP network traffic on all reserved ports.
 </summary>
@@ -11544,7 +11628,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_connect_all_ports" lineno="1952">
+<interface name="corenet_sctp_connect_all_ports" lineno="1970">
 <summary>
 Connect SCTP sockets to all ports.
 </summary>
@@ -11554,7 +11638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970">
+<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1988">
 <summary>
 Bind TCP sockets to all reserved ports.
 </summary>
@@ -11564,7 +11648,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989">
+<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2007">
 <summary>
 Do not audit attempts to bind TCP sockets to all reserved ports.
 </summary>
@@ -11574,7 +11658,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007">
+<interface name="corenet_udp_bind_all_reserved_ports" lineno="2025">
 <summary>
 Bind UDP sockets to all reserved ports.
 </summary>
@@ -11584,7 +11668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026">
+<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2044">
 <summary>
 Do not audit attempts to bind UDP sockets to all reserved ports.
 </summary>
@@ -11594,7 +11678,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045">
+<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2063">
 <summary>
 Do not audit attempts to connect SCTP sockets
 to all ports.
@@ -11605,7 +11689,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063">
+<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2081">
 <summary>
 Bind TCP sockets to all ports > 1024.
 </summary>
@@ -11615,7 +11699,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081">
+<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2099">
 <summary>
 Bind UDP sockets to all ports > 1024.
 </summary>
@@ -11625,7 +11709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099">
+<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2117">
 <summary>
 Connect TCP sockets to reserved ports.
 </summary>
@@ -11635,7 +11719,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117">
+<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2135">
 <summary>
 Connect SCTP sockets to all ports > 1024.
 </summary>
@@ -11645,7 +11729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136">
+<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2154">
 <summary>
 Do not audit connect attempts to TCP sockets on
 ports greater than 1024.
@@ -11656,7 +11740,7 @@ Domain not to audit access to.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154">
+<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2172">
 <summary>
 Connect TCP sockets to all ports > 1024.
 </summary>
@@ -11666,7 +11750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173">
+<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2191">
 <summary>
 Do not audit attempts to connect TCP sockets
 all reserved ports.
@@ -11677,7 +11761,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191">
+<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2209">
 <summary>
 Connect TCP sockets to rpc ports.
 </summary>
@@ -11687,7 +11771,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210">
+<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2228">
 <summary>
 Do not audit attempts to connect TCP sockets
 all rpc ports.
@@ -11698,7 +11782,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_reserved_port" lineno="2228">
+<interface name="corenet_sctp_bind_reserved_port" lineno="2246">
 <summary>
 Bind SCTP sockets to generic reserved ports.
 </summary>
@@ -11708,7 +11792,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_read_tun_tap_dev" lineno="2247">
+<interface name="corenet_read_tun_tap_dev" lineno="2265">
 <summary>
 Read the TUN/TAP virtual network device.
 </summary>
@@ -11718,7 +11802,7 @@ The domain read allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_write_tun_tap_dev" lineno="2266">
+<interface name="corenet_write_tun_tap_dev" lineno="2284">
 <summary>
 Write the TUN/TAP virtual network device.
 </summary>
@@ -11728,7 +11812,7 @@ The domain allowed write access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_rw_tun_tap_dev" lineno="2285">
+<interface name="corenet_rw_tun_tap_dev" lineno="2303">
 <summary>
 Read and write the TUN/TAP virtual network device.
 </summary>
@@ -11738,7 +11822,7 @@ The domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_connect_reserved_port" lineno="2304">
+<interface name="corenet_sctp_connect_reserved_port" lineno="2322">
 <summary>
 Connect SCTP sockets to generic reserved ports.
 </summary>
@@ -11748,7 +11832,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323">
+<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2341">
 <summary>
 Do not audit attempts to read or write the TUN/TAP
 virtual network device.
@@ -11759,7 +11843,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_getattr_ppp_dev" lineno="2341">
+<interface name="corenet_getattr_ppp_dev" lineno="2359">
 <summary>
 Getattr the point-to-point device.
 </summary>
@@ -11769,7 +11853,7 @@ The domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_rw_ppp_dev" lineno="2359">
+<interface name="corenet_rw_ppp_dev" lineno="2377">
 <summary>
 Read and write the point-to-point device.
 </summary>
@@ -11779,7 +11863,7 @@ The domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378">
+<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2396">
 <summary>
 Bind TCP sockets to all RPC ports.
 </summary>
@@ -11789,7 +11873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397">
+<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2415">
 <summary>
 Do not audit attempts to bind TCP sockets to all RPC ports.
 </summary>
@@ -11799,7 +11883,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415">
+<interface name="corenet_udp_bind_all_rpc_ports" lineno="2433">
 <summary>
 Bind UDP sockets to all RPC ports.
 </summary>
@@ -11809,7 +11893,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434">
+<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2452">
 <summary>
 Do not audit attempts to bind UDP sockets to all RPC ports.
 </summary>
@@ -11819,7 +11903,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452">
+<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2470">
 <summary>
 Bind SCTP sockets to all reserved ports.
 </summary>
@@ -11829,7 +11913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471">
+<interface name="corenet_tcp_recvfrom_netlabel" lineno="2489">
 <summary>
 Receive TCP packets from a NetLabel connection.
 </summary>
@@ -11839,7 +11923,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490">
+<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2508">
 <summary>
 Receive TCP packets from an unlabled connection.
 </summary>
@@ -11849,7 +11933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510">
+<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2528">
 <summary>
 Do not audit attempts to bind SCTP sockets to all reserved ports.
 </summary>
@@ -11859,7 +11943,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529">
+<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2547">
 <summary>
 Do not audit attempts to receive TCP packets from a NetLabel
 connection.
@@ -11870,7 +11954,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549">
+<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2567">
 <summary>
 Do not audit attempts to receive TCP packets from an unlabeled
 connection.
@@ -11881,7 +11965,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_recvfrom_netlabel" lineno="2569">
+<interface name="corenet_udp_recvfrom_netlabel" lineno="2587">
 <summary>
 Receive UDP packets from a NetLabel connection.
 </summary>
@@ -11891,7 +11975,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588">
+<interface name="corenet_udp_recvfrom_unlabeled" lineno="2606">
 <summary>
 Receive UDP packets from an unlabeled connection.
 </summary>
@@ -11901,7 +11985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608">
+<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2626">
 <summary>
 Bind SCTP sockets to all ports > 1024.
 </summary>
@@ -11911,7 +11995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627">
+<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2645">
 <summary>
 Do not audit attempts to receive UDP packets from a NetLabel
 connection.
@@ -11922,7 +12006,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647">
+<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2665">
 <summary>
 Do not audit attempts to receive UDP packets from an unlabeled
 connection.
@@ -11933,7 +12017,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_recvfrom_netlabel" lineno="2667">
+<interface name="corenet_raw_recvfrom_netlabel" lineno="2685">
 <summary>
 Receive Raw IP packets from a NetLabel connection.
 </summary>
@@ -11943,7 +12027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686">
+<interface name="corenet_raw_recvfrom_unlabeled" lineno="2704">
 <summary>
 Receive Raw IP packets from an unlabeled connection.
 </summary>
@@ -11953,7 +12037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707">
+<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2725">
 <summary>
 Do not audit attempts to receive Raw IP packets from a NetLabel
 connection.
@@ -11964,7 +12048,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726">
+<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2744">
 <summary>
 Connect SCTP sockets to reserved ports.
 </summary>
@@ -11974,7 +12058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745">
+<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2763">
 <summary>
 Do not audit attempts to receive Raw IP packets from an unlabeled
 connection.
@@ -11985,7 +12069,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_all_recvfrom_unlabeled" lineno="2777">
+<interface name="corenet_all_recvfrom_unlabeled" lineno="2795">
 <summary>
 Receive packets from an unlabeled connection.
 </summary>
@@ -12007,7 +12091,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_all_recvfrom_netlabel" lineno="2810">
+<interface name="corenet_all_recvfrom_netlabel" lineno="2828">
 <summary>
 Receive packets from a NetLabel connection.
 </summary>
@@ -12028,7 +12112,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829">
+<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2847">
 <summary>
 Do not audit attempts to receive packets from an unlabeled connection.
 </summary>
@@ -12038,7 +12122,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852">
+<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2870">
 <summary>
 Do not audit attempts to connect SCTP sockets
 all reserved ports.
@@ -12049,7 +12133,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871">
+<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2889">
 <summary>
 Do not audit attempts to receive packets from a NetLabel
 connection.
@@ -12060,7 +12144,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_recvfrom_labeled" lineno="2903">
+<interface name="corenet_tcp_recvfrom_labeled" lineno="2921">
 <summary>
 Rules for receiving labeled TCP packets.
 </summary>
@@ -12083,7 +12167,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_udp_recvfrom_labeled" lineno="2931">
+<interface name="corenet_udp_recvfrom_labeled" lineno="2949">
 <summary>
 Rules for receiving labeled UDP packets.
 </summary>
@@ -12098,7 +12182,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_raw_recvfrom_labeled" lineno="2956">
+<interface name="corenet_raw_recvfrom_labeled" lineno="2974">
 <summary>
 Rules for receiving labeled raw IP packets.
 </summary>
@@ -12113,7 +12197,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_all_recvfrom_labeled" lineno="2990">
+<interface name="corenet_all_recvfrom_labeled" lineno="3008">
 <summary>
 Rules for receiving labeled packets via TCP, UDP and raw IP.
 </summary>
@@ -12137,7 +12221,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_setcontext_all_spds" lineno="3008">
+<interface name="corenet_setcontext_all_spds" lineno="3026">
 <summary>
 Allow specified type to set the context of
 a SPD entry for labeled ipsec associations.
@@ -12148,7 +12232,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_generic_client_packets" lineno="3026">
+<interface name="corenet_send_generic_client_packets" lineno="3044">
 <summary>
 Send generic client packets.
 </summary>
@@ -12158,7 +12242,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_generic_client_packets" lineno="3044">
+<interface name="corenet_receive_generic_client_packets" lineno="3062">
 <summary>
 Receive generic client packets.
 </summary>
@@ -12168,7 +12252,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_generic_client_packets" lineno="3062">
+<interface name="corenet_sendrecv_generic_client_packets" lineno="3080">
 <summary>
 Send and receive generic client packets.
 </summary>
@@ -12178,7 +12262,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_generic_client_packets" lineno="3077">
+<interface name="corenet_relabelto_generic_client_packets" lineno="3095">
 <summary>
 Relabel packets to the generic client packet type.
 </summary>
@@ -12188,7 +12272,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_generic_server_packets" lineno="3095">
+<interface name="corenet_send_generic_server_packets" lineno="3113">
 <summary>
 Send generic server packets.
 </summary>
@@ -12198,7 +12282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_generic_server_packets" lineno="3113">
+<interface name="corenet_receive_generic_server_packets" lineno="3131">
 <summary>
 Receive generic server packets.
 </summary>
@@ -12208,7 +12292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_generic_server_packets" lineno="3131">
+<interface name="corenet_sendrecv_generic_server_packets" lineno="3149">
 <summary>
 Send and receive generic server packets.
 </summary>
@@ -12218,7 +12302,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_generic_server_packets" lineno="3146">
+<interface name="corenet_relabelto_generic_server_packets" lineno="3164">
 <summary>
 Relabel packets to the generic server packet type.
 </summary>
@@ -12228,7 +12312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171">
+<interface name="corenet_sendrecv_unlabeled_packets" lineno="3189">
 <summary>
 Send and receive unlabeled packets.
 </summary>
@@ -12245,7 +12329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_all_client_packets" lineno="3185">
+<interface name="corenet_send_all_client_packets" lineno="3203">
 <summary>
 Send all client packets.
 </summary>
@@ -12255,7 +12339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_all_client_packets" lineno="3203">
+<interface name="corenet_receive_all_client_packets" lineno="3221">
 <summary>
 Receive all client packets.
 </summary>
@@ -12265,7 +12349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_all_client_packets" lineno="3221">
+<interface name="corenet_sendrecv_all_client_packets" lineno="3239">
 <summary>
 Send and receive all client packets.
 </summary>
@@ -12275,7 +12359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_all_client_packets" lineno="3236">
+<interface name="corenet_relabelto_all_client_packets" lineno="3254">
 <summary>
 Relabel packets to any client packet type.
 </summary>
@@ -12285,7 +12369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_all_server_packets" lineno="3254">
+<interface name="corenet_send_all_server_packets" lineno="3272">
 <summary>
 Send all server packets.
 </summary>
@@ -12295,7 +12379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272">
+<interface name="corenet_sctp_recvfrom_netlabel" lineno="3290">
 <summary>
 Receive SCTP packets from a NetLabel connection.
 </summary>
@@ -12305,7 +12389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_all_server_packets" lineno="3290">
+<interface name="corenet_receive_all_server_packets" lineno="3308">
 <summary>
 Receive all server packets.
 </summary>
@@ -12315,7 +12399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_all_server_packets" lineno="3308">
+<interface name="corenet_sendrecv_all_server_packets" lineno="3326">
 <summary>
 Send and receive all server packets.
 </summary>
@@ -12325,7 +12409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_all_server_packets" lineno="3323">
+<interface name="corenet_relabelto_all_server_packets" lineno="3341">
 <summary>
 Relabel packets to any server packet type.
 </summary>
@@ -12335,7 +12419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341">
+<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3359">
 <summary>
 Receive SCTP packets from an unlabled connection.
 </summary>
@@ -12345,7 +12429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_all_packets" lineno="3356">
+<interface name="corenet_send_all_packets" lineno="3374">
 <summary>
 Send all packets.
 </summary>
@@ -12355,7 +12439,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_receive_all_packets" lineno="3374">
+<interface name="corenet_receive_all_packets" lineno="3392">
 <summary>
 Receive all packets.
 </summary>
@@ -12365,7 +12449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sendrecv_all_packets" lineno="3392">
+<interface name="corenet_sendrecv_all_packets" lineno="3410">
 <summary>
 Send and receive all packets.
 </summary>
@@ -12375,7 +12459,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_relabelto_all_packets" lineno="3407">
+<interface name="corenet_relabelto_all_packets" lineno="3425">
 <summary>
 Relabel packets to any packet type.
 </summary>
@@ -12385,7 +12469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
+<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3443">
 <summary>
 Access unlabeled infiniband pkeys.
 </summary>
@@ -12395,7 +12479,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_access_all_pkeys" lineno="3439">
+<interface name="corenet_ib_access_all_pkeys" lineno="3457">
 <summary>
 Access all labeled infiniband pkeys.
 </summary>
@@ -12405,7 +12489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
+<interface name="corenet_ib_manage_subnet_all_endports" lineno="3475">
 <summary>
 Manage subnets on all labeled Infiniband endports
 </summary>
@@ -12415,7 +12499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
+<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3493">
 <summary>
 Manage subnet on all unlabeled Infiniband endports
 </summary>
@@ -12425,7 +12509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
+<interface name="corenet_sctp_recvfrom_labeled" lineno="3512">
 <summary>
 Rules for receiving labeled SCTP packets.
 </summary>
@@ -12440,7 +12524,7 @@ Peer domain.
 </summary>
 </param>
 </interface>
-<interface name="corenet_unconfined" lineno="3517">
+<interface name="corenet_unconfined" lineno="3535">
 <summary>
 Unconfined access to network objects.
 </summary>
@@ -12450,7 +12534,7 @@ The domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_icmp_packets" lineno="3537">
+<interface name="corenet_send_icmp_packets" lineno="3555">
 <summary>
 Send icmp packets.
 </summary>
@@ -12461,7 +12545,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
+<interface name="corenet_dontaudit_send_icmp_packets" lineno="3574">
 <summary>
 Do not audit attempts to send icmp packets.
 </summary>
@@ -12472,7 +12556,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_icmp_packets" lineno="3575">
+<interface name="corenet_receive_icmp_packets" lineno="3593">
 <summary>
 Receive icmp packets.
 </summary>
@@ -12483,7 +12567,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
+<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3612">
 <summary>
 Do not audit attempts to receive icmp packets.
 </summary>
@@ -12494,7 +12578,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
+<interface name="corenet_sendrecv_icmp_packets" lineno="3631">
 <summary>
 Send and receive icmp packets.
 </summary>
@@ -12505,7 +12589,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
+<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3647">
 <summary>
 Do not audit attempts to send and receive icmp packets.
 </summary>
@@ -12516,7 +12600,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_icmp_packets" lineno="3644">
+<interface name="corenet_relabelto_icmp_packets" lineno="3662">
 <summary>
 Relabel packets to icmp the packet type.
 </summary>
@@ -12526,7 +12610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
+<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684">
 <summary>
 Send and receive TCP traffic on the adb port.
 </summary>
@@ -12537,7 +12621,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_adb_port" lineno="3681">
+<interface name="corenet_udp_send_adb_port" lineno="3699">
 <summary>
 Send UDP traffic on the adb port.
 </summary>
@@ -12548,7 +12632,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
+<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714">
 <summary>
 Do not audit attempts to send UDP traffic on the adb port.
 </summary>
@@ -12559,7 +12643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3711">
+<interface name="corenet_udp_receive_adb_port" lineno="3729">
 <summary>
 Receive UDP traffic on the adb port.
 </summary>
@@ -12570,7 +12654,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
+<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744">
 <summary>
 Do not audit attempts to receive UDP traffic on the adb port.
 </summary>
@@ -12581,7 +12665,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
+<interface name="corenet_udp_sendrecv_adb_port" lineno="3759">
 <summary>
 Send and receive UDP traffic on the adb port.
 </summary>
@@ -12592,7 +12676,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
+<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the adb port.
@@ -12604,7 +12688,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3772">
+<interface name="corenet_tcp_bind_adb_port" lineno="3790">
 <summary>
 Bind TCP sockets to the adb port.
 </summary>
@@ -12615,7 +12699,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3792">
+<interface name="corenet_udp_bind_adb_port" lineno="3810">
 <summary>
 Bind UDP sockets to the adb port.
 </summary>
@@ -12626,7 +12710,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3811">
+<interface name="corenet_tcp_connect_adb_port" lineno="3829">
 <summary>
 Make a TCP connection to the adb port.
 </summary>
@@ -12636,7 +12720,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_client_packets" lineno="3831">
+<interface name="corenet_send_adb_client_packets" lineno="3849">
 <summary>
 Send adb_client packets.
 </summary>
@@ -12647,7 +12731,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868">
 <summary>
 Do not audit attempts to send adb_client packets.
 </summary>
@@ -12658,7 +12742,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3869">
+<interface name="corenet_receive_adb_client_packets" lineno="3887">
 <summary>
 Receive adb_client packets.
 </summary>
@@ -12669,7 +12753,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906">
 <summary>
 Do not audit attempts to receive adb_client packets.
 </summary>
@@ -12680,7 +12764,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3925">
 <summary>
 Send and receive adb_client packets.
 </summary>
@@ -12691,7 +12775,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941">
 <summary>
 Do not audit attempts to send and receive adb_client packets.
 </summary>
@@ -12702,7 +12786,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3956">
 <summary>
 Relabel packets to adb_client the packet type.
 </summary>
@@ -12712,7 +12796,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_server_packets" lineno="3958">
+<interface name="corenet_send_adb_server_packets" lineno="3976">
 <summary>
 Send adb_server packets.
 </summary>
@@ -12723,7 +12807,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995">
 <summary>
 Do not audit attempts to send adb_server packets.
 </summary>
@@ -12734,7 +12818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_server_packets" lineno="3996">
+<interface name="corenet_receive_adb_server_packets" lineno="4014">
 <summary>
 Receive adb_server packets.
 </summary>
@@ -12745,7 +12829,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033">
 <summary>
 Do not audit attempts to receive adb_server packets.
 </summary>
@@ -12756,7 +12840,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="4052">
 <summary>
 Send and receive adb_server packets.
 </summary>
@@ -12767,7 +12851,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068">
 <summary>
 Do not audit attempts to send and receive adb_server packets.
 </summary>
@@ -12778,7 +12862,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
+<interface name="corenet_relabelto_adb_server_packets" lineno="4083">
 <summary>
 Relabel packets to adb_server the packet type.
 </summary>
@@ -12788,7 +12872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
+<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105">
 <summary>
 Send and receive TCP traffic on the afs_bos port.
 </summary>
@@ -12799,7 +12883,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
+<interface name="corenet_udp_send_afs_bos_port" lineno="4120">
 <summary>
 Send UDP traffic on the afs_bos port.
 </summary>
@@ -12810,7 +12894,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
+<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_bos port.
 </summary>
@@ -12821,7 +12905,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
+<interface name="corenet_udp_receive_afs_bos_port" lineno="4150">
 <summary>
 Receive UDP traffic on the afs_bos port.
 </summary>
@@ -12832,7 +12916,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
+<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_bos port.
 </summary>
@@ -12843,7 +12927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
+<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180">
 <summary>
 Send and receive UDP traffic on the afs_bos port.
 </summary>
@@ -12854,7 +12938,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_bos port.
@@ -12866,7 +12950,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211">
 <summary>
 Bind TCP sockets to the afs_bos port.
 </summary>
@@ -12877,7 +12961,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4231">
 <summary>
 Bind UDP sockets to the afs_bos port.
 </summary>
@@ -12888,7 +12972,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250">
 <summary>
 Make a TCP connection to the afs_bos port.
 </summary>
@@ -12898,7 +12982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4270">
 <summary>
 Send afs_bos_client packets.
 </summary>
@@ -12909,7 +12993,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289">
 <summary>
 Do not audit attempts to send afs_bos_client packets.
 </summary>
@@ -12920,7 +13004,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4308">
 <summary>
 Receive afs_bos_client packets.
 </summary>
@@ -12931,7 +13015,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327">
 <summary>
 Do not audit attempts to receive afs_bos_client packets.
 </summary>
@@ -12942,7 +13026,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346">
 <summary>
 Send and receive afs_bos_client packets.
 </summary>
@@ -12953,7 +13037,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362">
 <summary>
 Do not audit attempts to send and receive afs_bos_client packets.
 </summary>
@@ -12964,7 +13048,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377">
 <summary>
 Relabel packets to afs_bos_client the packet type.
 </summary>
@@ -12974,7 +13058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4397">
 <summary>
 Send afs_bos_server packets.
 </summary>
@@ -12985,7 +13069,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416">
 <summary>
 Do not audit attempts to send afs_bos_server packets.
 </summary>
@@ -12996,7 +13080,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4435">
 <summary>
 Receive afs_bos_server packets.
 </summary>
@@ -13007,7 +13091,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454">
 <summary>
 Do not audit attempts to receive afs_bos_server packets.
 </summary>
@@ -13018,7 +13102,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473">
 <summary>
 Send and receive afs_bos_server packets.
 </summary>
@@ -13029,7 +13113,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489">
 <summary>
 Do not audit attempts to send and receive afs_bos_server packets.
 </summary>
@@ -13040,7 +13124,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504">
 <summary>
 Relabel packets to afs_bos_server the packet type.
 </summary>
@@ -13050,7 +13134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
+<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526">
 <summary>
 Send and receive TCP traffic on the afs_fs port.
 </summary>
@@ -13061,7 +13145,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
+<interface name="corenet_udp_send_afs_fs_port" lineno="4541">
 <summary>
 Send UDP traffic on the afs_fs port.
 </summary>
@@ -13072,7 +13156,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
+<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_fs port.
 </summary>
@@ -13083,7 +13167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
+<interface name="corenet_udp_receive_afs_fs_port" lineno="4571">
 <summary>
 Receive UDP traffic on the afs_fs port.
 </summary>
@@ -13094,7 +13178,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
+<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_fs port.
 </summary>
@@ -13105,7 +13189,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
+<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601">
 <summary>
 Send and receive UDP traffic on the afs_fs port.
 </summary>
@@ -13116,7 +13200,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_fs port.
@@ -13128,7 +13212,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632">
 <summary>
 Bind TCP sockets to the afs_fs port.
 </summary>
@@ -13139,7 +13223,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4652">
 <summary>
 Bind UDP sockets to the afs_fs port.
 </summary>
@@ -13150,7 +13234,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671">
 <summary>
 Make a TCP connection to the afs_fs port.
 </summary>
@@ -13160,7 +13244,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4691">
 <summary>
 Send afs_fs_client packets.
 </summary>
@@ -13171,7 +13255,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710">
 <summary>
 Do not audit attempts to send afs_fs_client packets.
 </summary>
@@ -13182,7 +13266,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4729">
 <summary>
 Receive afs_fs_client packets.
 </summary>
@@ -13193,7 +13277,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748">
 <summary>
 Do not audit attempts to receive afs_fs_client packets.
 </summary>
@@ -13204,7 +13288,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767">
 <summary>
 Send and receive afs_fs_client packets.
 </summary>
@@ -13215,7 +13299,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783">
 <summary>
 Do not audit attempts to send and receive afs_fs_client packets.
 </summary>
@@ -13226,7 +13310,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798">
 <summary>
 Relabel packets to afs_fs_client the packet type.
 </summary>
@@ -13236,7 +13320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4818">
 <summary>
 Send afs_fs_server packets.
 </summary>
@@ -13247,7 +13331,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837">
 <summary>
 Do not audit attempts to send afs_fs_server packets.
 </summary>
@@ -13258,7 +13342,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4856">
 <summary>
 Receive afs_fs_server packets.
 </summary>
@@ -13269,7 +13353,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875">
 <summary>
 Do not audit attempts to receive afs_fs_server packets.
 </summary>
@@ -13280,7 +13364,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894">
 <summary>
 Send and receive afs_fs_server packets.
 </summary>
@@ -13291,7 +13375,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910">
 <summary>
 Do not audit attempts to send and receive afs_fs_server packets.
 </summary>
@@ -13302,7 +13386,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925">
 <summary>
 Relabel packets to afs_fs_server the packet type.
 </summary>
@@ -13312,7 +13396,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
+<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947">
 <summary>
 Send and receive TCP traffic on the afs_ka port.
 </summary>
@@ -13323,7 +13407,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
+<interface name="corenet_udp_send_afs_ka_port" lineno="4962">
 <summary>
 Send UDP traffic on the afs_ka port.
 </summary>
@@ -13334,7 +13418,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
+<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_ka port.
 </summary>
@@ -13345,7 +13429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
+<interface name="corenet_udp_receive_afs_ka_port" lineno="4992">
 <summary>
 Receive UDP traffic on the afs_ka port.
 </summary>
@@ -13356,7 +13440,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
+<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_ka port.
 </summary>
@@ -13367,7 +13451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
+<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022">
 <summary>
 Send and receive UDP traffic on the afs_ka port.
 </summary>
@@ -13378,7 +13462,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_ka port.
@@ -13390,7 +13474,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053">
 <summary>
 Bind TCP sockets to the afs_ka port.
 </summary>
@@ -13401,7 +13485,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="5073">
 <summary>
 Bind UDP sockets to the afs_ka port.
 </summary>
@@ -13412,7 +13496,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092">
 <summary>
 Make a TCP connection to the afs_ka port.
 </summary>
@@ -13422,7 +13506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
+<interface name="corenet_send_afs_ka_client_packets" lineno="5112">
 <summary>
 Send afs_ka_client packets.
 </summary>
@@ -13433,7 +13517,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131">
 <summary>
 Do not audit attempts to send afs_ka_client packets.
 </summary>
@@ -13444,7 +13528,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="5150">
 <summary>
 Receive afs_ka_client packets.
 </summary>
@@ -13455,7 +13539,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169">
 <summary>
 Do not audit attempts to receive afs_ka_client packets.
 </summary>
@@ -13466,7 +13550,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188">
 <summary>
 Send and receive afs_ka_client packets.
 </summary>
@@ -13477,7 +13561,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204">
 <summary>
 Do not audit attempts to send and receive afs_ka_client packets.
 </summary>
@@ -13488,7 +13572,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219">
 <summary>
 Relabel packets to afs_ka_client the packet type.
 </summary>
@@ -13498,7 +13582,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
+<interface name="corenet_send_afs_ka_server_packets" lineno="5239">
 <summary>
 Send afs_ka_server packets.
 </summary>
@@ -13509,7 +13593,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258">
 <summary>
 Do not audit attempts to send afs_ka_server packets.
 </summary>
@@ -13520,7 +13604,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="5277">
 <summary>
 Receive afs_ka_server packets.
 </summary>
@@ -13531,7 +13615,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296">
 <summary>
 Do not audit attempts to receive afs_ka_server packets.
 </summary>
@@ -13542,7 +13626,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315">
 <summary>
 Send and receive afs_ka_server packets.
 </summary>
@@ -13553,7 +13637,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331">
 <summary>
 Do not audit attempts to send and receive afs_ka_server packets.
 </summary>
@@ -13564,7 +13648,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346">
 <summary>
 Relabel packets to afs_ka_server the packet type.
 </summary>
@@ -13574,7 +13658,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
+<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368">
 <summary>
 Send and receive TCP traffic on the afs_pt port.
 </summary>
@@ -13585,7 +13669,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
+<interface name="corenet_udp_send_afs_pt_port" lineno="5383">
 <summary>
 Send UDP traffic on the afs_pt port.
 </summary>
@@ -13596,7 +13680,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
+<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_pt port.
 </summary>
@@ -13607,7 +13691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
+<interface name="corenet_udp_receive_afs_pt_port" lineno="5413">
 <summary>
 Receive UDP traffic on the afs_pt port.
 </summary>
@@ -13618,7 +13702,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
+<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_pt port.
 </summary>
@@ -13629,7 +13713,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
+<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443">
 <summary>
 Send and receive UDP traffic on the afs_pt port.
 </summary>
@@ -13640,7 +13724,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_pt port.
@@ -13652,7 +13736,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474">
 <summary>
 Bind TCP sockets to the afs_pt port.
 </summary>
@@ -13663,7 +13747,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="5494">
 <summary>
 Bind UDP sockets to the afs_pt port.
 </summary>
@@ -13674,7 +13758,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513">
 <summary>
 Make a TCP connection to the afs_pt port.
 </summary>
@@ -13684,7 +13768,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5533">
 <summary>
 Send afs_pt_client packets.
 </summary>
@@ -13695,7 +13779,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552">
 <summary>
 Do not audit attempts to send afs_pt_client packets.
 </summary>
@@ -13706,7 +13790,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5571">
 <summary>
 Receive afs_pt_client packets.
 </summary>
@@ -13717,7 +13801,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590">
 <summary>
 Do not audit attempts to receive afs_pt_client packets.
 </summary>
@@ -13728,7 +13812,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609">
 <summary>
 Send and receive afs_pt_client packets.
 </summary>
@@ -13739,7 +13823,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625">
 <summary>
 Do not audit attempts to send and receive afs_pt_client packets.
 </summary>
@@ -13750,7 +13834,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640">
 <summary>
 Relabel packets to afs_pt_client the packet type.
 </summary>
@@ -13760,7 +13844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5660">
 <summary>
 Send afs_pt_server packets.
 </summary>
@@ -13771,7 +13855,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679">
 <summary>
 Do not audit attempts to send afs_pt_server packets.
 </summary>
@@ -13782,7 +13866,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5698">
 <summary>
 Receive afs_pt_server packets.
 </summary>
@@ -13793,7 +13877,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717">
 <summary>
 Do not audit attempts to receive afs_pt_server packets.
 </summary>
@@ -13804,7 +13888,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736">
 <summary>
 Send and receive afs_pt_server packets.
 </summary>
@@ -13815,7 +13899,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752">
 <summary>
 Do not audit attempts to send and receive afs_pt_server packets.
 </summary>
@@ -13826,7 +13910,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767">
 <summary>
 Relabel packets to afs_pt_server the packet type.
 </summary>
@@ -13836,7 +13920,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
+<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789">
 <summary>
 Send and receive TCP traffic on the afs_vl port.
 </summary>
@@ -13847,7 +13931,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
+<interface name="corenet_udp_send_afs_vl_port" lineno="5804">
 <summary>
 Send UDP traffic on the afs_vl port.
 </summary>
@@ -13858,7 +13942,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
+<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819">
 <summary>
 Do not audit attempts to send UDP traffic on the afs_vl port.
 </summary>
@@ -13869,7 +13953,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
+<interface name="corenet_udp_receive_afs_vl_port" lineno="5834">
 <summary>
 Receive UDP traffic on the afs_vl port.
 </summary>
@@ -13880,7 +13964,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
+<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs_vl port.
 </summary>
@@ -13891,7 +13975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
+<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864">
 <summary>
 Send and receive UDP traffic on the afs_vl port.
 </summary>
@@ -13902,7 +13986,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs_vl port.
@@ -13914,7 +13998,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895">
 <summary>
 Bind TCP sockets to the afs_vl port.
 </summary>
@@ -13925,7 +14009,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5915">
 <summary>
 Bind UDP sockets to the afs_vl port.
 </summary>
@@ -13936,7 +14020,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934">
 <summary>
 Make a TCP connection to the afs_vl port.
 </summary>
@@ -13946,7 +14030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5954">
 <summary>
 Send afs_vl_client packets.
 </summary>
@@ -13957,7 +14041,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973">
 <summary>
 Do not audit attempts to send afs_vl_client packets.
 </summary>
@@ -13968,7 +14052,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5992">
 <summary>
 Receive afs_vl_client packets.
 </summary>
@@ -13979,7 +14063,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011">
 <summary>
 Do not audit attempts to receive afs_vl_client packets.
 </summary>
@@ -13990,7 +14074,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030">
 <summary>
 Send and receive afs_vl_client packets.
 </summary>
@@ -14001,7 +14085,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046">
 <summary>
 Do not audit attempts to send and receive afs_vl_client packets.
 </summary>
@@ -14012,7 +14096,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061">
 <summary>
 Relabel packets to afs_vl_client the packet type.
 </summary>
@@ -14022,7 +14106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
+<interface name="corenet_send_afs_vl_server_packets" lineno="6081">
 <summary>
 Send afs_vl_server packets.
 </summary>
@@ -14033,7 +14117,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100">
 <summary>
 Do not audit attempts to send afs_vl_server packets.
 </summary>
@@ -14044,7 +14128,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="6119">
 <summary>
 Receive afs_vl_server packets.
 </summary>
@@ -14055,7 +14139,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138">
 <summary>
 Do not audit attempts to receive afs_vl_server packets.
 </summary>
@@ -14066,7 +14150,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157">
 <summary>
 Send and receive afs_vl_server packets.
 </summary>
@@ -14077,7 +14161,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173">
 <summary>
 Do not audit attempts to send and receive afs_vl_server packets.
 </summary>
@@ -14088,7 +14172,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188">
 <summary>
 Relabel packets to afs_vl_server the packet type.
 </summary>
@@ -14098,7 +14182,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
+<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210">
 <summary>
 Send and receive TCP traffic on the afs3_callback port.
 </summary>
@@ -14109,7 +14193,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
+<interface name="corenet_udp_send_afs3_callback_port" lineno="6225">
 <summary>
 Send UDP traffic on the afs3_callback port.
 </summary>
@@ -14120,7 +14204,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
+<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240">
 <summary>
 Do not audit attempts to send UDP traffic on the afs3_callback port.
 </summary>
@@ -14131,7 +14215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
+<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255">
 <summary>
 Receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14142,7 +14226,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
+<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270">
 <summary>
 Do not audit attempts to receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14153,7 +14237,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
+<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285">
 <summary>
 Send and receive UDP traffic on the afs3_callback port.
 </summary>
@@ -14164,7 +14248,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
+<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the afs3_callback port.
@@ -14176,7 +14260,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316">
 <summary>
 Bind TCP sockets to the afs3_callback port.
 </summary>
@@ -14187,7 +14271,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336">
 <summary>
 Bind UDP sockets to the afs3_callback port.
 </summary>
@@ -14198,7 +14282,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355">
 <summary>
 Make a TCP connection to the afs3_callback port.
 </summary>
@@ -14208,7 +14292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="6375">
 <summary>
 Send afs3_callback_client packets.
 </summary>
@@ -14219,7 +14303,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394">
 <summary>
 Do not audit attempts to send afs3_callback_client packets.
 </summary>
@@ -14230,7 +14314,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413">
 <summary>
 Receive afs3_callback_client packets.
 </summary>
@@ -14241,7 +14325,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432">
 <summary>
 Do not audit attempts to receive afs3_callback_client packets.
 </summary>
@@ -14252,7 +14336,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451">
 <summary>
 Send and receive afs3_callback_client packets.
 </summary>
@@ -14263,7 +14347,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467">
 <summary>
 Do not audit attempts to send and receive afs3_callback_client packets.
 </summary>
@@ -14274,7 +14358,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482">
 <summary>
 Relabel packets to afs3_callback_client the packet type.
 </summary>
@@ -14284,7 +14368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="6502">
 <summary>
 Send afs3_callback_server packets.
 </summary>
@@ -14295,7 +14379,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521">
 <summary>
 Do not audit attempts to send afs3_callback_server packets.
 </summary>
@@ -14306,7 +14390,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540">
 <summary>
 Receive afs3_callback_server packets.
 </summary>
@@ -14317,7 +14401,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559">
 <summary>
 Do not audit attempts to receive afs3_callback_server packets.
 </summary>
@@ -14328,7 +14412,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578">
 <summary>
 Send and receive afs3_callback_server packets.
 </summary>
@@ -14339,7 +14423,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594">
 <summary>
 Do not audit attempts to send and receive afs3_callback_server packets.
 </summary>
@@ -14350,7 +14434,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609">
 <summary>
 Relabel packets to afs3_callback_server the packet type.
 </summary>
@@ -14360,7 +14444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
+<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631">
 <summary>
 Send and receive TCP traffic on the agentx port.
 </summary>
@@ -14371,7 +14455,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6628">
+<interface name="corenet_udp_send_agentx_port" lineno="6646">
 <summary>
 Send UDP traffic on the agentx port.
 </summary>
@@ -14382,7 +14466,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
+<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661">
 <summary>
 Do not audit attempts to send UDP traffic on the agentx port.
 </summary>
@@ -14393,7 +14477,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6658">
+<interface name="corenet_udp_receive_agentx_port" lineno="6676">
 <summary>
 Receive UDP traffic on the agentx port.
 </summary>
@@ -14404,7 +14488,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
+<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691">
 <summary>
 Do not audit attempts to receive UDP traffic on the agentx port.
 </summary>
@@ -14415,7 +14499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
+<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706">
 <summary>
 Send and receive UDP traffic on the agentx port.
 </summary>
@@ -14426,7 +14510,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
+<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the agentx port.
@@ -14438,7 +14522,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
+<interface name="corenet_tcp_bind_agentx_port" lineno="6737">
 <summary>
 Bind TCP sockets to the agentx port.
 </summary>
@@ -14449,7 +14533,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6739">
+<interface name="corenet_udp_bind_agentx_port" lineno="6757">
 <summary>
 Bind UDP sockets to the agentx port.
 </summary>
@@ -14460,7 +14544,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
+<interface name="corenet_tcp_connect_agentx_port" lineno="6776">
 <summary>
 Make a TCP connection to the agentx port.
 </summary>
@@ -14470,7 +14554,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6778">
+<interface name="corenet_send_agentx_client_packets" lineno="6796">
 <summary>
 Send agentx_client packets.
 </summary>
@@ -14481,7 +14565,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815">
 <summary>
 Do not audit attempts to send agentx_client packets.
 </summary>
@@ -14492,7 +14576,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6816">
+<interface name="corenet_receive_agentx_client_packets" lineno="6834">
 <summary>
 Receive agentx_client packets.
 </summary>
@@ -14503,7 +14587,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853">
 <summary>
 Do not audit attempts to receive agentx_client packets.
 </summary>
@@ -14514,7 +14598,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872">
 <summary>
 Send and receive agentx_client packets.
 </summary>
@@ -14525,7 +14609,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888">
 <summary>
 Do not audit attempts to send and receive agentx_client packets.
 </summary>
@@ -14536,7 +14620,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6903">
 <summary>
 Relabel packets to agentx_client the packet type.
 </summary>
@@ -14546,7 +14630,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6905">
+<interface name="corenet_send_agentx_server_packets" lineno="6923">
 <summary>
 Send agentx_server packets.
 </summary>
@@ -14557,7 +14641,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942">
 <summary>
 Do not audit attempts to send agentx_server packets.
 </summary>
@@ -14568,7 +14652,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6943">
+<interface name="corenet_receive_agentx_server_packets" lineno="6961">
 <summary>
 Receive agentx_server packets.
 </summary>
@@ -14579,7 +14663,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980">
 <summary>
 Do not audit attempts to receive agentx_server packets.
 </summary>
@@ -14590,7 +14674,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999">
 <summary>
 Send and receive agentx_server packets.
 </summary>
@@ -14601,7 +14685,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015">
 <summary>
 Do not audit attempts to send and receive agentx_server packets.
 </summary>
@@ -14612,7 +14696,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="7030">
 <summary>
 Relabel packets to agentx_server the packet type.
 </summary>
@@ -14622,7 +14706,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
+<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052">
 <summary>
 Send and receive TCP traffic on the amanda port.
 </summary>
@@ -14633,7 +14717,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amanda_port" lineno="7049">
+<interface name="corenet_udp_send_amanda_port" lineno="7067">
 <summary>
 Send UDP traffic on the amanda port.
 </summary>
@@ -14644,7 +14728,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
+<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082">
 <summary>
 Do not audit attempts to send UDP traffic on the amanda port.
 </summary>
@@ -14655,7 +14739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="7079">
+<interface name="corenet_udp_receive_amanda_port" lineno="7097">
 <summary>
 Receive UDP traffic on the amanda port.
 </summary>
@@ -14666,7 +14750,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
+<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112">
 <summary>
 Do not audit attempts to receive UDP traffic on the amanda port.
 </summary>
@@ -14677,7 +14761,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
+<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127">
 <summary>
 Send and receive UDP traffic on the amanda port.
 </summary>
@@ -14688,7 +14772,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
+<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amanda port.
@@ -14700,7 +14784,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
+<interface name="corenet_tcp_bind_amanda_port" lineno="7158">
 <summary>
 Bind TCP sockets to the amanda port.
 </summary>
@@ -14711,7 +14795,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7160">
+<interface name="corenet_udp_bind_amanda_port" lineno="7178">
 <summary>
 Bind UDP sockets to the amanda port.
 </summary>
@@ -14722,7 +14806,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
+<interface name="corenet_tcp_connect_amanda_port" lineno="7197">
 <summary>
 Make a TCP connection to the amanda port.
 </summary>
@@ -14732,7 +14816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7199">
+<interface name="corenet_send_amanda_client_packets" lineno="7217">
 <summary>
 Send amanda_client packets.
 </summary>
@@ -14743,7 +14827,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236">
 <summary>
 Do not audit attempts to send amanda_client packets.
 </summary>
@@ -14754,7 +14838,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7237">
+<interface name="corenet_receive_amanda_client_packets" lineno="7255">
 <summary>
 Receive amanda_client packets.
 </summary>
@@ -14765,7 +14849,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274">
 <summary>
 Do not audit attempts to receive amanda_client packets.
 </summary>
@@ -14776,7 +14860,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293">
 <summary>
 Send and receive amanda_client packets.
 </summary>
@@ -14787,7 +14871,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309">
 <summary>
 Do not audit attempts to send and receive amanda_client packets.
 </summary>
@@ -14798,7 +14882,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="7324">
 <summary>
 Relabel packets to amanda_client the packet type.
 </summary>
@@ -14808,7 +14892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7326">
+<interface name="corenet_send_amanda_server_packets" lineno="7344">
 <summary>
 Send amanda_server packets.
 </summary>
@@ -14819,7 +14903,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363">
 <summary>
 Do not audit attempts to send amanda_server packets.
 </summary>
@@ -14830,7 +14914,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7364">
+<interface name="corenet_receive_amanda_server_packets" lineno="7382">
 <summary>
 Receive amanda_server packets.
 </summary>
@@ -14841,7 +14925,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401">
 <summary>
 Do not audit attempts to receive amanda_server packets.
 </summary>
@@ -14852,7 +14936,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420">
 <summary>
 Send and receive amanda_server packets.
 </summary>
@@ -14863,7 +14947,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436">
 <summary>
 Do not audit attempts to send and receive amanda_server packets.
 </summary>
@@ -14874,7 +14958,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="7451">
 <summary>
 Relabel packets to amanda_server the packet type.
 </summary>
@@ -14884,7 +14968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
+<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473">
 <summary>
 Send and receive TCP traffic on the amavisd_recv port.
 </summary>
@@ -14895,7 +14979,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
+<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488">
 <summary>
 Send UDP traffic on the amavisd_recv port.
 </summary>
@@ -14906,7 +14990,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
+<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503">
 <summary>
 Do not audit attempts to send UDP traffic on the amavisd_recv port.
 </summary>
@@ -14917,7 +15001,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
+<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518">
 <summary>
 Receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14928,7 +15012,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
+<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533">
 <summary>
 Do not audit attempts to receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14939,7 +15023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
+<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548">
 <summary>
 Send and receive UDP traffic on the amavisd_recv port.
 </summary>
@@ -14950,7 +15034,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amavisd_recv port.
@@ -14962,7 +15046,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579">
 <summary>
 Bind TCP sockets to the amavisd_recv port.
 </summary>
@@ -14973,7 +15057,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599">
 <summary>
 Bind UDP sockets to the amavisd_recv port.
 </summary>
@@ -14984,7 +15068,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618">
 <summary>
 Make a TCP connection to the amavisd_recv port.
 </summary>
@@ -14994,7 +15078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638">
 <summary>
 Send amavisd_recv_client packets.
 </summary>
@@ -15005,7 +15089,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657">
 <summary>
 Do not audit attempts to send amavisd_recv_client packets.
 </summary>
@@ -15016,7 +15100,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676">
 <summary>
 Receive amavisd_recv_client packets.
 </summary>
@@ -15027,7 +15111,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695">
 <summary>
 Do not audit attempts to receive amavisd_recv_client packets.
 </summary>
@@ -15038,7 +15122,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714">
 <summary>
 Send and receive amavisd_recv_client packets.
 </summary>
@@ -15049,7 +15133,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_client packets.
 </summary>
@@ -15060,7 +15144,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745">
 <summary>
 Relabel packets to amavisd_recv_client the packet type.
 </summary>
@@ -15070,7 +15154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765">
 <summary>
 Send amavisd_recv_server packets.
 </summary>
@@ -15081,7 +15165,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784">
 <summary>
 Do not audit attempts to send amavisd_recv_server packets.
 </summary>
@@ -15092,7 +15176,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803">
 <summary>
 Receive amavisd_recv_server packets.
 </summary>
@@ -15103,7 +15187,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822">
 <summary>
 Do not audit attempts to receive amavisd_recv_server packets.
 </summary>
@@ -15114,7 +15198,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841">
 <summary>
 Send and receive amavisd_recv_server packets.
 </summary>
@@ -15125,7 +15209,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_server packets.
 </summary>
@@ -15136,7 +15220,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872">
 <summary>
 Relabel packets to amavisd_recv_server the packet type.
 </summary>
@@ -15146,7 +15230,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
+<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894">
 <summary>
 Send and receive TCP traffic on the amavisd_send port.
 </summary>
@@ -15157,7 +15241,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
+<interface name="corenet_udp_send_amavisd_send_port" lineno="7909">
 <summary>
 Send UDP traffic on the amavisd_send port.
 </summary>
@@ -15168,7 +15252,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
+<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924">
 <summary>
 Do not audit attempts to send UDP traffic on the amavisd_send port.
 </summary>
@@ -15179,7 +15263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
+<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939">
 <summary>
 Receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15190,7 +15274,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
+<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954">
 <summary>
 Do not audit attempts to receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15201,7 +15285,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
+<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969">
 <summary>
 Send and receive UDP traffic on the amavisd_send port.
 </summary>
@@ -15212,7 +15296,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amavisd_send port.
@@ -15224,7 +15308,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000">
 <summary>
 Bind TCP sockets to the amavisd_send port.
 </summary>
@@ -15235,7 +15319,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020">
 <summary>
 Bind UDP sockets to the amavisd_send port.
 </summary>
@@ -15246,7 +15330,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039">
 <summary>
 Make a TCP connection to the amavisd_send port.
 </summary>
@@ -15256,7 +15340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="8059">
 <summary>
 Send amavisd_send_client packets.
 </summary>
@@ -15267,7 +15351,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078">
 <summary>
 Do not audit attempts to send amavisd_send_client packets.
 </summary>
@@ -15278,7 +15362,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097">
 <summary>
 Receive amavisd_send_client packets.
 </summary>
@@ -15289,7 +15373,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116">
 <summary>
 Do not audit attempts to receive amavisd_send_client packets.
 </summary>
@@ -15300,7 +15384,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135">
 <summary>
 Send and receive amavisd_send_client packets.
 </summary>
@@ -15311,7 +15395,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151">
 <summary>
 Do not audit attempts to send and receive amavisd_send_client packets.
 </summary>
@@ -15322,7 +15406,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166">
 <summary>
 Relabel packets to amavisd_send_client the packet type.
 </summary>
@@ -15332,7 +15416,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="8186">
 <summary>
 Send amavisd_send_server packets.
 </summary>
@@ -15343,7 +15427,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205">
 <summary>
 Do not audit attempts to send amavisd_send_server packets.
 </summary>
@@ -15354,7 +15438,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224">
 <summary>
 Receive amavisd_send_server packets.
 </summary>
@@ -15365,7 +15449,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243">
 <summary>
 Do not audit attempts to receive amavisd_send_server packets.
 </summary>
@@ -15376,7 +15460,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262">
 <summary>
 Send and receive amavisd_send_server packets.
 </summary>
@@ -15387,7 +15471,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278">
 <summary>
 Do not audit attempts to send and receive amavisd_send_server packets.
 </summary>
@@ -15398,7 +15482,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293">
 <summary>
 Relabel packets to amavisd_send_server the packet type.
 </summary>
@@ -15408,7 +15492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
+<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315">
 <summary>
 Send and receive TCP traffic on the amqp port.
 </summary>
@@ -15419,7 +15503,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8312">
+<interface name="corenet_udp_send_amqp_port" lineno="8330">
 <summary>
 Send UDP traffic on the amqp port.
 </summary>
@@ -15430,7 +15514,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
+<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345">
 <summary>
 Do not audit attempts to send UDP traffic on the amqp port.
 </summary>
@@ -15441,7 +15525,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8342">
+<interface name="corenet_udp_receive_amqp_port" lineno="8360">
 <summary>
 Receive UDP traffic on the amqp port.
 </summary>
@@ -15452,7 +15536,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
+<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375">
 <summary>
 Do not audit attempts to receive UDP traffic on the amqp port.
 </summary>
@@ -15463,7 +15547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
+<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390">
 <summary>
 Send and receive UDP traffic on the amqp port.
 </summary>
@@ -15474,7 +15558,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
+<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the amqp port.
@@ -15486,7 +15570,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
+<interface name="corenet_tcp_bind_amqp_port" lineno="8421">
 <summary>
 Bind TCP sockets to the amqp port.
 </summary>
@@ -15497,7 +15581,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8423">
+<interface name="corenet_udp_bind_amqp_port" lineno="8441">
 <summary>
 Bind UDP sockets to the amqp port.
 </summary>
@@ -15508,7 +15592,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
+<interface name="corenet_tcp_connect_amqp_port" lineno="8460">
 <summary>
 Make a TCP connection to the amqp port.
 </summary>
@@ -15518,7 +15602,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8462">
+<interface name="corenet_send_amqp_client_packets" lineno="8480">
 <summary>
 Send amqp_client packets.
 </summary>
@@ -15529,7 +15613,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499">
 <summary>
 Do not audit attempts to send amqp_client packets.
 </summary>
@@ -15540,7 +15624,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8500">
+<interface name="corenet_receive_amqp_client_packets" lineno="8518">
 <summary>
 Receive amqp_client packets.
 </summary>
@@ -15551,7 +15635,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537">
 <summary>
 Do not audit attempts to receive amqp_client packets.
 </summary>
@@ -15562,7 +15646,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556">
 <summary>
 Send and receive amqp_client packets.
 </summary>
@@ -15573,7 +15657,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572">
 <summary>
 Do not audit attempts to send and receive amqp_client packets.
 </summary>
@@ -15584,7 +15668,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="8587">
 <summary>
 Relabel packets to amqp_client the packet type.
 </summary>
@@ -15594,7 +15678,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8589">
+<interface name="corenet_send_amqp_server_packets" lineno="8607">
 <summary>
 Send amqp_server packets.
 </summary>
@@ -15605,7 +15689,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626">
 <summary>
 Do not audit attempts to send amqp_server packets.
 </summary>
@@ -15616,7 +15700,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8627">
+<interface name="corenet_receive_amqp_server_packets" lineno="8645">
 <summary>
 Receive amqp_server packets.
 </summary>
@@ -15627,7 +15711,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664">
 <summary>
 Do not audit attempts to receive amqp_server packets.
 </summary>
@@ -15638,7 +15722,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683">
 <summary>
 Send and receive amqp_server packets.
 </summary>
@@ -15649,7 +15733,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699">
 <summary>
 Do not audit attempts to send and receive amqp_server packets.
 </summary>
@@ -15660,7 +15744,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="8714">
 <summary>
 Relabel packets to amqp_server the packet type.
 </summary>
@@ -15670,7 +15754,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
+<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736">
 <summary>
 Send and receive TCP traffic on the aol port.
 </summary>
@@ -15681,7 +15765,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_aol_port" lineno="8733">
+<interface name="corenet_udp_send_aol_port" lineno="8751">
 <summary>
 Send UDP traffic on the aol port.
 </summary>
@@ -15692,7 +15776,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
+<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766">
 <summary>
 Do not audit attempts to send UDP traffic on the aol port.
 </summary>
@@ -15703,7 +15787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8763">
+<interface name="corenet_udp_receive_aol_port" lineno="8781">
 <summary>
 Receive UDP traffic on the aol port.
 </summary>
@@ -15714,7 +15798,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
+<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796">
 <summary>
 Do not audit attempts to receive UDP traffic on the aol port.
 </summary>
@@ -15725,7 +15809,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
+<interface name="corenet_udp_sendrecv_aol_port" lineno="8811">
 <summary>
 Send and receive UDP traffic on the aol port.
 </summary>
@@ -15736,7 +15820,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
+<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the aol port.
@@ -15748,7 +15832,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8824">
+<interface name="corenet_tcp_bind_aol_port" lineno="8842">
 <summary>
 Bind TCP sockets to the aol port.
 </summary>
@@ -15759,7 +15843,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8844">
+<interface name="corenet_udp_bind_aol_port" lineno="8862">
 <summary>
 Bind UDP sockets to the aol port.
 </summary>
@@ -15770,7 +15854,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8863">
+<interface name="corenet_tcp_connect_aol_port" lineno="8881">
 <summary>
 Make a TCP connection to the aol port.
 </summary>
@@ -15780,7 +15864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_client_packets" lineno="8883">
+<interface name="corenet_send_aol_client_packets" lineno="8901">
 <summary>
 Send aol_client packets.
 </summary>
@@ -15791,7 +15875,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920">
 <summary>
 Do not audit attempts to send aol_client packets.
 </summary>
@@ -15802,7 +15886,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8921">
+<interface name="corenet_receive_aol_client_packets" lineno="8939">
 <summary>
 Receive aol_client packets.
 </summary>
@@ -15813,7 +15897,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958">
 <summary>
 Do not audit attempts to receive aol_client packets.
 </summary>
@@ -15824,7 +15908,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="8977">
 <summary>
 Send and receive aol_client packets.
 </summary>
@@ -15835,7 +15919,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993">
 <summary>
 Do not audit attempts to send and receive aol_client packets.
 </summary>
@@ -15846,7 +15930,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
+<interface name="corenet_relabelto_aol_client_packets" lineno="9008">
 <summary>
 Relabel packets to aol_client the packet type.
 </summary>
@@ -15856,7 +15940,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_server_packets" lineno="9010">
+<interface name="corenet_send_aol_server_packets" lineno="9028">
 <summary>
 Send aol_server packets.
 </summary>
@@ -15867,7 +15951,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047">
 <summary>
 Do not audit attempts to send aol_server packets.
 </summary>
@@ -15878,7 +15962,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_server_packets" lineno="9048">
+<interface name="corenet_receive_aol_server_packets" lineno="9066">
 <summary>
 Receive aol_server packets.
 </summary>
@@ -15889,7 +15973,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085">
 <summary>
 Do not audit attempts to receive aol_server packets.
 </summary>
@@ -15900,7 +15984,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="9104">
 <summary>
 Send and receive aol_server packets.
 </summary>
@@ -15911,7 +15995,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120">
 <summary>
 Do not audit attempts to send and receive aol_server packets.
 </summary>
@@ -15922,7 +16006,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
+<interface name="corenet_relabelto_aol_server_packets" lineno="9135">
 <summary>
 Relabel packets to aol_server the packet type.
 </summary>
@@ -15932,7 +16016,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
+<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157">
 <summary>
 Send and receive TCP traffic on the apcupsd port.
 </summary>
@@ -15943,7 +16027,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
+<interface name="corenet_udp_send_apcupsd_port" lineno="9172">
 <summary>
 Send UDP traffic on the apcupsd port.
 </summary>
@@ -15954,7 +16038,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
+<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187">
 <summary>
 Do not audit attempts to send UDP traffic on the apcupsd port.
 </summary>
@@ -15965,7 +16049,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
+<interface name="corenet_udp_receive_apcupsd_port" lineno="9202">
 <summary>
 Receive UDP traffic on the apcupsd port.
 </summary>
@@ -15976,7 +16060,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
+<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217">
 <summary>
 Do not audit attempts to receive UDP traffic on the apcupsd port.
 </summary>
@@ -15987,7 +16071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
+<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232">
 <summary>
 Send and receive UDP traffic on the apcupsd port.
 </summary>
@@ -15998,7 +16082,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
+<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the apcupsd port.
@@ -16010,7 +16094,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263">
 <summary>
 Bind TCP sockets to the apcupsd port.
 </summary>
@@ -16021,7 +16105,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="9283">
 <summary>
 Bind UDP sockets to the apcupsd port.
 </summary>
@@ -16032,7 +16116,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302">
 <summary>
 Make a TCP connection to the apcupsd port.
 </summary>
@@ -16042,7 +16126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
+<interface name="corenet_send_apcupsd_client_packets" lineno="9322">
 <summary>
 Send apcupsd_client packets.
 </summary>
@@ -16053,7 +16137,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341">
 <summary>
 Do not audit attempts to send apcupsd_client packets.
 </summary>
@@ -16064,7 +16148,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="9360">
 <summary>
 Receive apcupsd_client packets.
 </summary>
@@ -16075,7 +16159,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379">
 <summary>
 Do not audit attempts to receive apcupsd_client packets.
 </summary>
@@ -16086,7 +16170,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398">
 <summary>
 Send and receive apcupsd_client packets.
 </summary>
@@ -16097,7 +16181,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414">
 <summary>
 Do not audit attempts to send and receive apcupsd_client packets.
 </summary>
@@ -16108,7 +16192,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429">
 <summary>
 Relabel packets to apcupsd_client the packet type.
 </summary>
@@ -16118,7 +16202,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
+<interface name="corenet_send_apcupsd_server_packets" lineno="9449">
 <summary>
 Send apcupsd_server packets.
 </summary>
@@ -16129,7 +16213,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468">
 <summary>
 Do not audit attempts to send apcupsd_server packets.
 </summary>
@@ -16140,7 +16224,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="9487">
 <summary>
 Receive apcupsd_server packets.
 </summary>
@@ -16151,7 +16235,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506">
 <summary>
 Do not audit attempts to receive apcupsd_server packets.
 </summary>
@@ -16162,7 +16246,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525">
 <summary>
 Send and receive apcupsd_server packets.
 </summary>
@@ -16173,7 +16257,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541">
 <summary>
 Do not audit attempts to send and receive apcupsd_server packets.
 </summary>
@@ -16184,7 +16268,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556">
 <summary>
 Relabel packets to apcupsd_server the packet type.
 </summary>
@@ -16194,7 +16278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
+<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578">
 <summary>
 Send and receive TCP traffic on the apertus_ldp port.
 </summary>
@@ -16205,7 +16289,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
+<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593">
 <summary>
 Send UDP traffic on the apertus_ldp port.
 </summary>
@@ -16216,7 +16300,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
+<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608">
 <summary>
 Do not audit attempts to send UDP traffic on the apertus_ldp port.
 </summary>
@@ -16227,7 +16311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
+<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623">
 <summary>
 Receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16238,7 +16322,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
+<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638">
 <summary>
 Do not audit attempts to receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16249,7 +16333,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
+<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653">
 <summary>
 Send and receive UDP traffic on the apertus_ldp port.
 </summary>
@@ -16260,7 +16344,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
+<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the apertus_ldp port.
@@ -16272,7 +16356,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684">
 <summary>
 Bind TCP sockets to the apertus_ldp port.
 </summary>
@@ -16283,7 +16367,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704">
 <summary>
 Bind UDP sockets to the apertus_ldp port.
 </summary>
@@ -16294,7 +16378,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723">
 <summary>
 Make a TCP connection to the apertus_ldp port.
 </summary>
@@ -16304,7 +16388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743">
 <summary>
 Send apertus_ldp_client packets.
 </summary>
@@ -16315,7 +16399,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762">
 <summary>
 Do not audit attempts to send apertus_ldp_client packets.
 </summary>
@@ -16326,7 +16410,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781">
 <summary>
 Receive apertus_ldp_client packets.
 </summary>
@@ -16337,7 +16421,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800">
 <summary>
 Do not audit attempts to receive apertus_ldp_client packets.
 </summary>
@@ -16348,7 +16432,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819">
 <summary>
 Send and receive apertus_ldp_client packets.
 </summary>
@@ -16359,7 +16443,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_client packets.
 </summary>
@@ -16370,7 +16454,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850">
 <summary>
 Relabel packets to apertus_ldp_client the packet type.
 </summary>
@@ -16380,7 +16464,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870">
 <summary>
 Send apertus_ldp_server packets.
 </summary>
@@ -16391,7 +16475,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889">
 <summary>
 Do not audit attempts to send apertus_ldp_server packets.
 </summary>
@@ -16402,7 +16486,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908">
 <summary>
 Receive apertus_ldp_server packets.
 </summary>
@@ -16413,7 +16497,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927">
 <summary>
 Do not audit attempts to receive apertus_ldp_server packets.
 </summary>
@@ -16424,7 +16508,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946">
 <summary>
 Send and receive apertus_ldp_server packets.
 </summary>
@@ -16435,7 +16519,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_server packets.
 </summary>
@@ -16446,7 +16530,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977">
 <summary>
 Relabel packets to apertus_ldp_server the packet type.
 </summary>
@@ -16456,7 +16540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
+<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999">
 <summary>
 Send and receive TCP traffic on the aptcacher port.
 </summary>
@@ -16467,7 +16551,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
+<interface name="corenet_udp_send_aptcacher_port" lineno="10014">
 <summary>
 Send UDP traffic on the aptcacher port.
 </summary>
@@ -16478,7 +16562,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
+<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029">
 <summary>
 Do not audit attempts to send UDP traffic on the aptcacher port.
 </summary>
@@ -16489,7 +16573,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
+<interface name="corenet_udp_receive_aptcacher_port" lineno="10044">
 <summary>
 Receive UDP traffic on the aptcacher port.
 </summary>
@@ -16500,7 +16584,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
+<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059">
 <summary>
 Do not audit attempts to receive UDP traffic on the aptcacher port.
 </summary>
@@ -16511,7 +16595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
+<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074">
 <summary>
 Send and receive UDP traffic on the aptcacher port.
 </summary>
@@ -16522,7 +16606,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
+<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the aptcacher port.
@@ -16534,7 +16618,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105">
 <summary>
 Bind TCP sockets to the aptcacher port.
 </summary>
@@ -16545,7 +16629,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
+<interface name="corenet_udp_bind_aptcacher_port" lineno="10125">
 <summary>
 Bind UDP sockets to the aptcacher port.
 </summary>
@@ -16556,7 +16640,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144">
 <summary>
 Make a TCP connection to the aptcacher port.
 </summary>
@@ -16566,7 +16650,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
+<interface name="corenet_send_aptcacher_client_packets" lineno="10164">
 <summary>
 Send aptcacher_client packets.
 </summary>
@@ -16577,7 +16661,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183">
 <summary>
 Do not audit attempts to send aptcacher_client packets.
 </summary>
@@ -16588,7 +16672,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
+<interface name="corenet_receive_aptcacher_client_packets" lineno="10202">
 <summary>
 Receive aptcacher_client packets.
 </summary>
@@ -16599,7 +16683,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221">
 <summary>
 Do not audit attempts to receive aptcacher_client packets.
 </summary>
@@ -16610,7 +16694,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240">
 <summary>
 Send and receive aptcacher_client packets.
 </summary>
@@ -16621,7 +16705,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256">
 <summary>
 Do not audit attempts to send and receive aptcacher_client packets.
 </summary>
@@ -16632,7 +16716,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271">
 <summary>
 Relabel packets to aptcacher_client the packet type.
 </summary>
@@ -16642,7 +16726,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
+<interface name="corenet_send_aptcacher_server_packets" lineno="10291">
 <summary>
 Send aptcacher_server packets.
 </summary>
@@ -16653,7 +16737,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310">
 <summary>
 Do not audit attempts to send aptcacher_server packets.
 </summary>
@@ -16664,7 +16748,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
+<interface name="corenet_receive_aptcacher_server_packets" lineno="10329">
 <summary>
 Receive aptcacher_server packets.
 </summary>
@@ -16675,7 +16759,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348">
 <summary>
 Do not audit attempts to receive aptcacher_server packets.
 </summary>
@@ -16686,7 +16770,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367">
 <summary>
 Send and receive aptcacher_server packets.
 </summary>
@@ -16697,7 +16781,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383">
 <summary>
 Do not audit attempts to send and receive aptcacher_server packets.
 </summary>
@@ -16708,7 +16792,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398">
 <summary>
 Relabel packets to aptcacher_server the packet type.
 </summary>
@@ -16718,7 +16802,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
+<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420">
 <summary>
 Send and receive TCP traffic on the armtechdaemon port.
 </summary>
@@ -16729,7 +16813,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
+<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435">
 <summary>
 Send UDP traffic on the armtechdaemon port.
 </summary>
@@ -16740,7 +16824,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
+<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450">
 <summary>
 Do not audit attempts to send UDP traffic on the armtechdaemon port.
 </summary>
@@ -16751,7 +16835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
+<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465">
 <summary>
 Receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16762,7 +16846,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
+<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480">
 <summary>
 Do not audit attempts to receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16773,7 +16857,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
+<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495">
 <summary>
 Send and receive UDP traffic on the armtechdaemon port.
 </summary>
@@ -16784,7 +16868,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
+<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the armtechdaemon port.
@@ -16796,7 +16880,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526">
 <summary>
 Bind TCP sockets to the armtechdaemon port.
 </summary>
@@ -16807,7 +16891,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546">
 <summary>
 Bind UDP sockets to the armtechdaemon port.
 </summary>
@@ -16818,7 +16902,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565">
 <summary>
 Make a TCP connection to the armtechdaemon port.
 </summary>
@@ -16828,7 +16912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585">
 <summary>
 Send armtechdaemon_client packets.
 </summary>
@@ -16839,7 +16923,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604">
 <summary>
 Do not audit attempts to send armtechdaemon_client packets.
 </summary>
@@ -16850,7 +16934,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623">
 <summary>
 Receive armtechdaemon_client packets.
 </summary>
@@ -16861,7 +16945,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642">
 <summary>
 Do not audit attempts to receive armtechdaemon_client packets.
 </summary>
@@ -16872,7 +16956,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661">
 <summary>
 Send and receive armtechdaemon_client packets.
 </summary>
@@ -16883,7 +16967,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_client packets.
 </summary>
@@ -16894,7 +16978,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692">
 <summary>
 Relabel packets to armtechdaemon_client the packet type.
 </summary>
@@ -16904,7 +16988,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712">
 <summary>
 Send armtechdaemon_server packets.
 </summary>
@@ -16915,7 +16999,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731">
 <summary>
 Do not audit attempts to send armtechdaemon_server packets.
 </summary>
@@ -16926,7 +17010,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750">
 <summary>
 Receive armtechdaemon_server packets.
 </summary>
@@ -16937,7 +17021,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769">
 <summary>
 Do not audit attempts to receive armtechdaemon_server packets.
 </summary>
@@ -16948,7 +17032,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788">
 <summary>
 Send and receive armtechdaemon_server packets.
 </summary>
@@ -16959,7 +17043,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_server packets.
 </summary>
@@ -16970,7 +17054,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819">
 <summary>
 Relabel packets to armtechdaemon_server the packet type.
 </summary>
@@ -16980,7 +17064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
+<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841">
 <summary>
 Send and receive TCP traffic on the asterisk port.
 </summary>
@@ -16991,7 +17075,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10838">
+<interface name="corenet_udp_send_asterisk_port" lineno="10856">
 <summary>
 Send UDP traffic on the asterisk port.
 </summary>
@@ -17002,7 +17086,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
+<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871">
 <summary>
 Do not audit attempts to send UDP traffic on the asterisk port.
 </summary>
@@ -17013,7 +17097,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
+<interface name="corenet_udp_receive_asterisk_port" lineno="10886">
 <summary>
 Receive UDP traffic on the asterisk port.
 </summary>
@@ -17024,7 +17108,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
+<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901">
 <summary>
 Do not audit attempts to receive UDP traffic on the asterisk port.
 </summary>
@@ -17035,7 +17119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
+<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916">
 <summary>
 Send and receive UDP traffic on the asterisk port.
 </summary>
@@ -17046,7 +17130,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
+<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the asterisk port.
@@ -17058,7 +17142,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="10947">
 <summary>
 Bind TCP sockets to the asterisk port.
 </summary>
@@ -17069,7 +17153,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
+<interface name="corenet_udp_bind_asterisk_port" lineno="10967">
 <summary>
 Bind UDP sockets to the asterisk port.
 </summary>
@@ -17080,7 +17164,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="10986">
 <summary>
 Make a TCP connection to the asterisk port.
 </summary>
@@ -17090,7 +17174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="10988">
+<interface name="corenet_send_asterisk_client_packets" lineno="11006">
 <summary>
 Send asterisk_client packets.
 </summary>
@@ -17101,7 +17185,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025">
 <summary>
 Do not audit attempts to send asterisk_client packets.
 </summary>
@@ -17112,7 +17196,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
+<interface name="corenet_receive_asterisk_client_packets" lineno="11044">
 <summary>
 Receive asterisk_client packets.
 </summary>
@@ -17123,7 +17207,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063">
 <summary>
 Do not audit attempts to receive asterisk_client packets.
 </summary>
@@ -17134,7 +17218,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082">
 <summary>
 Send and receive asterisk_client packets.
 </summary>
@@ -17145,7 +17229,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098">
 <summary>
 Do not audit attempts to send and receive asterisk_client packets.
 </summary>
@@ -17156,7 +17240,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113">
 <summary>
 Relabel packets to asterisk_client the packet type.
 </summary>
@@ -17166,7 +17250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="11115">
+<interface name="corenet_send_asterisk_server_packets" lineno="11133">
 <summary>
 Send asterisk_server packets.
 </summary>
@@ -17177,7 +17261,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152">
 <summary>
 Do not audit attempts to send asterisk_server packets.
 </summary>
@@ -17188,7 +17272,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
+<interface name="corenet_receive_asterisk_server_packets" lineno="11171">
 <summary>
 Receive asterisk_server packets.
 </summary>
@@ -17199,7 +17283,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190">
 <summary>
 Do not audit attempts to receive asterisk_server packets.
 </summary>
@@ -17210,7 +17294,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209">
 <summary>
 Send and receive asterisk_server packets.
 </summary>
@@ -17221,7 +17305,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225">
 <summary>
 Do not audit attempts to send and receive asterisk_server packets.
 </summary>
@@ -17232,7 +17316,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240">
 <summary>
 Relabel packets to asterisk_server the packet type.
 </summary>
@@ -17242,7 +17326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
+<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262">
 <summary>
 Send and receive TCP traffic on the audit port.
 </summary>
@@ -17253,7 +17337,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_audit_port" lineno="11259">
+<interface name="corenet_udp_send_audit_port" lineno="11277">
 <summary>
 Send UDP traffic on the audit port.
 </summary>
@@ -17264,7 +17348,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
+<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292">
 <summary>
 Do not audit attempts to send UDP traffic on the audit port.
 </summary>
@@ -17275,7 +17359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_audit_port" lineno="11289">
+<interface name="corenet_udp_receive_audit_port" lineno="11307">
 <summary>
 Receive UDP traffic on the audit port.
 </summary>
@@ -17286,7 +17370,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
+<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322">
 <summary>
 Do not audit attempts to receive UDP traffic on the audit port.
 </summary>
@@ -17297,7 +17381,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
+<interface name="corenet_udp_sendrecv_audit_port" lineno="11337">
 <summary>
 Send and receive UDP traffic on the audit port.
 </summary>
@@ -17308,7 +17392,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
+<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the audit port.
@@ -17320,7 +17404,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="11350">
+<interface name="corenet_tcp_bind_audit_port" lineno="11368">
 <summary>
 Bind TCP sockets to the audit port.
 </summary>
@@ -17331,7 +17415,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_audit_port" lineno="11370">
+<interface name="corenet_udp_bind_audit_port" lineno="11388">
 <summary>
 Bind UDP sockets to the audit port.
 </summary>
@@ -17342,7 +17426,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="11389">
+<interface name="corenet_tcp_connect_audit_port" lineno="11407">
 <summary>
 Make a TCP connection to the audit port.
 </summary>
@@ -17352,7 +17436,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_client_packets" lineno="11409">
+<interface name="corenet_send_audit_client_packets" lineno="11427">
 <summary>
 Send audit_client packets.
 </summary>
@@ -17363,7 +17447,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446">
 <summary>
 Do not audit attempts to send audit_client packets.
 </summary>
@@ -17374,7 +17458,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_client_packets" lineno="11447">
+<interface name="corenet_receive_audit_client_packets" lineno="11465">
 <summary>
 Receive audit_client packets.
 </summary>
@@ -17385,7 +17469,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484">
 <summary>
 Do not audit attempts to receive audit_client packets.
 </summary>
@@ -17396,7 +17480,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="11503">
 <summary>
 Send and receive audit_client packets.
 </summary>
@@ -17407,7 +17491,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519">
 <summary>
 Do not audit attempts to send and receive audit_client packets.
 </summary>
@@ -17418,7 +17502,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
+<interface name="corenet_relabelto_audit_client_packets" lineno="11534">
 <summary>
 Relabel packets to audit_client the packet type.
 </summary>
@@ -17428,7 +17512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_server_packets" lineno="11536">
+<interface name="corenet_send_audit_server_packets" lineno="11554">
 <summary>
 Send audit_server packets.
 </summary>
@@ -17439,7 +17523,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573">
 <summary>
 Do not audit attempts to send audit_server packets.
 </summary>
@@ -17450,7 +17534,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11574">
+<interface name="corenet_receive_audit_server_packets" lineno="11592">
 <summary>
 Receive audit_server packets.
 </summary>
@@ -17461,7 +17545,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611">
 <summary>
 Do not audit attempts to receive audit_server packets.
 </summary>
@@ -17472,7 +17556,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="11630">
 <summary>
 Send and receive audit_server packets.
 </summary>
@@ -17483,7 +17567,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646">
 <summary>
 Do not audit attempts to send and receive audit_server packets.
 </summary>
@@ -17494,7 +17578,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
+<interface name="corenet_relabelto_audit_server_packets" lineno="11661">
 <summary>
 Relabel packets to audit_server the packet type.
 </summary>
@@ -17504,7 +17588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
+<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683">
 <summary>
 Send and receive TCP traffic on the auth port.
 </summary>
@@ -17515,7 +17599,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_auth_port" lineno="11680">
+<interface name="corenet_udp_send_auth_port" lineno="11698">
 <summary>
 Send UDP traffic on the auth port.
 </summary>
@@ -17526,7 +17610,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
+<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713">
 <summary>
 Do not audit attempts to send UDP traffic on the auth port.
 </summary>
@@ -17537,7 +17621,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11710">
+<interface name="corenet_udp_receive_auth_port" lineno="11728">
 <summary>
 Receive UDP traffic on the auth port.
 </summary>
@@ -17548,7 +17632,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
+<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743">
 <summary>
 Do not audit attempts to receive UDP traffic on the auth port.
 </summary>
@@ -17559,7 +17643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
+<interface name="corenet_udp_sendrecv_auth_port" lineno="11758">
 <summary>
 Send and receive UDP traffic on the auth port.
 </summary>
@@ -17570,7 +17654,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
+<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the auth port.
@@ -17582,7 +17666,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11771">
+<interface name="corenet_tcp_bind_auth_port" lineno="11789">
 <summary>
 Bind TCP sockets to the auth port.
 </summary>
@@ -17593,7 +17677,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11791">
+<interface name="corenet_udp_bind_auth_port" lineno="11809">
 <summary>
 Bind UDP sockets to the auth port.
 </summary>
@@ -17604,7 +17688,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11810">
+<interface name="corenet_tcp_connect_auth_port" lineno="11828">
 <summary>
 Make a TCP connection to the auth port.
 </summary>
@@ -17614,7 +17698,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_client_packets" lineno="11830">
+<interface name="corenet_send_auth_client_packets" lineno="11848">
 <summary>
 Send auth_client packets.
 </summary>
@@ -17625,7 +17709,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867">
 <summary>
 Do not audit attempts to send auth_client packets.
 </summary>
@@ -17636,7 +17720,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11868">
+<interface name="corenet_receive_auth_client_packets" lineno="11886">
 <summary>
 Receive auth_client packets.
 </summary>
@@ -17647,7 +17731,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905">
 <summary>
 Do not audit attempts to receive auth_client packets.
 </summary>
@@ -17658,7 +17742,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="11924">
 <summary>
 Send and receive auth_client packets.
 </summary>
@@ -17669,7 +17753,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940">
 <summary>
 Do not audit attempts to send and receive auth_client packets.
 </summary>
@@ -17680,7 +17764,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
+<interface name="corenet_relabelto_auth_client_packets" lineno="11955">
 <summary>
 Relabel packets to auth_client the packet type.
 </summary>
@@ -17690,7 +17774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_server_packets" lineno="11957">
+<interface name="corenet_send_auth_server_packets" lineno="11975">
 <summary>
 Send auth_server packets.
 </summary>
@@ -17701,7 +17785,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994">
 <summary>
 Do not audit attempts to send auth_server packets.
 </summary>
@@ -17712,7 +17796,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_server_packets" lineno="11995">
+<interface name="corenet_receive_auth_server_packets" lineno="12013">
 <summary>
 Receive auth_server packets.
 </summary>
@@ -17723,7 +17807,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032">
 <summary>
 Do not audit attempts to receive auth_server packets.
 </summary>
@@ -17734,7 +17818,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="12051">
 <summary>
 Send and receive auth_server packets.
 </summary>
@@ -17745,7 +17829,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067">
 <summary>
 Do not audit attempts to send and receive auth_server packets.
 </summary>
@@ -17756,7 +17840,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
+<interface name="corenet_relabelto_auth_server_packets" lineno="12082">
 <summary>
 Relabel packets to auth_server the packet type.
 </summary>
@@ -17766,7 +17850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
+<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104">
 <summary>
 Send and receive TCP traffic on the bgp port.
 </summary>
@@ -17777,7 +17861,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_bgp_port" lineno="12101">
+<interface name="corenet_udp_send_bgp_port" lineno="12119">
 <summary>
 Send UDP traffic on the bgp port.
 </summary>
@@ -17788,7 +17872,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
+<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134">
 <summary>
 Do not audit attempts to send UDP traffic on the bgp port.
 </summary>
@@ -17799,7 +17883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="12131">
+<interface name="corenet_udp_receive_bgp_port" lineno="12149">
 <summary>
 Receive UDP traffic on the bgp port.
 </summary>
@@ -17810,7 +17894,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
+<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164">
 <summary>
 Do not audit attempts to receive UDP traffic on the bgp port.
 </summary>
@@ -17821,7 +17905,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
+<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179">
 <summary>
 Send and receive UDP traffic on the bgp port.
 </summary>
@@ -17832,7 +17916,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
+<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the bgp port.
@@ -17844,7 +17928,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
+<interface name="corenet_tcp_bind_bgp_port" lineno="12210">
 <summary>
 Bind TCP sockets to the bgp port.
 </summary>
@@ -17855,7 +17939,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="12212">
+<interface name="corenet_udp_bind_bgp_port" lineno="12230">
 <summary>
 Bind UDP sockets to the bgp port.
 </summary>
@@ -17866,7 +17950,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
+<interface name="corenet_tcp_connect_bgp_port" lineno="12249">
 <summary>
 Make a TCP connection to the bgp port.
 </summary>
@@ -17876,7 +17960,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_client_packets" lineno="12251">
+<interface name="corenet_send_bgp_client_packets" lineno="12269">
 <summary>
 Send bgp_client packets.
 </summary>
@@ -17887,7 +17971,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288">
 <summary>
 Do not audit attempts to send bgp_client packets.
 </summary>
@@ -17898,7 +17982,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="12289">
+<interface name="corenet_receive_bgp_client_packets" lineno="12307">
 <summary>
 Receive bgp_client packets.
 </summary>
@@ -17909,7 +17993,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326">
 <summary>
 Do not audit attempts to receive bgp_client packets.
 </summary>
@@ -17920,7 +18004,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345">
 <summary>
 Send and receive bgp_client packets.
 </summary>
@@ -17931,7 +18015,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361">
 <summary>
 Do not audit attempts to send and receive bgp_client packets.
 </summary>
@@ -17942,7 +18026,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="12376">
 <summary>
 Relabel packets to bgp_client the packet type.
 </summary>
@@ -17952,7 +18036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_server_packets" lineno="12378">
+<interface name="corenet_send_bgp_server_packets" lineno="12396">
 <summary>
 Send bgp_server packets.
 </summary>
@@ -17963,7 +18047,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415">
 <summary>
 Do not audit attempts to send bgp_server packets.
 </summary>
@@ -17974,7 +18058,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="12416">
+<interface name="corenet_receive_bgp_server_packets" lineno="12434">
 <summary>
 Receive bgp_server packets.
 </summary>
@@ -17985,7 +18069,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453">
 <summary>
 Do not audit attempts to receive bgp_server packets.
 </summary>
@@ -17996,7 +18080,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472">
 <summary>
 Send and receive bgp_server packets.
 </summary>
@@ -18007,7 +18091,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488">
 <summary>
 Do not audit attempts to send and receive bgp_server packets.
 </summary>
@@ -18018,7 +18102,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="12503">
 <summary>
 Relabel packets to bgp_server the packet type.
 </summary>
@@ -18028,7 +18112,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
+<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525">
 <summary>
 Send and receive TCP traffic on the bitcoin port.
 </summary>
@@ -18039,7 +18123,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
+<interface name="corenet_udp_send_bitcoin_port" lineno="12540">
 <summary>
 Send UDP traffic on the bitcoin port.
 </summary>
@@ -18050,7 +18134,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
+<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555">
 <summary>
 Do not audit attempts to send UDP traffic on the bitcoin port.
 </summary>
@@ -18061,7 +18145,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
+<interface name="corenet_udp_receive_bitcoin_port" lineno="12570">
 <summary>
 Receive UDP traffic on the bitcoin port.
 </summary>
@@ -18072,7 +18156,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
+<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585">
 <summary>
 Do not audit attempts to receive UDP traffic on the bitcoin port.
 </summary>
@@ -18083,7 +18167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
+<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600">
 <summary>
 Send and receive UDP traffic on the bitcoin port.
 </summary>
@@ -18094,7 +18178,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
+<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the bitcoin port.
@@ -18106,7 +18190,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631">
 <summary>
 Bind TCP sockets to the bitcoin port.
 </summary>
@@ -18117,7 +18201,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="12651">
 <summary>
 Bind UDP sockets to the bitcoin port.
 </summary>
@@ -18128,7 +18212,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670">
 <summary>
 Make a TCP connection to the bitcoin port.
 </summary>
@@ -18138,7 +18222,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
+<interface name="corenet_send_bitcoin_client_packets" lineno="12690">
 <summary>
 Send bitcoin_client packets.
 </summary>
@@ -18149,7 +18233,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709">
 <summary>
 Do not audit attempts to send bitcoin_client packets.
 </summary>
@@ -18160,7 +18244,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="12728">
 <summary>
 Receive bitcoin_client packets.
 </summary>
@@ -18171,7 +18255,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747">
 <summary>
 Do not audit attempts to receive bitcoin_client packets.
 </summary>
@@ -18182,7 +18266,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766">
 <summary>
 Send and receive bitcoin_client packets.
 </summary>
@@ -18193,7 +18277,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782">
 <summary>
 Do not audit attempts to send and receive bitcoin_client packets.
 </summary>
@@ -18204,7 +18288,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797">
 <summary>
 Relabel packets to bitcoin_client the packet type.
 </summary>
@@ -18214,7 +18298,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
+<interface name="corenet_send_bitcoin_server_packets" lineno="12817">
 <summary>
 Send bitcoin_server packets.
 </summary>
@@ -18225,7 +18309,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836">
 <summary>
 Do not audit attempts to send bitcoin_server packets.
 </summary>
@@ -18236,7 +18320,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="12855">
 <summary>
 Receive bitcoin_server packets.
 </summary>
@@ -18247,7 +18331,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874">
 <summary>
 Do not audit attempts to receive bitcoin_server packets.
 </summary>
@@ -18258,7 +18342,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893">
 <summary>
 Send and receive bitcoin_server packets.
 </summary>
@@ -18269,7 +18353,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909">
 <summary>
 Do not audit attempts to send and receive bitcoin_server packets.
 </summary>
@@ -18280,7 +18364,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924">
 <summary>
 Relabel packets to bitcoin_server the packet type.
 </summary>
@@ -18290,7 +18374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
+<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946">
 <summary>
 Send and receive TCP traffic on the boinc port.
 </summary>
@@ -18301,7 +18385,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12943">
+<interface name="corenet_udp_send_boinc_port" lineno="12961">
 <summary>
 Send UDP traffic on the boinc port.
 </summary>
@@ -18312,7 +18396,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
+<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976">
 <summary>
 Do not audit attempts to send UDP traffic on the boinc port.
 </summary>
@@ -18323,7 +18407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12973">
+<interface name="corenet_udp_receive_boinc_port" lineno="12991">
 <summary>
 Receive UDP traffic on the boinc port.
 </summary>
@@ -18334,7 +18418,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
+<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006">
 <summary>
 Do not audit attempts to receive UDP traffic on the boinc port.
 </summary>
@@ -18345,7 +18429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
+<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021">
 <summary>
 Send and receive UDP traffic on the boinc port.
 </summary>
@@ -18356,7 +18440,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the boinc port.
@@ -18368,7 +18452,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
+<interface name="corenet_tcp_bind_boinc_port" lineno="13052">
 <summary>
 Bind TCP sockets to the boinc port.
 </summary>
@@ -18379,7 +18463,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="13054">
+<interface name="corenet_udp_bind_boinc_port" lineno="13072">
 <summary>
 Bind UDP sockets to the boinc port.
 </summary>
@@ -18390,7 +18474,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
+<interface name="corenet_tcp_connect_boinc_port" lineno="13091">
 <summary>
 Make a TCP connection to the boinc port.
 </summary>
@@ -18400,7 +18484,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_packets" lineno="13093">
+<interface name="corenet_send_boinc_client_packets" lineno="13111">
 <summary>
 Send boinc_client packets.
 </summary>
@@ -18411,7 +18495,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130">
 <summary>
 Do not audit attempts to send boinc_client packets.
 </summary>
@@ -18422,7 +18506,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="13131">
+<interface name="corenet_receive_boinc_client_packets" lineno="13149">
 <summary>
 Receive boinc_client packets.
 </summary>
@@ -18433,7 +18517,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168">
 <summary>
 Do not audit attempts to receive boinc_client packets.
 </summary>
@@ -18444,7 +18528,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187">
 <summary>
 Send and receive boinc_client packets.
 </summary>
@@ -18455,7 +18539,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203">
 <summary>
 Do not audit attempts to send and receive boinc_client packets.
 </summary>
@@ -18466,7 +18550,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="13218">
 <summary>
 Relabel packets to boinc_client the packet type.
 </summary>
@@ -18476,7 +18560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_server_packets" lineno="13220">
+<interface name="corenet_send_boinc_server_packets" lineno="13238">
 <summary>
 Send boinc_server packets.
 </summary>
@@ -18487,7 +18571,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257">
 <summary>
 Do not audit attempts to send boinc_server packets.
 </summary>
@@ -18498,7 +18582,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="13258">
+<interface name="corenet_receive_boinc_server_packets" lineno="13276">
 <summary>
 Receive boinc_server packets.
 </summary>
@@ -18509,7 +18593,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295">
 <summary>
 Do not audit attempts to receive boinc_server packets.
 </summary>
@@ -18520,7 +18604,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314">
 <summary>
 Send and receive boinc_server packets.
 </summary>
@@ -18531,7 +18615,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330">
 <summary>
 Do not audit attempts to send and receive boinc_server packets.
 </summary>
@@ -18542,7 +18626,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="13345">
 <summary>
 Relabel packets to boinc_server the packet type.
 </summary>
@@ -18552,7 +18636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
+<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367">
 <summary>
 Send and receive TCP traffic on the boinc_client port.
 </summary>
@@ -18563,7 +18647,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
+<interface name="corenet_udp_send_boinc_client_port" lineno="13382">
 <summary>
 Send UDP traffic on the boinc_client port.
 </summary>
@@ -18574,7 +18658,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
+<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397">
 <summary>
 Do not audit attempts to send UDP traffic on the boinc_client port.
 </summary>
@@ -18585,7 +18669,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
+<interface name="corenet_udp_receive_boinc_client_port" lineno="13412">
 <summary>
 Receive UDP traffic on the boinc_client port.
 </summary>
@@ -18596,7 +18680,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
+<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427">
 <summary>
 Do not audit attempts to receive UDP traffic on the boinc_client port.
 </summary>
@@ -18607,7 +18691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
+<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442">
 <summary>
 Send and receive UDP traffic on the boinc_client port.
 </summary>
@@ -18618,7 +18702,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the boinc_client port.
@@ -18630,7 +18714,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
 <summary>
 Bind TCP sockets to the boinc_client port.
 </summary>
@@ -18641,7 +18725,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
 <summary>
 Bind UDP sockets to the boinc_client port.
 </summary>
@@ -18652,7 +18736,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
 <summary>
 Make a TCP connection to the boinc_client port.
 </summary>
@@ -18662,7 +18746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
+<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
 <summary>
 Send boinc_client_client packets.
 </summary>
@@ -18673,7 +18757,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
 <summary>
 Do not audit attempts to send boinc_client_client packets.
 </summary>
@@ -18684,7 +18768,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
 <summary>
 Receive boinc_client_client packets.
 </summary>
@@ -18695,7 +18779,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
 <summary>
 Do not audit attempts to receive boinc_client_client packets.
 </summary>
@@ -18706,7 +18790,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
 <summary>
 Send and receive boinc_client_client packets.
 </summary>
@@ -18717,7 +18801,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
 <summary>
 Do not audit attempts to send and receive boinc_client_client packets.
 </summary>
@@ -18728,7 +18812,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
 <summary>
 Relabel packets to boinc_client_client the packet type.
 </summary>
@@ -18738,7 +18822,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
+<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
 <summary>
 Send boinc_client_server packets.
 </summary>
@@ -18749,7 +18833,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
 <summary>
 Do not audit attempts to send boinc_client_server packets.
 </summary>
@@ -18760,7 +18844,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
 <summary>
 Receive boinc_client_server packets.
 </summary>
@@ -18771,7 +18855,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
 <summary>
 Do not audit attempts to receive boinc_client_server packets.
 </summary>
@@ -18782,7 +18866,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
 <summary>
 Send and receive boinc_client_server packets.
 </summary>
@@ -18793,7 +18877,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
 <summary>
 Do not audit attempts to send and receive boinc_client_server packets.
 </summary>
@@ -18804,7 +18888,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
 <summary>
 Relabel packets to boinc_client_server the packet type.
 </summary>
@@ -18814,7 +18898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
+<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
 <summary>
 Send and receive TCP traffic on the biff port.
 </summary>
@@ -18825,7 +18909,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_biff_port" lineno="13785">
+<interface name="corenet_udp_send_biff_port" lineno="13803">
 <summary>
 Send UDP traffic on the biff port.
 </summary>
@@ -18836,7 +18920,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
+<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818">
 <summary>
 Do not audit attempts to send UDP traffic on the biff port.
 </summary>
@@ -18847,7 +18931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13815">
+<interface name="corenet_udp_receive_biff_port" lineno="13833">
 <summary>
 Receive UDP traffic on the biff port.
 </summary>
@@ -18858,7 +18942,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
+<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848">
 <summary>
 Do not audit attempts to receive UDP traffic on the biff port.
 </summary>
@@ -18869,7 +18953,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
+<interface name="corenet_udp_sendrecv_biff_port" lineno="13863">
 <summary>
 Send and receive UDP traffic on the biff port.
 </summary>
@@ -18880,7 +18964,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
+<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the biff port.
@@ -18892,7 +18976,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13876">
+<interface name="corenet_tcp_bind_biff_port" lineno="13894">
 <summary>
 Bind TCP sockets to the biff port.
 </summary>
@@ -18903,7 +18987,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13896">
+<interface name="corenet_udp_bind_biff_port" lineno="13914">
 <summary>
 Bind UDP sockets to the biff port.
 </summary>
@@ -18914,7 +18998,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13915">
+<interface name="corenet_tcp_connect_biff_port" lineno="13933">
 <summary>
 Make a TCP connection to the biff port.
 </summary>
@@ -18924,7 +19008,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_client_packets" lineno="13935">
+<interface name="corenet_send_biff_client_packets" lineno="13953">
 <summary>
 Send biff_client packets.
 </summary>
@@ -18935,7 +19019,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972">
 <summary>
 Do not audit attempts to send biff_client packets.
 </summary>
@@ -18946,7 +19030,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13973">
+<interface name="corenet_receive_biff_client_packets" lineno="13991">
 <summary>
 Receive biff_client packets.
 </summary>
@@ -18957,7 +19041,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010">
 <summary>
 Do not audit attempts to receive biff_client packets.
 </summary>
@@ -18968,7 +19052,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="14029">
 <summary>
 Send and receive biff_client packets.
 </summary>
@@ -18979,7 +19063,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045">
 <summary>
 Do not audit attempts to send and receive biff_client packets.
 </summary>
@@ -18990,7 +19074,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
+<interface name="corenet_relabelto_biff_client_packets" lineno="14060">
 <summary>
 Relabel packets to biff_client the packet type.
 </summary>
@@ -19000,7 +19084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_server_packets" lineno="14062">
+<interface name="corenet_send_biff_server_packets" lineno="14080">
 <summary>
 Send biff_server packets.
 </summary>
@@ -19011,7 +19095,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099">
 <summary>
 Do not audit attempts to send biff_server packets.
 </summary>
@@ -19022,7 +19106,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_server_packets" lineno="14100">
+<interface name="corenet_receive_biff_server_packets" lineno="14118">
 <summary>
 Receive biff_server packets.
 </summary>
@@ -19033,7 +19117,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137">
 <summary>
 Do not audit attempts to receive biff_server packets.
 </summary>
@@ -19044,7 +19128,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="14156">
 <summary>
 Send and receive biff_server packets.
 </summary>
@@ -19055,7 +19139,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172">
 <summary>
 Do not audit attempts to send and receive biff_server packets.
 </summary>
@@ -19066,7 +19150,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
+<interface name="corenet_relabelto_biff_server_packets" lineno="14187">
 <summary>
 Relabel packets to biff_server the packet type.
 </summary>
@@ -19076,7 +19160,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
+<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209">
 <summary>
 Send and receive TCP traffic on the certmaster port.
 </summary>
@@ -19087,7 +19171,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="14206">
+<interface name="corenet_udp_send_certmaster_port" lineno="14224">
 <summary>
 Send UDP traffic on the certmaster port.
 </summary>
@@ -19098,7 +19182,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
+<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239">
 <summary>
 Do not audit attempts to send UDP traffic on the certmaster port.
 </summary>
@@ -19109,7 +19193,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
+<interface name="corenet_udp_receive_certmaster_port" lineno="14254">
 <summary>
 Receive UDP traffic on the certmaster port.
 </summary>
@@ -19120,7 +19204,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
+<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269">
 <summary>
 Do not audit attempts to receive UDP traffic on the certmaster port.
 </summary>
@@ -19131,7 +19215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
+<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284">
 <summary>
 Send and receive UDP traffic on the certmaster port.
 </summary>
@@ -19142,7 +19226,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
+<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the certmaster port.
@@ -19154,7 +19238,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="14315">
 <summary>
 Bind TCP sockets to the certmaster port.
 </summary>
@@ -19165,7 +19249,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
+<interface name="corenet_udp_bind_certmaster_port" lineno="14335">
 <summary>
 Bind UDP sockets to the certmaster port.
 </summary>
@@ -19176,7 +19260,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="14354">
 <summary>
 Make a TCP connection to the certmaster port.
 </summary>
@@ -19186,7 +19270,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="14356">
+<interface name="corenet_send_certmaster_client_packets" lineno="14374">
 <summary>
 Send certmaster_client packets.
 </summary>
@@ -19197,7 +19281,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393">
 <summary>
 Do not audit attempts to send certmaster_client packets.
 </summary>
@@ -19208,7 +19292,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
+<interface name="corenet_receive_certmaster_client_packets" lineno="14412">
 <summary>
 Receive certmaster_client packets.
 </summary>
@@ -19219,7 +19303,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431">
 <summary>
 Do not audit attempts to receive certmaster_client packets.
 </summary>
@@ -19230,7 +19314,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450">
 <summary>
 Send and receive certmaster_client packets.
 </summary>
@@ -19241,7 +19325,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466">
 <summary>
 Do not audit attempts to send and receive certmaster_client packets.
 </summary>
@@ -19252,7 +19336,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481">
 <summary>
 Relabel packets to certmaster_client the packet type.
 </summary>
@@ -19262,7 +19346,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="14483">
+<interface name="corenet_send_certmaster_server_packets" lineno="14501">
 <summary>
 Send certmaster_server packets.
 </summary>
@@ -19273,7 +19357,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520">
 <summary>
 Do not audit attempts to send certmaster_server packets.
 </summary>
@@ -19284,7 +19368,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
+<interface name="corenet_receive_certmaster_server_packets" lineno="14539">
 <summary>
 Receive certmaster_server packets.
 </summary>
@@ -19295,7 +19379,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558">
 <summary>
 Do not audit attempts to receive certmaster_server packets.
 </summary>
@@ -19306,7 +19390,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577">
 <summary>
 Send and receive certmaster_server packets.
 </summary>
@@ -19317,7 +19401,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593">
 <summary>
 Do not audit attempts to send and receive certmaster_server packets.
 </summary>
@@ -19328,7 +19412,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608">
 <summary>
 Relabel packets to certmaster_server the packet type.
 </summary>
@@ -19338,7 +19422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
+<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630">
 <summary>
 Send and receive TCP traffic on the chronyd port.
 </summary>
@@ -19349,7 +19433,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14627">
+<interface name="corenet_udp_send_chronyd_port" lineno="14645">
 <summary>
 Send UDP traffic on the chronyd port.
 </summary>
@@ -19360,7 +19444,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
+<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660">
 <summary>
 Do not audit attempts to send UDP traffic on the chronyd port.
 </summary>
@@ -19371,7 +19455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
+<interface name="corenet_udp_receive_chronyd_port" lineno="14675">
 <summary>
 Receive UDP traffic on the chronyd port.
 </summary>
@@ -19382,7 +19466,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
+<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690">
 <summary>
 Do not audit attempts to receive UDP traffic on the chronyd port.
 </summary>
@@ -19393,7 +19477,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
+<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705">
 <summary>
 Send and receive UDP traffic on the chronyd port.
 </summary>
@@ -19404,7 +19488,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
+<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the chronyd port.
@@ -19416,7 +19500,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="14736">
 <summary>
 Bind TCP sockets to the chronyd port.
 </summary>
@@ -19427,7 +19511,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
+<interface name="corenet_udp_bind_chronyd_port" lineno="14756">
 <summary>
 Bind UDP sockets to the chronyd port.
 </summary>
@@ -19438,7 +19522,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="14775">
 <summary>
 Make a TCP connection to the chronyd port.
 </summary>
@@ -19448,7 +19532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14777">
+<interface name="corenet_send_chronyd_client_packets" lineno="14795">
 <summary>
 Send chronyd_client packets.
 </summary>
@@ -19459,7 +19543,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814">
 <summary>
 Do not audit attempts to send chronyd_client packets.
 </summary>
@@ -19470,7 +19554,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
+<interface name="corenet_receive_chronyd_client_packets" lineno="14833">
 <summary>
 Receive chronyd_client packets.
 </summary>
@@ -19481,7 +19565,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852">
 <summary>
 Do not audit attempts to receive chronyd_client packets.
 </summary>
@@ -19492,7 +19576,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871">
 <summary>
 Send and receive chronyd_client packets.
 </summary>
@@ -19503,7 +19587,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887">
 <summary>
 Do not audit attempts to send and receive chronyd_client packets.
 </summary>
@@ -19514,7 +19598,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902">
 <summary>
 Relabel packets to chronyd_client the packet type.
 </summary>
@@ -19524,7 +19608,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14904">
+<interface name="corenet_send_chronyd_server_packets" lineno="14922">
 <summary>
 Send chronyd_server packets.
 </summary>
@@ -19535,7 +19619,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941">
 <summary>
 Do not audit attempts to send chronyd_server packets.
 </summary>
@@ -19546,7 +19630,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
+<interface name="corenet_receive_chronyd_server_packets" lineno="14960">
 <summary>
 Receive chronyd_server packets.
 </summary>
@@ -19557,7 +19641,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979">
 <summary>
 Do not audit attempts to receive chronyd_server packets.
 </summary>
@@ -19568,7 +19652,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998">
 <summary>
 Send and receive chronyd_server packets.
 </summary>
@@ -19579,7 +19663,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014">
 <summary>
 Do not audit attempts to send and receive chronyd_server packets.
 </summary>
@@ -19590,7 +19674,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029">
 <summary>
 Relabel packets to chronyd_server the packet type.
 </summary>
@@ -19600,7 +19684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
+<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051">
 <summary>
 Send and receive TCP traffic on the clamd port.
 </summary>
@@ -19611,7 +19695,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_clamd_port" lineno="15048">
+<interface name="corenet_udp_send_clamd_port" lineno="15066">
 <summary>
 Send UDP traffic on the clamd port.
 </summary>
@@ -19622,7 +19706,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
+<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081">
 <summary>
 Do not audit attempts to send UDP traffic on the clamd port.
 </summary>
@@ -19633,7 +19717,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="15078">
+<interface name="corenet_udp_receive_clamd_port" lineno="15096">
 <summary>
 Receive UDP traffic on the clamd port.
 </summary>
@@ -19644,7 +19728,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
+<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111">
 <summary>
 Do not audit attempts to receive UDP traffic on the clamd port.
 </summary>
@@ -19655,7 +19739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
+<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126">
 <summary>
 Send and receive UDP traffic on the clamd port.
 </summary>
@@ -19666,7 +19750,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
+<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the clamd port.
@@ -19678,7 +19762,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
+<interface name="corenet_tcp_bind_clamd_port" lineno="15157">
 <summary>
 Bind TCP sockets to the clamd port.
 </summary>
@@ -19689,7 +19773,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="15159">
+<interface name="corenet_udp_bind_clamd_port" lineno="15177">
 <summary>
 Bind UDP sockets to the clamd port.
 </summary>
@@ -19700,7 +19784,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
+<interface name="corenet_tcp_connect_clamd_port" lineno="15196">
 <summary>
 Make a TCP connection to the clamd port.
 </summary>
@@ -19710,7 +19794,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_client_packets" lineno="15198">
+<interface name="corenet_send_clamd_client_packets" lineno="15216">
 <summary>
 Send clamd_client packets.
 </summary>
@@ -19721,7 +19805,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235">
 <summary>
 Do not audit attempts to send clamd_client packets.
 </summary>
@@ -19732,7 +19816,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="15236">
+<interface name="corenet_receive_clamd_client_packets" lineno="15254">
 <summary>
 Receive clamd_client packets.
 </summary>
@@ -19743,7 +19827,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273">
 <summary>
 Do not audit attempts to receive clamd_client packets.
 </summary>
@@ -19754,7 +19838,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292">
 <summary>
 Send and receive clamd_client packets.
 </summary>
@@ -19765,7 +19849,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308">
 <summary>
 Do not audit attempts to send and receive clamd_client packets.
 </summary>
@@ -19776,7 +19860,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="15323">
 <summary>
 Relabel packets to clamd_client the packet type.
 </summary>
@@ -19786,7 +19870,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_server_packets" lineno="15325">
+<interface name="corenet_send_clamd_server_packets" lineno="15343">
 <summary>
 Send clamd_server packets.
 </summary>
@@ -19797,7 +19881,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362">
 <summary>
 Do not audit attempts to send clamd_server packets.
 </summary>
@@ -19808,7 +19892,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="15363">
+<interface name="corenet_receive_clamd_server_packets" lineno="15381">
 <summary>
 Receive clamd_server packets.
 </summary>
@@ -19819,7 +19903,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400">
 <summary>
 Do not audit attempts to receive clamd_server packets.
 </summary>
@@ -19830,7 +19914,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419">
 <summary>
 Send and receive clamd_server packets.
 </summary>
@@ -19841,7 +19925,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435">
 <summary>
 Do not audit attempts to send and receive clamd_server packets.
 </summary>
@@ -19852,7 +19936,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="15450">
 <summary>
 Relabel packets to clamd_server the packet type.
 </summary>
@@ -19862,7 +19946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
+<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472">
 <summary>
 Send and receive TCP traffic on the clockspeed port.
 </summary>
@@ -19873,7 +19957,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
+<interface name="corenet_udp_send_clockspeed_port" lineno="15487">
 <summary>
 Send UDP traffic on the clockspeed port.
 </summary>
@@ -19884,7 +19968,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
+<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502">
 <summary>
 Do not audit attempts to send UDP traffic on the clockspeed port.
 </summary>
@@ -19895,7 +19979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
+<interface name="corenet_udp_receive_clockspeed_port" lineno="15517">
 <summary>
 Receive UDP traffic on the clockspeed port.
 </summary>
@@ -19906,7 +19990,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
+<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532">
 <summary>
 Do not audit attempts to receive UDP traffic on the clockspeed port.
 </summary>
@@ -19917,7 +20001,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
+<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547">
 <summary>
 Send and receive UDP traffic on the clockspeed port.
 </summary>
@@ -19928,7 +20012,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
+<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the clockspeed port.
@@ -19940,7 +20024,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578">
 <summary>
 Bind TCP sockets to the clockspeed port.
 </summary>
@@ -19951,7 +20035,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="15598">
 <summary>
 Bind UDP sockets to the clockspeed port.
 </summary>
@@ -19962,7 +20046,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617">
 <summary>
 Make a TCP connection to the clockspeed port.
 </summary>
@@ -19972,7 +20056,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
+<interface name="corenet_send_clockspeed_client_packets" lineno="15637">
 <summary>
 Send clockspeed_client packets.
 </summary>
@@ -19983,7 +20067,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656">
 <summary>
 Do not audit attempts to send clockspeed_client packets.
 </summary>
@@ -19994,7 +20078,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="15675">
 <summary>
 Receive clockspeed_client packets.
 </summary>
@@ -20005,7 +20089,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694">
 <summary>
 Do not audit attempts to receive clockspeed_client packets.
 </summary>
@@ -20016,7 +20100,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713">
 <summary>
 Send and receive clockspeed_client packets.
 </summary>
@@ -20027,7 +20111,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729">
 <summary>
 Do not audit attempts to send and receive clockspeed_client packets.
 </summary>
@@ -20038,7 +20122,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744">
 <summary>
 Relabel packets to clockspeed_client the packet type.
 </summary>
@@ -20048,7 +20132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
+<interface name="corenet_send_clockspeed_server_packets" lineno="15764">
 <summary>
 Send clockspeed_server packets.
 </summary>
@@ -20059,7 +20143,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783">
 <summary>
 Do not audit attempts to send clockspeed_server packets.
 </summary>
@@ -20070,7 +20154,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="15802">
 <summary>
 Receive clockspeed_server packets.
 </summary>
@@ -20081,7 +20165,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821">
 <summary>
 Do not audit attempts to receive clockspeed_server packets.
 </summary>
@@ -20092,7 +20176,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840">
 <summary>
 Send and receive clockspeed_server packets.
 </summary>
@@ -20103,7 +20187,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856">
 <summary>
 Do not audit attempts to send and receive clockspeed_server packets.
 </summary>
@@ -20114,7 +20198,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871">
 <summary>
 Relabel packets to clockspeed_server the packet type.
 </summary>
@@ -20124,7 +20208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
+<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893">
 <summary>
 Send and receive TCP traffic on the cluster port.
 </summary>
@@ -20135,7 +20219,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15890">
+<interface name="corenet_udp_send_cluster_port" lineno="15908">
 <summary>
 Send UDP traffic on the cluster port.
 </summary>
@@ -20146,7 +20230,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
+<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923">
 <summary>
 Do not audit attempts to send UDP traffic on the cluster port.
 </summary>
@@ -20157,7 +20241,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15920">
+<interface name="corenet_udp_receive_cluster_port" lineno="15938">
 <summary>
 Receive UDP traffic on the cluster port.
 </summary>
@@ -20168,7 +20252,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
+<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953">
 <summary>
 Do not audit attempts to receive UDP traffic on the cluster port.
 </summary>
@@ -20179,7 +20263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
+<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968">
 <summary>
 Send and receive UDP traffic on the cluster port.
 </summary>
@@ -20190,7 +20274,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
+<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cluster port.
@@ -20202,7 +20286,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
+<interface name="corenet_tcp_bind_cluster_port" lineno="15999">
 <summary>
 Bind TCP sockets to the cluster port.
 </summary>
@@ -20213,7 +20297,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="16001">
+<interface name="corenet_udp_bind_cluster_port" lineno="16019">
 <summary>
 Bind UDP sockets to the cluster port.
 </summary>
@@ -20224,7 +20308,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
+<interface name="corenet_tcp_connect_cluster_port" lineno="16038">
 <summary>
 Make a TCP connection to the cluster port.
 </summary>
@@ -20234,7 +20318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_client_packets" lineno="16040">
+<interface name="corenet_send_cluster_client_packets" lineno="16058">
 <summary>
 Send cluster_client packets.
 </summary>
@@ -20245,7 +20329,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077">
 <summary>
 Do not audit attempts to send cluster_client packets.
 </summary>
@@ -20256,7 +20340,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="16078">
+<interface name="corenet_receive_cluster_client_packets" lineno="16096">
 <summary>
 Receive cluster_client packets.
 </summary>
@@ -20267,7 +20351,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115">
 <summary>
 Do not audit attempts to receive cluster_client packets.
 </summary>
@@ -20278,7 +20362,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134">
 <summary>
 Send and receive cluster_client packets.
 </summary>
@@ -20289,7 +20373,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150">
 <summary>
 Do not audit attempts to send and receive cluster_client packets.
 </summary>
@@ -20300,7 +20384,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="16165">
 <summary>
 Relabel packets to cluster_client the packet type.
 </summary>
@@ -20310,7 +20394,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_server_packets" lineno="16167">
+<interface name="corenet_send_cluster_server_packets" lineno="16185">
 <summary>
 Send cluster_server packets.
 </summary>
@@ -20321,7 +20405,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204">
 <summary>
 Do not audit attempts to send cluster_server packets.
 </summary>
@@ -20332,7 +20416,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="16205">
+<interface name="corenet_receive_cluster_server_packets" lineno="16223">
 <summary>
 Receive cluster_server packets.
 </summary>
@@ -20343,7 +20427,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242">
 <summary>
 Do not audit attempts to receive cluster_server packets.
 </summary>
@@ -20354,7 +20438,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261">
 <summary>
 Send and receive cluster_server packets.
 </summary>
@@ -20365,7 +20449,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277">
 <summary>
 Do not audit attempts to send and receive cluster_server packets.
 </summary>
@@ -20376,7 +20460,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="16292">
 <summary>
 Relabel packets to cluster_server the packet type.
 </summary>
@@ -20386,7 +20470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
+<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314">
 <summary>
 Send and receive TCP traffic on the cma port.
 </summary>
@@ -20397,7 +20481,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cma_port" lineno="16311">
+<interface name="corenet_udp_send_cma_port" lineno="16329">
 <summary>
 Send UDP traffic on the cma port.
 </summary>
@@ -20408,7 +20492,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
+<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344">
 <summary>
 Do not audit attempts to send UDP traffic on the cma port.
 </summary>
@@ -20419,7 +20503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cma_port" lineno="16341">
+<interface name="corenet_udp_receive_cma_port" lineno="16359">
 <summary>
 Receive UDP traffic on the cma port.
 </summary>
@@ -20430,7 +20514,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
+<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374">
 <summary>
 Do not audit attempts to receive UDP traffic on the cma port.
 </summary>
@@ -20441,7 +20525,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
+<interface name="corenet_udp_sendrecv_cma_port" lineno="16389">
 <summary>
 Send and receive UDP traffic on the cma port.
 </summary>
@@ -20452,7 +20536,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
+<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cma port.
@@ -20464,7 +20548,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="16402">
+<interface name="corenet_tcp_bind_cma_port" lineno="16420">
 <summary>
 Bind TCP sockets to the cma port.
 </summary>
@@ -20475,7 +20559,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cma_port" lineno="16422">
+<interface name="corenet_udp_bind_cma_port" lineno="16440">
 <summary>
 Bind UDP sockets to the cma port.
 </summary>
@@ -20486,7 +20570,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="16441">
+<interface name="corenet_tcp_connect_cma_port" lineno="16459">
 <summary>
 Make a TCP connection to the cma port.
 </summary>
@@ -20496,7 +20580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_client_packets" lineno="16461">
+<interface name="corenet_send_cma_client_packets" lineno="16479">
 <summary>
 Send cma_client packets.
 </summary>
@@ -20507,7 +20591,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498">
 <summary>
 Do not audit attempts to send cma_client packets.
 </summary>
@@ -20518,7 +20602,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_client_packets" lineno="16499">
+<interface name="corenet_receive_cma_client_packets" lineno="16517">
 <summary>
 Receive cma_client packets.
 </summary>
@@ -20529,7 +20613,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536">
 <summary>
 Do not audit attempts to receive cma_client packets.
 </summary>
@@ -20540,7 +20624,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="16555">
 <summary>
 Send and receive cma_client packets.
 </summary>
@@ -20551,7 +20635,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571">
 <summary>
 Do not audit attempts to send and receive cma_client packets.
 </summary>
@@ -20562,7 +20646,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
+<interface name="corenet_relabelto_cma_client_packets" lineno="16586">
 <summary>
 Relabel packets to cma_client the packet type.
 </summary>
@@ -20572,7 +20656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_server_packets" lineno="16588">
+<interface name="corenet_send_cma_server_packets" lineno="16606">
 <summary>
 Send cma_server packets.
 </summary>
@@ -20583,7 +20667,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625">
 <summary>
 Do not audit attempts to send cma_server packets.
 </summary>
@@ -20594,7 +20678,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16626">
+<interface name="corenet_receive_cma_server_packets" lineno="16644">
 <summary>
 Receive cma_server packets.
 </summary>
@@ -20605,7 +20689,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663">
 <summary>
 Do not audit attempts to receive cma_server packets.
 </summary>
@@ -20616,7 +20700,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="16682">
 <summary>
 Send and receive cma_server packets.
 </summary>
@@ -20627,7 +20711,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698">
 <summary>
 Do not audit attempts to send and receive cma_server packets.
 </summary>
@@ -20638,7 +20722,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
+<interface name="corenet_relabelto_cma_server_packets" lineno="16713">
 <summary>
 Relabel packets to cma_server the packet type.
 </summary>
@@ -20648,7 +20732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
+<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735">
 <summary>
 Send and receive TCP traffic on the cobbler port.
 </summary>
@@ -20659,7 +20743,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16732">
+<interface name="corenet_udp_send_cobbler_port" lineno="16750">
 <summary>
 Send UDP traffic on the cobbler port.
 </summary>
@@ -20670,7 +20754,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
+<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765">
 <summary>
 Do not audit attempts to send UDP traffic on the cobbler port.
 </summary>
@@ -20681,7 +20765,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
+<interface name="corenet_udp_receive_cobbler_port" lineno="16780">
 <summary>
 Receive UDP traffic on the cobbler port.
 </summary>
@@ -20692,7 +20776,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
+<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795">
 <summary>
 Do not audit attempts to receive UDP traffic on the cobbler port.
 </summary>
@@ -20703,7 +20787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
+<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810">
 <summary>
 Send and receive UDP traffic on the cobbler port.
 </summary>
@@ -20714,7 +20798,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
+<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cobbler port.
@@ -20726,7 +20810,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="16841">
 <summary>
 Bind TCP sockets to the cobbler port.
 </summary>
@@ -20737,7 +20821,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
+<interface name="corenet_udp_bind_cobbler_port" lineno="16861">
 <summary>
 Bind UDP sockets to the cobbler port.
 </summary>
@@ -20748,7 +20832,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="16880">
 <summary>
 Make a TCP connection to the cobbler port.
 </summary>
@@ -20758,7 +20842,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16882">
+<interface name="corenet_send_cobbler_client_packets" lineno="16900">
 <summary>
 Send cobbler_client packets.
 </summary>
@@ -20769,7 +20853,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919">
 <summary>
 Do not audit attempts to send cobbler_client packets.
 </summary>
@@ -20780,7 +20864,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
+<interface name="corenet_receive_cobbler_client_packets" lineno="16938">
 <summary>
 Receive cobbler_client packets.
 </summary>
@@ -20791,7 +20875,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957">
 <summary>
 Do not audit attempts to receive cobbler_client packets.
 </summary>
@@ -20802,7 +20886,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976">
 <summary>
 Send and receive cobbler_client packets.
 </summary>
@@ -20813,7 +20897,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992">
 <summary>
 Do not audit attempts to send and receive cobbler_client packets.
 </summary>
@@ -20824,7 +20908,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007">
 <summary>
 Relabel packets to cobbler_client the packet type.
 </summary>
@@ -20834,7 +20918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="17009">
+<interface name="corenet_send_cobbler_server_packets" lineno="17027">
 <summary>
 Send cobbler_server packets.
 </summary>
@@ -20845,7 +20929,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046">
 <summary>
 Do not audit attempts to send cobbler_server packets.
 </summary>
@@ -20856,7 +20940,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
+<interface name="corenet_receive_cobbler_server_packets" lineno="17065">
 <summary>
 Receive cobbler_server packets.
 </summary>
@@ -20867,7 +20951,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084">
 <summary>
 Do not audit attempts to receive cobbler_server packets.
 </summary>
@@ -20878,7 +20962,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103">
 <summary>
 Send and receive cobbler_server packets.
 </summary>
@@ -20889,7 +20973,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119">
 <summary>
 Do not audit attempts to send and receive cobbler_server packets.
 </summary>
@@ -20900,7 +20984,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134">
 <summary>
 Relabel packets to cobbler_server the packet type.
 </summary>
@@ -20910,7 +20994,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
+<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156">
 <summary>
 Send and receive TCP traffic on the commplex_link port.
 </summary>
@@ -20921,7 +21005,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
+<interface name="corenet_udp_send_commplex_link_port" lineno="17171">
 <summary>
 Send UDP traffic on the commplex_link port.
 </summary>
@@ -20932,7 +21016,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
+<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186">
 <summary>
 Do not audit attempts to send UDP traffic on the commplex_link port.
 </summary>
@@ -20943,7 +21027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
+<interface name="corenet_udp_receive_commplex_link_port" lineno="17201">
 <summary>
 Receive UDP traffic on the commplex_link port.
 </summary>
@@ -20954,7 +21038,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
+<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216">
 <summary>
 Do not audit attempts to receive UDP traffic on the commplex_link port.
 </summary>
@@ -20965,7 +21049,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
+<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231">
 <summary>
 Send and receive UDP traffic on the commplex_link port.
 </summary>
@@ -20976,7 +21060,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the commplex_link port.
@@ -20988,7 +21072,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262">
 <summary>
 Bind TCP sockets to the commplex_link port.
 </summary>
@@ -20999,7 +21083,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="17282">
 <summary>
 Bind UDP sockets to the commplex_link port.
 </summary>
@@ -21010,7 +21094,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301">
 <summary>
 Make a TCP connection to the commplex_link port.
 </summary>
@@ -21020,7 +21104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
+<interface name="corenet_send_commplex_link_client_packets" lineno="17321">
 <summary>
 Send commplex_link_client packets.
 </summary>
@@ -21031,7 +21115,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340">
 <summary>
 Do not audit attempts to send commplex_link_client packets.
 </summary>
@@ -21042,7 +21126,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="17359">
 <summary>
 Receive commplex_link_client packets.
 </summary>
@@ -21053,7 +21137,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378">
 <summary>
 Do not audit attempts to receive commplex_link_client packets.
 </summary>
@@ -21064,7 +21148,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397">
 <summary>
 Send and receive commplex_link_client packets.
 </summary>
@@ -21075,7 +21159,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413">
 <summary>
 Do not audit attempts to send and receive commplex_link_client packets.
 </summary>
@@ -21086,7 +21170,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428">
 <summary>
 Relabel packets to commplex_link_client the packet type.
 </summary>
@@ -21096,7 +21180,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
+<interface name="corenet_send_commplex_link_server_packets" lineno="17448">
 <summary>
 Send commplex_link_server packets.
 </summary>
@@ -21107,7 +21191,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467">
 <summary>
 Do not audit attempts to send commplex_link_server packets.
 </summary>
@@ -21118,7 +21202,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="17486">
 <summary>
 Receive commplex_link_server packets.
 </summary>
@@ -21129,7 +21213,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505">
 <summary>
 Do not audit attempts to receive commplex_link_server packets.
 </summary>
@@ -21140,7 +21224,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524">
 <summary>
 Send and receive commplex_link_server packets.
 </summary>
@@ -21151,7 +21235,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540">
 <summary>
 Do not audit attempts to send and receive commplex_link_server packets.
 </summary>
@@ -21162,7 +21246,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555">
 <summary>
 Relabel packets to commplex_link_server the packet type.
 </summary>
@@ -21172,7 +21256,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
+<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577">
 <summary>
 Send and receive TCP traffic on the commplex_main port.
 </summary>
@@ -21183,7 +21267,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
+<interface name="corenet_udp_send_commplex_main_port" lineno="17592">
 <summary>
 Send UDP traffic on the commplex_main port.
 </summary>
@@ -21194,7 +21278,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
+<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607">
 <summary>
 Do not audit attempts to send UDP traffic on the commplex_main port.
 </summary>
@@ -21205,7 +21289,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
+<interface name="corenet_udp_receive_commplex_main_port" lineno="17622">
 <summary>
 Receive UDP traffic on the commplex_main port.
 </summary>
@@ -21216,7 +21300,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
+<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637">
 <summary>
 Do not audit attempts to receive UDP traffic on the commplex_main port.
 </summary>
@@ -21227,7 +21311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
+<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652">
 <summary>
 Send and receive UDP traffic on the commplex_main port.
 </summary>
@@ -21238,7 +21322,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the commplex_main port.
@@ -21250,7 +21334,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683">
 <summary>
 Bind TCP sockets to the commplex_main port.
 </summary>
@@ -21261,7 +21345,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="17703">
 <summary>
 Bind UDP sockets to the commplex_main port.
 </summary>
@@ -21272,7 +21356,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722">
 <summary>
 Make a TCP connection to the commplex_main port.
 </summary>
@@ -21282,7 +21366,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
+<interface name="corenet_send_commplex_main_client_packets" lineno="17742">
 <summary>
 Send commplex_main_client packets.
 </summary>
@@ -21293,7 +21377,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761">
 <summary>
 Do not audit attempts to send commplex_main_client packets.
 </summary>
@@ -21304,7 +21388,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="17780">
 <summary>
 Receive commplex_main_client packets.
 </summary>
@@ -21315,7 +21399,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799">
 <summary>
 Do not audit attempts to receive commplex_main_client packets.
 </summary>
@@ -21326,7 +21410,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818">
 <summary>
 Send and receive commplex_main_client packets.
 </summary>
@@ -21337,7 +21421,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834">
 <summary>
 Do not audit attempts to send and receive commplex_main_client packets.
 </summary>
@@ -21348,7 +21432,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849">
 <summary>
 Relabel packets to commplex_main_client the packet type.
 </summary>
@@ -21358,7 +21442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
+<interface name="corenet_send_commplex_main_server_packets" lineno="17869">
 <summary>
 Send commplex_main_server packets.
 </summary>
@@ -21369,7 +21453,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888">
 <summary>
 Do not audit attempts to send commplex_main_server packets.
 </summary>
@@ -21380,7 +21464,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="17907">
 <summary>
 Receive commplex_main_server packets.
 </summary>
@@ -21391,7 +21475,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926">
 <summary>
 Do not audit attempts to receive commplex_main_server packets.
 </summary>
@@ -21402,7 +21486,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945">
 <summary>
 Send and receive commplex_main_server packets.
 </summary>
@@ -21413,7 +21497,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961">
 <summary>
 Do not audit attempts to send and receive commplex_main_server packets.
 </summary>
@@ -21424,7 +21508,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976">
 <summary>
 Relabel packets to commplex_main_server the packet type.
 </summary>
@@ -21434,7 +21518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
+<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998">
 <summary>
 Send and receive TCP traffic on the comsat port.
 </summary>
@@ -21445,7 +21529,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_comsat_port" lineno="17995">
+<interface name="corenet_udp_send_comsat_port" lineno="18013">
 <summary>
 Send UDP traffic on the comsat port.
 </summary>
@@ -21456,7 +21540,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
+<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028">
 <summary>
 Do not audit attempts to send UDP traffic on the comsat port.
 </summary>
@@ -21467,7 +21551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="18025">
+<interface name="corenet_udp_receive_comsat_port" lineno="18043">
 <summary>
 Receive UDP traffic on the comsat port.
 </summary>
@@ -21478,7 +21562,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
+<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058">
 <summary>
 Do not audit attempts to receive UDP traffic on the comsat port.
 </summary>
@@ -21489,7 +21573,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
+<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073">
 <summary>
 Send and receive UDP traffic on the comsat port.
 </summary>
@@ -21500,7 +21584,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
+<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the comsat port.
@@ -21512,7 +21596,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
+<interface name="corenet_tcp_bind_comsat_port" lineno="18104">
 <summary>
 Bind TCP sockets to the comsat port.
 </summary>
@@ -21523,7 +21607,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="18106">
+<interface name="corenet_udp_bind_comsat_port" lineno="18124">
 <summary>
 Bind UDP sockets to the comsat port.
 </summary>
@@ -21534,7 +21618,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
+<interface name="corenet_tcp_connect_comsat_port" lineno="18143">
 <summary>
 Make a TCP connection to the comsat port.
 </summary>
@@ -21544,7 +21628,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_client_packets" lineno="18145">
+<interface name="corenet_send_comsat_client_packets" lineno="18163">
 <summary>
 Send comsat_client packets.
 </summary>
@@ -21555,7 +21639,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182">
 <summary>
 Do not audit attempts to send comsat_client packets.
 </summary>
@@ -21566,7 +21650,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="18183">
+<interface name="corenet_receive_comsat_client_packets" lineno="18201">
 <summary>
 Receive comsat_client packets.
 </summary>
@@ -21577,7 +21661,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220">
 <summary>
 Do not audit attempts to receive comsat_client packets.
 </summary>
@@ -21588,7 +21672,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239">
 <summary>
 Send and receive comsat_client packets.
 </summary>
@@ -21599,7 +21683,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255">
 <summary>
 Do not audit attempts to send and receive comsat_client packets.
 </summary>
@@ -21610,7 +21694,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="18270">
 <summary>
 Relabel packets to comsat_client the packet type.
 </summary>
@@ -21620,7 +21704,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_server_packets" lineno="18272">
+<interface name="corenet_send_comsat_server_packets" lineno="18290">
 <summary>
 Send comsat_server packets.
 </summary>
@@ -21631,7 +21715,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309">
 <summary>
 Do not audit attempts to send comsat_server packets.
 </summary>
@@ -21642,7 +21726,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="18310">
+<interface name="corenet_receive_comsat_server_packets" lineno="18328">
 <summary>
 Receive comsat_server packets.
 </summary>
@@ -21653,7 +21737,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347">
 <summary>
 Do not audit attempts to receive comsat_server packets.
 </summary>
@@ -21664,7 +21748,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366">
 <summary>
 Send and receive comsat_server packets.
 </summary>
@@ -21675,7 +21759,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382">
 <summary>
 Do not audit attempts to send and receive comsat_server packets.
 </summary>
@@ -21686,7 +21770,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="18397">
 <summary>
 Relabel packets to comsat_server the packet type.
 </summary>
@@ -21696,7 +21780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
+<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419">
 <summary>
 Send and receive TCP traffic on the condor port.
 </summary>
@@ -21707,7 +21791,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_condor_port" lineno="18416">
+<interface name="corenet_udp_send_condor_port" lineno="18434">
 <summary>
 Send UDP traffic on the condor port.
 </summary>
@@ -21718,7 +21802,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
+<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449">
 <summary>
 Do not audit attempts to send UDP traffic on the condor port.
 </summary>
@@ -21729,7 +21813,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_condor_port" lineno="18446">
+<interface name="corenet_udp_receive_condor_port" lineno="18464">
 <summary>
 Receive UDP traffic on the condor port.
 </summary>
@@ -21740,7 +21824,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
+<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479">
 <summary>
 Do not audit attempts to receive UDP traffic on the condor port.
 </summary>
@@ -21751,7 +21835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
+<interface name="corenet_udp_sendrecv_condor_port" lineno="18494">
 <summary>
 Send and receive UDP traffic on the condor port.
 </summary>
@@ -21762,7 +21846,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
+<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the condor port.
@@ -21774,7 +21858,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="18507">
+<interface name="corenet_tcp_bind_condor_port" lineno="18525">
 <summary>
 Bind TCP sockets to the condor port.
 </summary>
@@ -21785,7 +21869,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_condor_port" lineno="18527">
+<interface name="corenet_udp_bind_condor_port" lineno="18545">
 <summary>
 Bind UDP sockets to the condor port.
 </summary>
@@ -21796,7 +21880,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18546">
+<interface name="corenet_tcp_connect_condor_port" lineno="18564">
 <summary>
 Make a TCP connection to the condor port.
 </summary>
@@ -21806,7 +21890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_client_packets" lineno="18566">
+<interface name="corenet_send_condor_client_packets" lineno="18584">
 <summary>
 Send condor_client packets.
 </summary>
@@ -21817,7 +21901,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603">
 <summary>
 Do not audit attempts to send condor_client packets.
 </summary>
@@ -21828,7 +21912,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18604">
+<interface name="corenet_receive_condor_client_packets" lineno="18622">
 <summary>
 Receive condor_client packets.
 </summary>
@@ -21839,7 +21923,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641">
 <summary>
 Do not audit attempts to receive condor_client packets.
 </summary>
@@ -21850,7 +21934,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="18660">
 <summary>
 Send and receive condor_client packets.
 </summary>
@@ -21861,7 +21945,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676">
 <summary>
 Do not audit attempts to send and receive condor_client packets.
 </summary>
@@ -21872,7 +21956,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
+<interface name="corenet_relabelto_condor_client_packets" lineno="18691">
 <summary>
 Relabel packets to condor_client the packet type.
 </summary>
@@ -21882,7 +21966,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_server_packets" lineno="18693">
+<interface name="corenet_send_condor_server_packets" lineno="18711">
 <summary>
 Send condor_server packets.
 </summary>
@@ -21893,7 +21977,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730">
 <summary>
 Do not audit attempts to send condor_server packets.
 </summary>
@@ -21904,7 +21988,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18731">
+<interface name="corenet_receive_condor_server_packets" lineno="18749">
 <summary>
 Receive condor_server packets.
 </summary>
@@ -21915,7 +21999,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768">
 <summary>
 Do not audit attempts to receive condor_server packets.
 </summary>
@@ -21926,7 +22010,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="18787">
 <summary>
 Send and receive condor_server packets.
 </summary>
@@ -21937,7 +22021,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803">
 <summary>
 Do not audit attempts to send and receive condor_server packets.
 </summary>
@@ -21948,7 +22032,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
+<interface name="corenet_relabelto_condor_server_packets" lineno="18818">
 <summary>
 Relabel packets to condor_server the packet type.
 </summary>
@@ -21958,7 +22042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
+<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840">
 <summary>
 Send and receive TCP traffic on the couchdb port.
 </summary>
@@ -21969,7 +22053,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18837">
+<interface name="corenet_udp_send_couchdb_port" lineno="18855">
 <summary>
 Send UDP traffic on the couchdb port.
 </summary>
@@ -21980,7 +22064,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
+<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870">
 <summary>
 Do not audit attempts to send UDP traffic on the couchdb port.
 </summary>
@@ -21991,7 +22075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
+<interface name="corenet_udp_receive_couchdb_port" lineno="18885">
 <summary>
 Receive UDP traffic on the couchdb port.
 </summary>
@@ -22002,7 +22086,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
+<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900">
 <summary>
 Do not audit attempts to receive UDP traffic on the couchdb port.
 </summary>
@@ -22013,7 +22097,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
+<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915">
 <summary>
 Send and receive UDP traffic on the couchdb port.
 </summary>
@@ -22024,7 +22108,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
+<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the couchdb port.
@@ -22036,7 +22120,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="18946">
 <summary>
 Bind TCP sockets to the couchdb port.
 </summary>
@@ -22047,7 +22131,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
+<interface name="corenet_udp_bind_couchdb_port" lineno="18966">
 <summary>
 Bind UDP sockets to the couchdb port.
 </summary>
@@ -22058,7 +22142,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="18985">
 <summary>
 Make a TCP connection to the couchdb port.
 </summary>
@@ -22068,7 +22152,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="18987">
+<interface name="corenet_send_couchdb_client_packets" lineno="19005">
 <summary>
 Send couchdb_client packets.
 </summary>
@@ -22079,7 +22163,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024">
 <summary>
 Do not audit attempts to send couchdb_client packets.
 </summary>
@@ -22090,7 +22174,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
+<interface name="corenet_receive_couchdb_client_packets" lineno="19043">
 <summary>
 Receive couchdb_client packets.
 </summary>
@@ -22101,7 +22185,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062">
 <summary>
 Do not audit attempts to receive couchdb_client packets.
 </summary>
@@ -22112,7 +22196,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081">
 <summary>
 Send and receive couchdb_client packets.
 </summary>
@@ -22123,7 +22207,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097">
 <summary>
 Do not audit attempts to send and receive couchdb_client packets.
 </summary>
@@ -22134,7 +22218,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112">
 <summary>
 Relabel packets to couchdb_client the packet type.
 </summary>
@@ -22144,7 +22228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="19114">
+<interface name="corenet_send_couchdb_server_packets" lineno="19132">
 <summary>
 Send couchdb_server packets.
 </summary>
@@ -22155,7 +22239,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151">
 <summary>
 Do not audit attempts to send couchdb_server packets.
 </summary>
@@ -22166,7 +22250,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
+<interface name="corenet_receive_couchdb_server_packets" lineno="19170">
 <summary>
 Receive couchdb_server packets.
 </summary>
@@ -22177,7 +22261,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189">
 <summary>
 Do not audit attempts to receive couchdb_server packets.
 </summary>
@@ -22188,7 +22272,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208">
 <summary>
 Send and receive couchdb_server packets.
 </summary>
@@ -22199,7 +22283,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224">
 <summary>
 Do not audit attempts to send and receive couchdb_server packets.
 </summary>
@@ -22210,7 +22294,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239">
 <summary>
 Relabel packets to couchdb_server the packet type.
 </summary>
@@ -22220,7 +22304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
+<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261">
 <summary>
 Send and receive TCP traffic on the cslistener port.
 </summary>
@@ -22231,7 +22315,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="19258">
+<interface name="corenet_udp_send_cslistener_port" lineno="19276">
 <summary>
 Send UDP traffic on the cslistener port.
 </summary>
@@ -22242,7 +22326,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
+<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291">
 <summary>
 Do not audit attempts to send UDP traffic on the cslistener port.
 </summary>
@@ -22253,7 +22337,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
+<interface name="corenet_udp_receive_cslistener_port" lineno="19306">
 <summary>
 Receive UDP traffic on the cslistener port.
 </summary>
@@ -22264,7 +22348,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
+<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321">
 <summary>
 Do not audit attempts to receive UDP traffic on the cslistener port.
 </summary>
@@ -22275,7 +22359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
+<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336">
 <summary>
 Send and receive UDP traffic on the cslistener port.
 </summary>
@@ -22286,7 +22370,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
+<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cslistener port.
@@ -22298,7 +22382,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="19367">
 <summary>
 Bind TCP sockets to the cslistener port.
 </summary>
@@ -22309,7 +22393,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
+<interface name="corenet_udp_bind_cslistener_port" lineno="19387">
 <summary>
 Bind UDP sockets to the cslistener port.
 </summary>
@@ -22320,7 +22404,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="19406">
 <summary>
 Make a TCP connection to the cslistener port.
 </summary>
@@ -22330,7 +22414,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="19408">
+<interface name="corenet_send_cslistener_client_packets" lineno="19426">
 <summary>
 Send cslistener_client packets.
 </summary>
@@ -22341,7 +22425,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445">
 <summary>
 Do not audit attempts to send cslistener_client packets.
 </summary>
@@ -22352,7 +22436,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
+<interface name="corenet_receive_cslistener_client_packets" lineno="19464">
 <summary>
 Receive cslistener_client packets.
 </summary>
@@ -22363,7 +22447,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483">
 <summary>
 Do not audit attempts to receive cslistener_client packets.
 </summary>
@@ -22374,7 +22458,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502">
 <summary>
 Send and receive cslistener_client packets.
 </summary>
@@ -22385,7 +22469,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518">
 <summary>
 Do not audit attempts to send and receive cslistener_client packets.
 </summary>
@@ -22396,7 +22480,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533">
 <summary>
 Relabel packets to cslistener_client the packet type.
 </summary>
@@ -22406,7 +22490,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="19535">
+<interface name="corenet_send_cslistener_server_packets" lineno="19553">
 <summary>
 Send cslistener_server packets.
 </summary>
@@ -22417,7 +22501,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572">
 <summary>
 Do not audit attempts to send cslistener_server packets.
 </summary>
@@ -22428,7 +22512,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
+<interface name="corenet_receive_cslistener_server_packets" lineno="19591">
 <summary>
 Receive cslistener_server packets.
 </summary>
@@ -22439,7 +22523,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610">
 <summary>
 Do not audit attempts to receive cslistener_server packets.
 </summary>
@@ -22450,7 +22534,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629">
 <summary>
 Send and receive cslistener_server packets.
 </summary>
@@ -22461,7 +22545,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645">
 <summary>
 Do not audit attempts to send and receive cslistener_server packets.
 </summary>
@@ -22472,7 +22556,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660">
 <summary>
 Relabel packets to cslistener_server the packet type.
 </summary>
@@ -22482,7 +22566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
+<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682">
 <summary>
 Send and receive TCP traffic on the ctdb port.
 </summary>
@@ -22493,7 +22577,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19679">
+<interface name="corenet_udp_send_ctdb_port" lineno="19697">
 <summary>
 Send UDP traffic on the ctdb port.
 </summary>
@@ -22504,7 +22588,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
+<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712">
 <summary>
 Do not audit attempts to send UDP traffic on the ctdb port.
 </summary>
@@ -22515,7 +22599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
+<interface name="corenet_udp_receive_ctdb_port" lineno="19727">
 <summary>
 Receive UDP traffic on the ctdb port.
 </summary>
@@ -22526,7 +22610,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
+<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742">
 <summary>
 Do not audit attempts to receive UDP traffic on the ctdb port.
 </summary>
@@ -22537,7 +22621,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
+<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757">
 <summary>
 Send and receive UDP traffic on the ctdb port.
 </summary>
@@ -22548,7 +22632,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
+<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ctdb port.
@@ -22560,7 +22644,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="19788">
 <summary>
 Bind TCP sockets to the ctdb port.
 </summary>
@@ -22571,7 +22655,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
+<interface name="corenet_udp_bind_ctdb_port" lineno="19808">
 <summary>
 Bind UDP sockets to the ctdb port.
 </summary>
@@ -22582,7 +22666,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="19827">
 <summary>
 Make a TCP connection to the ctdb port.
 </summary>
@@ -22592,7 +22676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19829">
+<interface name="corenet_send_ctdb_client_packets" lineno="19847">
 <summary>
 Send ctdb_client packets.
 </summary>
@@ -22603,7 +22687,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866">
 <summary>
 Do not audit attempts to send ctdb_client packets.
 </summary>
@@ -22614,7 +22698,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
+<interface name="corenet_receive_ctdb_client_packets" lineno="19885">
 <summary>
 Receive ctdb_client packets.
 </summary>
@@ -22625,7 +22709,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904">
 <summary>
 Do not audit attempts to receive ctdb_client packets.
 </summary>
@@ -22636,7 +22720,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923">
 <summary>
 Send and receive ctdb_client packets.
 </summary>
@@ -22647,7 +22731,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939">
 <summary>
 Do not audit attempts to send and receive ctdb_client packets.
 </summary>
@@ -22658,7 +22742,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954">
 <summary>
 Relabel packets to ctdb_client the packet type.
 </summary>
@@ -22668,7 +22752,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19956">
+<interface name="corenet_send_ctdb_server_packets" lineno="19974">
 <summary>
 Send ctdb_server packets.
 </summary>
@@ -22679,7 +22763,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993">
 <summary>
 Do not audit attempts to send ctdb_server packets.
 </summary>
@@ -22690,7 +22774,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
+<interface name="corenet_receive_ctdb_server_packets" lineno="20012">
 <summary>
 Receive ctdb_server packets.
 </summary>
@@ -22701,7 +22785,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031">
 <summary>
 Do not audit attempts to receive ctdb_server packets.
 </summary>
@@ -22712,7 +22796,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050">
 <summary>
 Send and receive ctdb_server packets.
 </summary>
@@ -22723,7 +22807,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066">
 <summary>
 Do not audit attempts to send and receive ctdb_server packets.
 </summary>
@@ -22734,7 +22818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081">
 <summary>
 Relabel packets to ctdb_server the packet type.
 </summary>
@@ -22744,7 +22828,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
+<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103">
 <summary>
 Send and receive TCP traffic on the cvs port.
 </summary>
@@ -22755,7 +22839,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cvs_port" lineno="20100">
+<interface name="corenet_udp_send_cvs_port" lineno="20118">
 <summary>
 Send UDP traffic on the cvs port.
 </summary>
@@ -22766,7 +22850,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
+<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133">
 <summary>
 Do not audit attempts to send UDP traffic on the cvs port.
 </summary>
@@ -22777,7 +22861,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="20130">
+<interface name="corenet_udp_receive_cvs_port" lineno="20148">
 <summary>
 Receive UDP traffic on the cvs port.
 </summary>
@@ -22788,7 +22872,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
+<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163">
 <summary>
 Do not audit attempts to receive UDP traffic on the cvs port.
 </summary>
@@ -22799,7 +22883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
+<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178">
 <summary>
 Send and receive UDP traffic on the cvs port.
 </summary>
@@ -22810,7 +22894,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
+<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cvs port.
@@ -22822,7 +22906,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
+<interface name="corenet_tcp_bind_cvs_port" lineno="20209">
 <summary>
 Bind TCP sockets to the cvs port.
 </summary>
@@ -22833,7 +22917,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="20211">
+<interface name="corenet_udp_bind_cvs_port" lineno="20229">
 <summary>
 Bind UDP sockets to the cvs port.
 </summary>
@@ -22844,7 +22928,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
+<interface name="corenet_tcp_connect_cvs_port" lineno="20248">
 <summary>
 Make a TCP connection to the cvs port.
 </summary>
@@ -22854,7 +22938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_client_packets" lineno="20250">
+<interface name="corenet_send_cvs_client_packets" lineno="20268">
 <summary>
 Send cvs_client packets.
 </summary>
@@ -22865,7 +22949,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287">
 <summary>
 Do not audit attempts to send cvs_client packets.
 </summary>
@@ -22876,7 +22960,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="20288">
+<interface name="corenet_receive_cvs_client_packets" lineno="20306">
 <summary>
 Receive cvs_client packets.
 </summary>
@@ -22887,7 +22971,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325">
 <summary>
 Do not audit attempts to receive cvs_client packets.
 </summary>
@@ -22898,7 +22982,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344">
 <summary>
 Send and receive cvs_client packets.
 </summary>
@@ -22909,7 +22993,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360">
 <summary>
 Do not audit attempts to send and receive cvs_client packets.
 </summary>
@@ -22920,7 +23004,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="20375">
 <summary>
 Relabel packets to cvs_client the packet type.
 </summary>
@@ -22930,7 +23014,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_server_packets" lineno="20377">
+<interface name="corenet_send_cvs_server_packets" lineno="20395">
 <summary>
 Send cvs_server packets.
 </summary>
@@ -22941,7 +23025,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414">
 <summary>
 Do not audit attempts to send cvs_server packets.
 </summary>
@@ -22952,7 +23036,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="20415">
+<interface name="corenet_receive_cvs_server_packets" lineno="20433">
 <summary>
 Receive cvs_server packets.
 </summary>
@@ -22963,7 +23047,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452">
 <summary>
 Do not audit attempts to receive cvs_server packets.
 </summary>
@@ -22974,7 +23058,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471">
 <summary>
 Send and receive cvs_server packets.
 </summary>
@@ -22985,7 +23069,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487">
 <summary>
 Do not audit attempts to send and receive cvs_server packets.
 </summary>
@@ -22996,7 +23080,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="20502">
 <summary>
 Relabel packets to cvs_server the packet type.
 </summary>
@@ -23006,7 +23090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
+<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524">
 <summary>
 Send and receive TCP traffic on the cyphesis port.
 </summary>
@@ -23017,7 +23101,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
+<interface name="corenet_udp_send_cyphesis_port" lineno="20539">
 <summary>
 Send UDP traffic on the cyphesis port.
 </summary>
@@ -23028,7 +23112,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
+<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554">
 <summary>
 Do not audit attempts to send UDP traffic on the cyphesis port.
 </summary>
@@ -23039,7 +23123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
+<interface name="corenet_udp_receive_cyphesis_port" lineno="20569">
 <summary>
 Receive UDP traffic on the cyphesis port.
 </summary>
@@ -23050,7 +23134,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
+<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584">
 <summary>
 Do not audit attempts to receive UDP traffic on the cyphesis port.
 </summary>
@@ -23061,7 +23145,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
+<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599">
 <summary>
 Send and receive UDP traffic on the cyphesis port.
 </summary>
@@ -23072,7 +23156,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
+<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the cyphesis port.
@@ -23084,7 +23168,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630">
 <summary>
 Bind TCP sockets to the cyphesis port.
 </summary>
@@ -23095,7 +23179,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="20650">
 <summary>
 Bind UDP sockets to the cyphesis port.
 </summary>
@@ -23106,7 +23190,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669">
 <summary>
 Make a TCP connection to the cyphesis port.
 </summary>
@@ -23116,7 +23200,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
+<interface name="corenet_send_cyphesis_client_packets" lineno="20689">
 <summary>
 Send cyphesis_client packets.
 </summary>
@@ -23127,7 +23211,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708">
 <summary>
 Do not audit attempts to send cyphesis_client packets.
 </summary>
@@ -23138,7 +23222,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="20727">
 <summary>
 Receive cyphesis_client packets.
 </summary>
@@ -23149,7 +23233,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746">
 <summary>
 Do not audit attempts to receive cyphesis_client packets.
 </summary>
@@ -23160,7 +23244,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765">
 <summary>
 Send and receive cyphesis_client packets.
 </summary>
@@ -23171,7 +23255,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781">
 <summary>
 Do not audit attempts to send and receive cyphesis_client packets.
 </summary>
@@ -23182,7 +23266,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796">
 <summary>
 Relabel packets to cyphesis_client the packet type.
 </summary>
@@ -23192,7 +23276,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
+<interface name="corenet_send_cyphesis_server_packets" lineno="20816">
 <summary>
 Send cyphesis_server packets.
 </summary>
@@ -23203,7 +23287,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835">
 <summary>
 Do not audit attempts to send cyphesis_server packets.
 </summary>
@@ -23214,7 +23298,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="20854">
 <summary>
 Receive cyphesis_server packets.
 </summary>
@@ -23225,7 +23309,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873">
 <summary>
 Do not audit attempts to receive cyphesis_server packets.
 </summary>
@@ -23236,7 +23320,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892">
 <summary>
 Send and receive cyphesis_server packets.
 </summary>
@@ -23247,7 +23331,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908">
 <summary>
 Do not audit attempts to send and receive cyphesis_server packets.
 </summary>
@@ -23258,7 +23342,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923">
 <summary>
 Relabel packets to cyphesis_server the packet type.
 </summary>
@@ -23268,7 +23352,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
+<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945">
 <summary>
 Send and receive TCP traffic on the daap port.
 </summary>
@@ -23279,7 +23363,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_daap_port" lineno="20942">
+<interface name="corenet_udp_send_daap_port" lineno="20960">
 <summary>
 Send UDP traffic on the daap port.
 </summary>
@@ -23290,7 +23374,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
+<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975">
 <summary>
 Do not audit attempts to send UDP traffic on the daap port.
 </summary>
@@ -23301,7 +23385,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20972">
+<interface name="corenet_udp_receive_daap_port" lineno="20990">
 <summary>
 Receive UDP traffic on the daap port.
 </summary>
@@ -23312,7 +23396,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
+<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005">
 <summary>
 Do not audit attempts to receive UDP traffic on the daap port.
 </summary>
@@ -23323,7 +23407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
+<interface name="corenet_udp_sendrecv_daap_port" lineno="21020">
 <summary>
 Send and receive UDP traffic on the daap port.
 </summary>
@@ -23334,7 +23418,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
+<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the daap port.
@@ -23346,7 +23430,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="21033">
+<interface name="corenet_tcp_bind_daap_port" lineno="21051">
 <summary>
 Bind TCP sockets to the daap port.
 </summary>
@@ -23357,7 +23441,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_daap_port" lineno="21053">
+<interface name="corenet_udp_bind_daap_port" lineno="21071">
 <summary>
 Bind UDP sockets to the daap port.
 </summary>
@@ -23368,7 +23452,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="21072">
+<interface name="corenet_tcp_connect_daap_port" lineno="21090">
 <summary>
 Make a TCP connection to the daap port.
 </summary>
@@ -23378,7 +23462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_client_packets" lineno="21092">
+<interface name="corenet_send_daap_client_packets" lineno="21110">
 <summary>
 Send daap_client packets.
 </summary>
@@ -23389,7 +23473,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129">
 <summary>
 Do not audit attempts to send daap_client packets.
 </summary>
@@ -23400,7 +23484,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_client_packets" lineno="21130">
+<interface name="corenet_receive_daap_client_packets" lineno="21148">
 <summary>
 Receive daap_client packets.
 </summary>
@@ -23411,7 +23495,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167">
 <summary>
 Do not audit attempts to receive daap_client packets.
 </summary>
@@ -23422,7 +23506,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="21186">
 <summary>
 Send and receive daap_client packets.
 </summary>
@@ -23433,7 +23517,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202">
 <summary>
 Do not audit attempts to send and receive daap_client packets.
 </summary>
@@ -23444,7 +23528,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
+<interface name="corenet_relabelto_daap_client_packets" lineno="21217">
 <summary>
 Relabel packets to daap_client the packet type.
 </summary>
@@ -23454,7 +23538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_server_packets" lineno="21219">
+<interface name="corenet_send_daap_server_packets" lineno="21237">
 <summary>
 Send daap_server packets.
 </summary>
@@ -23465,7 +23549,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256">
 <summary>
 Do not audit attempts to send daap_server packets.
 </summary>
@@ -23476,7 +23560,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_server_packets" lineno="21257">
+<interface name="corenet_receive_daap_server_packets" lineno="21275">
 <summary>
 Receive daap_server packets.
 </summary>
@@ -23487,7 +23571,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294">
 <summary>
 Do not audit attempts to receive daap_server packets.
 </summary>
@@ -23498,7 +23582,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="21313">
 <summary>
 Send and receive daap_server packets.
 </summary>
@@ -23509,7 +23593,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329">
 <summary>
 Do not audit attempts to send and receive daap_server packets.
 </summary>
@@ -23520,7 +23604,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
+<interface name="corenet_relabelto_daap_server_packets" lineno="21344">
 <summary>
 Relabel packets to daap_server the packet type.
 </summary>
@@ -23530,7 +23614,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
+<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366">
 <summary>
 Send and receive TCP traffic on the dbskkd port.
 </summary>
@@ -23541,7 +23625,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
+<interface name="corenet_udp_send_dbskkd_port" lineno="21381">
 <summary>
 Send UDP traffic on the dbskkd port.
 </summary>
@@ -23552,7 +23636,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
+<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396">
 <summary>
 Do not audit attempts to send UDP traffic on the dbskkd port.
 </summary>
@@ -23563,7 +23647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
+<interface name="corenet_udp_receive_dbskkd_port" lineno="21411">
 <summary>
 Receive UDP traffic on the dbskkd port.
 </summary>
@@ -23574,7 +23658,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
+<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426">
 <summary>
 Do not audit attempts to receive UDP traffic on the dbskkd port.
 </summary>
@@ -23585,7 +23669,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
+<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441">
 <summary>
 Send and receive UDP traffic on the dbskkd port.
 </summary>
@@ -23596,7 +23680,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
+<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dbskkd port.
@@ -23608,7 +23692,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472">
 <summary>
 Bind TCP sockets to the dbskkd port.
 </summary>
@@ -23619,7 +23703,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="21492">
 <summary>
 Bind UDP sockets to the dbskkd port.
 </summary>
@@ -23630,7 +23714,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511">
 <summary>
 Make a TCP connection to the dbskkd port.
 </summary>
@@ -23640,7 +23724,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
+<interface name="corenet_send_dbskkd_client_packets" lineno="21531">
 <summary>
 Send dbskkd_client packets.
 </summary>
@@ -23651,7 +23735,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550">
 <summary>
 Do not audit attempts to send dbskkd_client packets.
 </summary>
@@ -23662,7 +23746,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="21569">
 <summary>
 Receive dbskkd_client packets.
 </summary>
@@ -23673,7 +23757,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588">
 <summary>
 Do not audit attempts to receive dbskkd_client packets.
 </summary>
@@ -23684,7 +23768,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607">
 <summary>
 Send and receive dbskkd_client packets.
 </summary>
@@ -23695,7 +23779,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623">
 <summary>
 Do not audit attempts to send and receive dbskkd_client packets.
 </summary>
@@ -23706,7 +23790,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638">
 <summary>
 Relabel packets to dbskkd_client the packet type.
 </summary>
@@ -23716,7 +23800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
+<interface name="corenet_send_dbskkd_server_packets" lineno="21658">
 <summary>
 Send dbskkd_server packets.
 </summary>
@@ -23727,7 +23811,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677">
 <summary>
 Do not audit attempts to send dbskkd_server packets.
 </summary>
@@ -23738,7 +23822,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="21696">
 <summary>
 Receive dbskkd_server packets.
 </summary>
@@ -23749,7 +23833,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715">
 <summary>
 Do not audit attempts to receive dbskkd_server packets.
 </summary>
@@ -23760,7 +23844,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734">
 <summary>
 Send and receive dbskkd_server packets.
 </summary>
@@ -23771,7 +23855,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750">
 <summary>
 Do not audit attempts to send and receive dbskkd_server packets.
 </summary>
@@ -23782,7 +23866,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765">
 <summary>
 Relabel packets to dbskkd_server the packet type.
 </summary>
@@ -23792,7 +23876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
+<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787">
 <summary>
 Send and receive TCP traffic on the dcc port.
 </summary>
@@ -23803,7 +23887,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21784">
+<interface name="corenet_udp_send_dcc_port" lineno="21802">
 <summary>
 Send UDP traffic on the dcc port.
 </summary>
@@ -23814,7 +23898,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
+<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817">
 <summary>
 Do not audit attempts to send UDP traffic on the dcc port.
 </summary>
@@ -23825,7 +23909,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21814">
+<interface name="corenet_udp_receive_dcc_port" lineno="21832">
 <summary>
 Receive UDP traffic on the dcc port.
 </summary>
@@ -23836,7 +23920,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
+<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847">
 <summary>
 Do not audit attempts to receive UDP traffic on the dcc port.
 </summary>
@@ -23847,7 +23931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
+<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862">
 <summary>
 Send and receive UDP traffic on the dcc port.
 </summary>
@@ -23858,7 +23942,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
+<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dcc port.
@@ -23870,7 +23954,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
+<interface name="corenet_tcp_bind_dcc_port" lineno="21893">
 <summary>
 Bind TCP sockets to the dcc port.
 </summary>
@@ -23881,7 +23965,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21895">
+<interface name="corenet_udp_bind_dcc_port" lineno="21913">
 <summary>
 Bind UDP sockets to the dcc port.
 </summary>
@@ -23892,7 +23976,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
+<interface name="corenet_tcp_connect_dcc_port" lineno="21932">
 <summary>
 Make a TCP connection to the dcc port.
 </summary>
@@ -23902,7 +23986,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21934">
+<interface name="corenet_send_dcc_client_packets" lineno="21952">
 <summary>
 Send dcc_client packets.
 </summary>
@@ -23913,7 +23997,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971">
 <summary>
 Do not audit attempts to send dcc_client packets.
 </summary>
@@ -23924,7 +24008,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21972">
+<interface name="corenet_receive_dcc_client_packets" lineno="21990">
 <summary>
 Receive dcc_client packets.
 </summary>
@@ -23935,7 +24019,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009">
 <summary>
 Do not audit attempts to receive dcc_client packets.
 </summary>
@@ -23946,7 +24030,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028">
 <summary>
 Send and receive dcc_client packets.
 </summary>
@@ -23957,7 +24041,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044">
 <summary>
 Do not audit attempts to send and receive dcc_client packets.
 </summary>
@@ -23968,7 +24052,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="22059">
 <summary>
 Relabel packets to dcc_client the packet type.
 </summary>
@@ -23978,7 +24062,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_server_packets" lineno="22061">
+<interface name="corenet_send_dcc_server_packets" lineno="22079">
 <summary>
 Send dcc_server packets.
 </summary>
@@ -23989,7 +24073,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098">
 <summary>
 Do not audit attempts to send dcc_server packets.
 </summary>
@@ -24000,7 +24084,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="22099">
+<interface name="corenet_receive_dcc_server_packets" lineno="22117">
 <summary>
 Receive dcc_server packets.
 </summary>
@@ -24011,7 +24095,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136">
 <summary>
 Do not audit attempts to receive dcc_server packets.
 </summary>
@@ -24022,7 +24106,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155">
 <summary>
 Send and receive dcc_server packets.
 </summary>
@@ -24033,7 +24117,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171">
 <summary>
 Do not audit attempts to send and receive dcc_server packets.
 </summary>
@@ -24044,7 +24128,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="22186">
 <summary>
 Relabel packets to dcc_server the packet type.
 </summary>
@@ -24054,7 +24138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
+<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208">
 <summary>
 Send and receive TCP traffic on the dccm port.
 </summary>
@@ -24065,7 +24149,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dccm_port" lineno="22205">
+<interface name="corenet_udp_send_dccm_port" lineno="22223">
 <summary>
 Send UDP traffic on the dccm port.
 </summary>
@@ -24076,7 +24160,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
+<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238">
 <summary>
 Do not audit attempts to send UDP traffic on the dccm port.
 </summary>
@@ -24087,7 +24171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="22235">
+<interface name="corenet_udp_receive_dccm_port" lineno="22253">
 <summary>
 Receive UDP traffic on the dccm port.
 </summary>
@@ -24098,7 +24182,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
+<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268">
 <summary>
 Do not audit attempts to receive UDP traffic on the dccm port.
 </summary>
@@ -24109,7 +24193,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
+<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283">
 <summary>
 Send and receive UDP traffic on the dccm port.
 </summary>
@@ -24120,7 +24204,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
+<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dccm port.
@@ -24132,7 +24216,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
+<interface name="corenet_tcp_bind_dccm_port" lineno="22314">
 <summary>
 Bind TCP sockets to the dccm port.
 </summary>
@@ -24143,7 +24227,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="22316">
+<interface name="corenet_udp_bind_dccm_port" lineno="22334">
 <summary>
 Bind UDP sockets to the dccm port.
 </summary>
@@ -24154,7 +24238,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
+<interface name="corenet_tcp_connect_dccm_port" lineno="22353">
 <summary>
 Make a TCP connection to the dccm port.
 </summary>
@@ -24164,7 +24248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_client_packets" lineno="22355">
+<interface name="corenet_send_dccm_client_packets" lineno="22373">
 <summary>
 Send dccm_client packets.
 </summary>
@@ -24175,7 +24259,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392">
 <summary>
 Do not audit attempts to send dccm_client packets.
 </summary>
@@ -24186,7 +24270,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="22393">
+<interface name="corenet_receive_dccm_client_packets" lineno="22411">
 <summary>
 Receive dccm_client packets.
 </summary>
@@ -24197,7 +24281,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430">
 <summary>
 Do not audit attempts to receive dccm_client packets.
 </summary>
@@ -24208,7 +24292,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449">
 <summary>
 Send and receive dccm_client packets.
 </summary>
@@ -24219,7 +24303,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465">
 <summary>
 Do not audit attempts to send and receive dccm_client packets.
 </summary>
@@ -24230,7 +24314,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="22480">
 <summary>
 Relabel packets to dccm_client the packet type.
 </summary>
@@ -24240,7 +24324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_server_packets" lineno="22482">
+<interface name="corenet_send_dccm_server_packets" lineno="22500">
 <summary>
 Send dccm_server packets.
 </summary>
@@ -24251,7 +24335,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519">
 <summary>
 Do not audit attempts to send dccm_server packets.
 </summary>
@@ -24262,7 +24346,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="22520">
+<interface name="corenet_receive_dccm_server_packets" lineno="22538">
 <summary>
 Receive dccm_server packets.
 </summary>
@@ -24273,7 +24357,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557">
 <summary>
 Do not audit attempts to receive dccm_server packets.
 </summary>
@@ -24284,7 +24368,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576">
 <summary>
 Send and receive dccm_server packets.
 </summary>
@@ -24295,7 +24379,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592">
 <summary>
 Do not audit attempts to send and receive dccm_server packets.
 </summary>
@@ -24306,7 +24390,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="22607">
 <summary>
 Relabel packets to dccm_server the packet type.
 </summary>
@@ -24316,7 +24400,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
+<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629">
 <summary>
 Send and receive TCP traffic on the dhcpc port.
 </summary>
@@ -24327,7 +24411,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
+<interface name="corenet_udp_send_dhcpc_port" lineno="22644">
 <summary>
 Send UDP traffic on the dhcpc port.
 </summary>
@@ -24338,7 +24422,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
+<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659">
 <summary>
 Do not audit attempts to send UDP traffic on the dhcpc port.
 </summary>
@@ -24349,7 +24433,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
+<interface name="corenet_udp_receive_dhcpc_port" lineno="22674">
 <summary>
 Receive UDP traffic on the dhcpc port.
 </summary>
@@ -24360,7 +24444,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
+<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689">
 <summary>
 Do not audit attempts to receive UDP traffic on the dhcpc port.
 </summary>
@@ -24371,7 +24455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
+<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704">
 <summary>
 Send and receive UDP traffic on the dhcpc port.
 </summary>
@@ -24382,7 +24466,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dhcpc port.
@@ -24394,7 +24478,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735">
 <summary>
 Bind TCP sockets to the dhcpc port.
 </summary>
@@ -24405,7 +24489,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="22755">
 <summary>
 Bind UDP sockets to the dhcpc port.
 </summary>
@@ -24416,7 +24500,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774">
 <summary>
 Make a TCP connection to the dhcpc port.
 </summary>
@@ -24426,7 +24510,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
+<interface name="corenet_send_dhcpc_client_packets" lineno="22794">
 <summary>
 Send dhcpc_client packets.
 </summary>
@@ -24437,7 +24521,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813">
 <summary>
 Do not audit attempts to send dhcpc_client packets.
 </summary>
@@ -24448,7 +24532,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="22832">
 <summary>
 Receive dhcpc_client packets.
 </summary>
@@ -24459,7 +24543,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851">
 <summary>
 Do not audit attempts to receive dhcpc_client packets.
 </summary>
@@ -24470,7 +24554,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870">
 <summary>
 Send and receive dhcpc_client packets.
 </summary>
@@ -24481,7 +24565,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886">
 <summary>
 Do not audit attempts to send and receive dhcpc_client packets.
 </summary>
@@ -24492,7 +24576,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901">
 <summary>
 Relabel packets to dhcpc_client the packet type.
 </summary>
@@ -24502,7 +24586,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
+<interface name="corenet_send_dhcpc_server_packets" lineno="22921">
 <summary>
 Send dhcpc_server packets.
 </summary>
@@ -24513,7 +24597,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940">
 <summary>
 Do not audit attempts to send dhcpc_server packets.
 </summary>
@@ -24524,7 +24608,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="22959">
 <summary>
 Receive dhcpc_server packets.
 </summary>
@@ -24535,7 +24619,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978">
 <summary>
 Do not audit attempts to receive dhcpc_server packets.
 </summary>
@@ -24546,7 +24630,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997">
 <summary>
 Send and receive dhcpc_server packets.
 </summary>
@@ -24557,7 +24641,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013">
 <summary>
 Do not audit attempts to send and receive dhcpc_server packets.
 </summary>
@@ -24568,7 +24652,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028">
 <summary>
 Relabel packets to dhcpc_server the packet type.
 </summary>
@@ -24578,7 +24662,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
+<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050">
 <summary>
 Send and receive TCP traffic on the dhcpd port.
 </summary>
@@ -24589,7 +24673,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
+<interface name="corenet_udp_send_dhcpd_port" lineno="23065">
 <summary>
 Send UDP traffic on the dhcpd port.
 </summary>
@@ -24600,7 +24684,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
+<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080">
 <summary>
 Do not audit attempts to send UDP traffic on the dhcpd port.
 </summary>
@@ -24611,7 +24695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
+<interface name="corenet_udp_receive_dhcpd_port" lineno="23095">
 <summary>
 Receive UDP traffic on the dhcpd port.
 </summary>
@@ -24622,7 +24706,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
+<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110">
 <summary>
 Do not audit attempts to receive UDP traffic on the dhcpd port.
 </summary>
@@ -24633,7 +24717,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
+<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125">
 <summary>
 Send and receive UDP traffic on the dhcpd port.
 </summary>
@@ -24644,7 +24728,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dhcpd port.
@@ -24656,7 +24740,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156">
 <summary>
 Bind TCP sockets to the dhcpd port.
 </summary>
@@ -24667,7 +24751,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="23176">
 <summary>
 Bind UDP sockets to the dhcpd port.
 </summary>
@@ -24678,7 +24762,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195">
 <summary>
 Make a TCP connection to the dhcpd port.
 </summary>
@@ -24688,7 +24772,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
+<interface name="corenet_send_dhcpd_client_packets" lineno="23215">
 <summary>
 Send dhcpd_client packets.
 </summary>
@@ -24699,7 +24783,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234">
 <summary>
 Do not audit attempts to send dhcpd_client packets.
 </summary>
@@ -24710,7 +24794,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="23253">
 <summary>
 Receive dhcpd_client packets.
 </summary>
@@ -24721,7 +24805,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272">
 <summary>
 Do not audit attempts to receive dhcpd_client packets.
 </summary>
@@ -24732,7 +24816,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291">
 <summary>
 Send and receive dhcpd_client packets.
 </summary>
@@ -24743,7 +24827,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307">
 <summary>
 Do not audit attempts to send and receive dhcpd_client packets.
 </summary>
@@ -24754,7 +24838,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322">
 <summary>
 Relabel packets to dhcpd_client the packet type.
 </summary>
@@ -24764,7 +24848,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
+<interface name="corenet_send_dhcpd_server_packets" lineno="23342">
 <summary>
 Send dhcpd_server packets.
 </summary>
@@ -24775,7 +24859,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361">
 <summary>
 Do not audit attempts to send dhcpd_server packets.
 </summary>
@@ -24786,7 +24870,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="23380">
 <summary>
 Receive dhcpd_server packets.
 </summary>
@@ -24797,7 +24881,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399">
 <summary>
 Do not audit attempts to receive dhcpd_server packets.
 </summary>
@@ -24808,7 +24892,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418">
 <summary>
 Send and receive dhcpd_server packets.
 </summary>
@@ -24819,7 +24903,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434">
 <summary>
 Do not audit attempts to send and receive dhcpd_server packets.
 </summary>
@@ -24830,7 +24914,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449">
 <summary>
 Relabel packets to dhcpd_server the packet type.
 </summary>
@@ -24840,7 +24924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
+<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471">
 <summary>
 Send and receive TCP traffic on the dict port.
 </summary>
@@ -24851,7 +24935,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dict_port" lineno="23468">
+<interface name="corenet_udp_send_dict_port" lineno="23486">
 <summary>
 Send UDP traffic on the dict port.
 </summary>
@@ -24862,7 +24946,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
+<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501">
 <summary>
 Do not audit attempts to send UDP traffic on the dict port.
 </summary>
@@ -24873,7 +24957,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dict_port" lineno="23498">
+<interface name="corenet_udp_receive_dict_port" lineno="23516">
 <summary>
 Receive UDP traffic on the dict port.
 </summary>
@@ -24884,7 +24968,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
+<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531">
 <summary>
 Do not audit attempts to receive UDP traffic on the dict port.
 </summary>
@@ -24895,7 +24979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
+<interface name="corenet_udp_sendrecv_dict_port" lineno="23546">
 <summary>
 Send and receive UDP traffic on the dict port.
 </summary>
@@ -24906,7 +24990,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
+<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dict port.
@@ -24918,7 +25002,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23559">
+<interface name="corenet_tcp_bind_dict_port" lineno="23577">
 <summary>
 Bind TCP sockets to the dict port.
 </summary>
@@ -24929,7 +25013,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23579">
+<interface name="corenet_udp_bind_dict_port" lineno="23597">
 <summary>
 Bind UDP sockets to the dict port.
 </summary>
@@ -24940,7 +25024,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23598">
+<interface name="corenet_tcp_connect_dict_port" lineno="23616">
 <summary>
 Make a TCP connection to the dict port.
 </summary>
@@ -24950,7 +25034,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_client_packets" lineno="23618">
+<interface name="corenet_send_dict_client_packets" lineno="23636">
 <summary>
 Send dict_client packets.
 </summary>
@@ -24961,7 +25045,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655">
 <summary>
 Do not audit attempts to send dict_client packets.
 </summary>
@@ -24972,7 +25056,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23656">
+<interface name="corenet_receive_dict_client_packets" lineno="23674">
 <summary>
 Receive dict_client packets.
 </summary>
@@ -24983,7 +25067,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693">
 <summary>
 Do not audit attempts to receive dict_client packets.
 </summary>
@@ -24994,7 +25078,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="23712">
 <summary>
 Send and receive dict_client packets.
 </summary>
@@ -25005,7 +25089,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728">
 <summary>
 Do not audit attempts to send and receive dict_client packets.
 </summary>
@@ -25016,7 +25100,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
+<interface name="corenet_relabelto_dict_client_packets" lineno="23743">
 <summary>
 Relabel packets to dict_client the packet type.
 </summary>
@@ -25026,7 +25110,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_server_packets" lineno="23745">
+<interface name="corenet_send_dict_server_packets" lineno="23763">
 <summary>
 Send dict_server packets.
 </summary>
@@ -25037,7 +25121,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782">
 <summary>
 Do not audit attempts to send dict_server packets.
 </summary>
@@ -25048,7 +25132,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23783">
+<interface name="corenet_receive_dict_server_packets" lineno="23801">
 <summary>
 Receive dict_server packets.
 </summary>
@@ -25059,7 +25143,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820">
 <summary>
 Do not audit attempts to receive dict_server packets.
 </summary>
@@ -25070,7 +25154,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="23839">
 <summary>
 Send and receive dict_server packets.
 </summary>
@@ -25081,7 +25165,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855">
 <summary>
 Do not audit attempts to send and receive dict_server packets.
 </summary>
@@ -25092,7 +25176,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
+<interface name="corenet_relabelto_dict_server_packets" lineno="23870">
 <summary>
 Relabel packets to dict_server the packet type.
 </summary>
@@ -25102,7 +25186,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
+<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892">
 <summary>
 Send and receive TCP traffic on the distccd port.
 </summary>
@@ -25113,7 +25197,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23889">
+<interface name="corenet_udp_send_distccd_port" lineno="23907">
 <summary>
 Send UDP traffic on the distccd port.
 </summary>
@@ -25124,7 +25208,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
+<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922">
 <summary>
 Do not audit attempts to send UDP traffic on the distccd port.
 </summary>
@@ -25135,7 +25219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23919">
+<interface name="corenet_udp_receive_distccd_port" lineno="23937">
 <summary>
 Receive UDP traffic on the distccd port.
 </summary>
@@ -25146,7 +25230,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
+<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952">
 <summary>
 Do not audit attempts to receive UDP traffic on the distccd port.
 </summary>
@@ -25157,7 +25241,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
+<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967">
 <summary>
 Send and receive UDP traffic on the distccd port.
 </summary>
@@ -25168,7 +25252,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
+<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the distccd port.
@@ -25180,7 +25264,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
+<interface name="corenet_tcp_bind_distccd_port" lineno="23998">
 <summary>
 Bind TCP sockets to the distccd port.
 </summary>
@@ -25191,7 +25275,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="24000">
+<interface name="corenet_udp_bind_distccd_port" lineno="24018">
 <summary>
 Bind UDP sockets to the distccd port.
 </summary>
@@ -25202,7 +25286,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
+<interface name="corenet_tcp_connect_distccd_port" lineno="24037">
 <summary>
 Make a TCP connection to the distccd port.
 </summary>
@@ -25212,7 +25296,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_client_packets" lineno="24039">
+<interface name="corenet_send_distccd_client_packets" lineno="24057">
 <summary>
 Send distccd_client packets.
 </summary>
@@ -25223,7 +25307,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076">
 <summary>
 Do not audit attempts to send distccd_client packets.
 </summary>
@@ -25234,7 +25318,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="24077">
+<interface name="corenet_receive_distccd_client_packets" lineno="24095">
 <summary>
 Receive distccd_client packets.
 </summary>
@@ -25245,7 +25329,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114">
 <summary>
 Do not audit attempts to receive distccd_client packets.
 </summary>
@@ -25256,7 +25340,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133">
 <summary>
 Send and receive distccd_client packets.
 </summary>
@@ -25267,7 +25351,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149">
 <summary>
 Do not audit attempts to send and receive distccd_client packets.
 </summary>
@@ -25278,7 +25362,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="24164">
 <summary>
 Relabel packets to distccd_client the packet type.
 </summary>
@@ -25288,7 +25372,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_server_packets" lineno="24166">
+<interface name="corenet_send_distccd_server_packets" lineno="24184">
 <summary>
 Send distccd_server packets.
 </summary>
@@ -25299,7 +25383,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203">
 <summary>
 Do not audit attempts to send distccd_server packets.
 </summary>
@@ -25310,7 +25394,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="24204">
+<interface name="corenet_receive_distccd_server_packets" lineno="24222">
 <summary>
 Receive distccd_server packets.
 </summary>
@@ -25321,7 +25405,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241">
 <summary>
 Do not audit attempts to receive distccd_server packets.
 </summary>
@@ -25332,7 +25416,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260">
 <summary>
 Send and receive distccd_server packets.
 </summary>
@@ -25343,7 +25427,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276">
 <summary>
 Do not audit attempts to send and receive distccd_server packets.
 </summary>
@@ -25354,7 +25438,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="24291">
 <summary>
 Relabel packets to distccd_server the packet type.
 </summary>
@@ -25364,7 +25448,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
+<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313">
 <summary>
 Send and receive TCP traffic on the dns port.
 </summary>
@@ -25375,7 +25459,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dns_port" lineno="24310">
+<interface name="corenet_udp_send_dns_port" lineno="24328">
 <summary>
 Send UDP traffic on the dns port.
 </summary>
@@ -25386,7 +25470,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
+<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343">
 <summary>
 Do not audit attempts to send UDP traffic on the dns port.
 </summary>
@@ -25397,7 +25481,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dns_port" lineno="24340">
+<interface name="corenet_udp_receive_dns_port" lineno="24358">
 <summary>
 Receive UDP traffic on the dns port.
 </summary>
@@ -25408,7 +25492,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
+<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373">
 <summary>
 Do not audit attempts to receive UDP traffic on the dns port.
 </summary>
@@ -25419,7 +25503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
+<interface name="corenet_udp_sendrecv_dns_port" lineno="24388">
 <summary>
 Send and receive UDP traffic on the dns port.
 </summary>
@@ -25430,7 +25514,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
+<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dns port.
@@ -25442,7 +25526,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="24401">
+<interface name="corenet_tcp_bind_dns_port" lineno="24419">
 <summary>
 Bind TCP sockets to the dns port.
 </summary>
@@ -25453,7 +25537,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dns_port" lineno="24421">
+<interface name="corenet_udp_bind_dns_port" lineno="24439">
 <summary>
 Bind UDP sockets to the dns port.
 </summary>
@@ -25464,7 +25548,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="24440">
+<interface name="corenet_tcp_connect_dns_port" lineno="24458">
 <summary>
 Make a TCP connection to the dns port.
 </summary>
@@ -25474,7 +25558,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_client_packets" lineno="24460">
+<interface name="corenet_send_dns_client_packets" lineno="24478">
 <summary>
 Send dns_client packets.
 </summary>
@@ -25485,7 +25569,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497">
 <summary>
 Do not audit attempts to send dns_client packets.
 </summary>
@@ -25496,7 +25580,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_client_packets" lineno="24498">
+<interface name="corenet_receive_dns_client_packets" lineno="24516">
 <summary>
 Receive dns_client packets.
 </summary>
@@ -25507,7 +25591,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535">
 <summary>
 Do not audit attempts to receive dns_client packets.
 </summary>
@@ -25518,7 +25602,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="24554">
 <summary>
 Send and receive dns_client packets.
 </summary>
@@ -25529,7 +25613,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570">
 <summary>
 Do not audit attempts to send and receive dns_client packets.
 </summary>
@@ -25540,7 +25624,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
+<interface name="corenet_relabelto_dns_client_packets" lineno="24585">
 <summary>
 Relabel packets to dns_client the packet type.
 </summary>
@@ -25550,7 +25634,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_server_packets" lineno="24587">
+<interface name="corenet_send_dns_server_packets" lineno="24605">
 <summary>
 Send dns_server packets.
 </summary>
@@ -25561,7 +25645,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624">
 <summary>
 Do not audit attempts to send dns_server packets.
 </summary>
@@ -25572,7 +25656,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24625">
+<interface name="corenet_receive_dns_server_packets" lineno="24643">
 <summary>
 Receive dns_server packets.
 </summary>
@@ -25583,7 +25667,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662">
 <summary>
 Do not audit attempts to receive dns_server packets.
 </summary>
@@ -25594,7 +25678,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="24681">
 <summary>
 Send and receive dns_server packets.
 </summary>
@@ -25605,7 +25689,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697">
 <summary>
 Do not audit attempts to send and receive dns_server packets.
 </summary>
@@ -25616,7 +25700,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
+<interface name="corenet_relabelto_dns_server_packets" lineno="24712">
 <summary>
 Relabel packets to dns_server the packet type.
 </summary>
@@ -25626,7 +25710,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
+<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734">
 <summary>
 Send and receive TCP traffic on the dropbox port.
 </summary>
@@ -25637,7 +25721,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24731">
+<interface name="corenet_udp_send_dropbox_port" lineno="24749">
 <summary>
 Send UDP traffic on the dropbox port.
 </summary>
@@ -25648,7 +25732,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
+<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764">
 <summary>
 Do not audit attempts to send UDP traffic on the dropbox port.
 </summary>
@@ -25659,7 +25743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
+<interface name="corenet_udp_receive_dropbox_port" lineno="24779">
 <summary>
 Receive UDP traffic on the dropbox port.
 </summary>
@@ -25670,7 +25754,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
+<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794">
 <summary>
 Do not audit attempts to receive UDP traffic on the dropbox port.
 </summary>
@@ -25681,7 +25765,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
+<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809">
 <summary>
 Send and receive UDP traffic on the dropbox port.
 </summary>
@@ -25692,7 +25776,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
+<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the dropbox port.
@@ -25704,7 +25788,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="24840">
 <summary>
 Bind TCP sockets to the dropbox port.
 </summary>
@@ -25715,7 +25799,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
+<interface name="corenet_udp_bind_dropbox_port" lineno="24860">
 <summary>
 Bind UDP sockets to the dropbox port.
 </summary>
@@ -25726,7 +25810,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="24879">
 <summary>
 Make a TCP connection to the dropbox port.
 </summary>
@@ -25736,7 +25820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24881">
+<interface name="corenet_send_dropbox_client_packets" lineno="24899">
 <summary>
 Send dropbox_client packets.
 </summary>
@@ -25747,7 +25831,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918">
 <summary>
 Do not audit attempts to send dropbox_client packets.
 </summary>
@@ -25758,7 +25842,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
+<interface name="corenet_receive_dropbox_client_packets" lineno="24937">
 <summary>
 Receive dropbox_client packets.
 </summary>
@@ -25769,7 +25853,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956">
 <summary>
 Do not audit attempts to receive dropbox_client packets.
 </summary>
@@ -25780,7 +25864,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975">
 <summary>
 Send and receive dropbox_client packets.
 </summary>
@@ -25791,7 +25875,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991">
 <summary>
 Do not audit attempts to send and receive dropbox_client packets.
 </summary>
@@ -25802,7 +25886,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006">
 <summary>
 Relabel packets to dropbox_client the packet type.
 </summary>
@@ -25812,7 +25896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="25008">
+<interface name="corenet_send_dropbox_server_packets" lineno="25026">
 <summary>
 Send dropbox_server packets.
 </summary>
@@ -25823,7 +25907,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045">
 <summary>
 Do not audit attempts to send dropbox_server packets.
 </summary>
@@ -25834,7 +25918,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
+<interface name="corenet_receive_dropbox_server_packets" lineno="25064">
 <summary>
 Receive dropbox_server packets.
 </summary>
@@ -25845,7 +25929,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083">
 <summary>
 Do not audit attempts to receive dropbox_server packets.
 </summary>
@@ -25856,7 +25940,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102">
 <summary>
 Send and receive dropbox_server packets.
 </summary>
@@ -25867,7 +25951,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118">
 <summary>
 Do not audit attempts to send and receive dropbox_server packets.
 </summary>
@@ -25878,7 +25962,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133">
 <summary>
 Relabel packets to dropbox_server the packet type.
 </summary>
@@ -25888,7 +25972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
+<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155">
 <summary>
 Send and receive TCP traffic on the efs port.
 </summary>
@@ -25899,7 +25983,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_efs_port" lineno="25152">
+<interface name="corenet_udp_send_efs_port" lineno="25170">
 <summary>
 Send UDP traffic on the efs port.
 </summary>
@@ -25910,7 +25994,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
+<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185">
 <summary>
 Do not audit attempts to send UDP traffic on the efs port.
 </summary>
@@ -25921,7 +26005,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_efs_port" lineno="25182">
+<interface name="corenet_udp_receive_efs_port" lineno="25200">
 <summary>
 Receive UDP traffic on the efs port.
 </summary>
@@ -25932,7 +26016,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
+<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215">
 <summary>
 Do not audit attempts to receive UDP traffic on the efs port.
 </summary>
@@ -25943,7 +26027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
+<interface name="corenet_udp_sendrecv_efs_port" lineno="25230">
 <summary>
 Send and receive UDP traffic on the efs port.
 </summary>
@@ -25954,7 +26038,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
+<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the efs port.
@@ -25966,7 +26050,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="25243">
+<interface name="corenet_tcp_bind_efs_port" lineno="25261">
 <summary>
 Bind TCP sockets to the efs port.
 </summary>
@@ -25977,7 +26061,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_efs_port" lineno="25263">
+<interface name="corenet_udp_bind_efs_port" lineno="25281">
 <summary>
 Bind UDP sockets to the efs port.
 </summary>
@@ -25988,7 +26072,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="25282">
+<interface name="corenet_tcp_connect_efs_port" lineno="25300">
 <summary>
 Make a TCP connection to the efs port.
 </summary>
@@ -25998,7 +26082,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_client_packets" lineno="25302">
+<interface name="corenet_send_efs_client_packets" lineno="25320">
 <summary>
 Send efs_client packets.
 </summary>
@@ -26009,7 +26093,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339">
 <summary>
 Do not audit attempts to send efs_client packets.
 </summary>
@@ -26020,7 +26104,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_client_packets" lineno="25340">
+<interface name="corenet_receive_efs_client_packets" lineno="25358">
 <summary>
 Receive efs_client packets.
 </summary>
@@ -26031,7 +26115,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377">
 <summary>
 Do not audit attempts to receive efs_client packets.
 </summary>
@@ -26042,7 +26126,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="25396">
 <summary>
 Send and receive efs_client packets.
 </summary>
@@ -26053,7 +26137,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412">
 <summary>
 Do not audit attempts to send and receive efs_client packets.
 </summary>
@@ -26064,7 +26148,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
+<interface name="corenet_relabelto_efs_client_packets" lineno="25427">
 <summary>
 Relabel packets to efs_client the packet type.
 </summary>
@@ -26074,7 +26158,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_server_packets" lineno="25429">
+<interface name="corenet_send_efs_server_packets" lineno="25447">
 <summary>
 Send efs_server packets.
 </summary>
@@ -26085,7 +26169,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466">
 <summary>
 Do not audit attempts to send efs_server packets.
 </summary>
@@ -26096,7 +26180,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_server_packets" lineno="25467">
+<interface name="corenet_receive_efs_server_packets" lineno="25485">
 <summary>
 Receive efs_server packets.
 </summary>
@@ -26107,7 +26191,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504">
 <summary>
 Do not audit attempts to receive efs_server packets.
 </summary>
@@ -26118,7 +26202,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="25523">
 <summary>
 Send and receive efs_server packets.
 </summary>
@@ -26129,7 +26213,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539">
 <summary>
 Do not audit attempts to send and receive efs_server packets.
 </summary>
@@ -26140,7 +26224,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
+<interface name="corenet_relabelto_efs_server_packets" lineno="25554">
 <summary>
 Relabel packets to efs_server the packet type.
 </summary>
@@ -26150,7 +26234,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
+<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576">
 <summary>
 Send and receive TCP traffic on the embrace_dp_c port.
 </summary>
@@ -26161,7 +26245,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
+<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591">
 <summary>
 Send UDP traffic on the embrace_dp_c port.
 </summary>
@@ -26172,7 +26256,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
+<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606">
 <summary>
 Do not audit attempts to send UDP traffic on the embrace_dp_c port.
 </summary>
@@ -26183,7 +26267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
+<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621">
 <summary>
 Receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -26194,7 +26278,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
+<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636">
 <summary>
 Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -26205,7 +26289,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
+<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651">
 <summary>
 Send and receive UDP traffic on the embrace_dp_c port.
 </summary>
@@ -26216,7 +26300,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
+<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the embrace_dp_c port.
@@ -26228,7 +26312,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682">
 <summary>
 Bind TCP sockets to the embrace_dp_c port.
 </summary>
@@ -26239,7 +26323,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702">
 <summary>
 Bind UDP sockets to the embrace_dp_c port.
 </summary>
@@ -26250,7 +26334,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721">
 <summary>
 Make a TCP connection to the embrace_dp_c port.
 </summary>
@@ -26260,7 +26344,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741">
 <summary>
 Send embrace_dp_c_client packets.
 </summary>
@@ -26271,7 +26355,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760">
 <summary>
 Do not audit attempts to send embrace_dp_c_client packets.
 </summary>
@@ -26282,7 +26366,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779">
 <summary>
 Receive embrace_dp_c_client packets.
 </summary>
@@ -26293,7 +26377,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798">
 <summary>
 Do not audit attempts to receive embrace_dp_c_client packets.
 </summary>
@@ -26304,7 +26388,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817">
 <summary>
 Send and receive embrace_dp_c_client packets.
 </summary>
@@ -26315,7 +26399,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_client packets.
 </summary>
@@ -26326,7 +26410,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848">
 <summary>
 Relabel packets to embrace_dp_c_client the packet type.
 </summary>
@@ -26336,7 +26420,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868">
 <summary>
 Send embrace_dp_c_server packets.
 </summary>
@@ -26347,7 +26431,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887">
 <summary>
 Do not audit attempts to send embrace_dp_c_server packets.
 </summary>
@@ -26358,7 +26442,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906">
 <summary>
 Receive embrace_dp_c_server packets.
 </summary>
@@ -26369,7 +26453,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925">
 <summary>
 Do not audit attempts to receive embrace_dp_c_server packets.
 </summary>
@@ -26380,7 +26464,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944">
 <summary>
 Send and receive embrace_dp_c_server packets.
 </summary>
@@ -26391,7 +26475,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_server packets.
 </summary>
@@ -26402,7 +26486,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975">
 <summary>
 Relabel packets to embrace_dp_c_server the packet type.
 </summary>
@@ -26412,7 +26496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
+<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997">
 <summary>
 Send and receive TCP traffic on the epmap port.
 </summary>
@@ -26423,7 +26507,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_epmap_port" lineno="25994">
+<interface name="corenet_udp_send_epmap_port" lineno="26012">
 <summary>
 Send UDP traffic on the epmap port.
 </summary>
@@ -26434,7 +26518,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
+<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027">
 <summary>
 Do not audit attempts to send UDP traffic on the epmap port.
 </summary>
@@ -26445,7 +26529,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="26024">
+<interface name="corenet_udp_receive_epmap_port" lineno="26042">
 <summary>
 Receive UDP traffic on the epmap port.
 </summary>
@@ -26456,7 +26540,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
+<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057">
 <summary>
 Do not audit attempts to receive UDP traffic on the epmap port.
 </summary>
@@ -26467,7 +26551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
+<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072">
 <summary>
 Send and receive UDP traffic on the epmap port.
 </summary>
@@ -26478,7 +26562,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
+<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the epmap port.
@@ -26490,7 +26574,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
+<interface name="corenet_tcp_bind_epmap_port" lineno="26103">
 <summary>
 Bind TCP sockets to the epmap port.
 </summary>
@@ -26501,7 +26585,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="26105">
+<interface name="corenet_udp_bind_epmap_port" lineno="26123">
 <summary>
 Bind UDP sockets to the epmap port.
 </summary>
@@ -26512,7 +26596,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
+<interface name="corenet_tcp_connect_epmap_port" lineno="26142">
 <summary>
 Make a TCP connection to the epmap port.
 </summary>
@@ -26522,7 +26606,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_client_packets" lineno="26144">
+<interface name="corenet_send_epmap_client_packets" lineno="26162">
 <summary>
 Send epmap_client packets.
 </summary>
@@ -26533,7 +26617,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181">
 <summary>
 Do not audit attempts to send epmap_client packets.
 </summary>
@@ -26544,7 +26628,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="26182">
+<interface name="corenet_receive_epmap_client_packets" lineno="26200">
 <summary>
 Receive epmap_client packets.
 </summary>
@@ -26555,7 +26639,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219">
 <summary>
 Do not audit attempts to receive epmap_client packets.
 </summary>
@@ -26566,7 +26650,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238">
 <summary>
 Send and receive epmap_client packets.
 </summary>
@@ -26577,7 +26661,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254">
 <summary>
 Do not audit attempts to send and receive epmap_client packets.
 </summary>
@@ -26588,7 +26672,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="26269">
 <summary>
 Relabel packets to epmap_client the packet type.
 </summary>
@@ -26598,7 +26682,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_server_packets" lineno="26271">
+<interface name="corenet_send_epmap_server_packets" lineno="26289">
 <summary>
 Send epmap_server packets.
 </summary>
@@ -26609,7 +26693,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308">
 <summary>
 Do not audit attempts to send epmap_server packets.
 </summary>
@@ -26620,7 +26704,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="26309">
+<interface name="corenet_receive_epmap_server_packets" lineno="26327">
 <summary>
 Receive epmap_server packets.
 </summary>
@@ -26631,7 +26715,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346">
 <summary>
 Do not audit attempts to receive epmap_server packets.
 </summary>
@@ -26642,7 +26726,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365">
 <summary>
 Send and receive epmap_server packets.
 </summary>
@@ -26653,7 +26737,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381">
 <summary>
 Do not audit attempts to send and receive epmap_server packets.
 </summary>
@@ -26664,7 +26748,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="26396">
 <summary>
 Relabel packets to epmap_server the packet type.
 </summary>
@@ -26674,7 +26758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
+<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418">
 <summary>
 Send and receive TCP traffic on the epmd port.
 </summary>
@@ -26685,7 +26769,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_epmd_port" lineno="26415">
+<interface name="corenet_udp_send_epmd_port" lineno="26433">
 <summary>
 Send UDP traffic on the epmd port.
 </summary>
@@ -26696,7 +26780,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
+<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448">
 <summary>
 Do not audit attempts to send UDP traffic on the epmd port.
 </summary>
@@ -26707,7 +26791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="26445">
+<interface name="corenet_udp_receive_epmd_port" lineno="26463">
 <summary>
 Receive UDP traffic on the epmd port.
 </summary>
@@ -26718,7 +26802,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
+<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478">
 <summary>
 Do not audit attempts to receive UDP traffic on the epmd port.
 </summary>
@@ -26729,7 +26813,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
+<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493">
 <summary>
 Send and receive UDP traffic on the epmd port.
 </summary>
@@ -26740,7 +26824,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
+<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the epmd port.
@@ -26752,7 +26836,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
+<interface name="corenet_tcp_bind_epmd_port" lineno="26524">
 <summary>
 Bind TCP sockets to the epmd port.
 </summary>
@@ -26763,7 +26847,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="26526">
+<interface name="corenet_udp_bind_epmd_port" lineno="26544">
 <summary>
 Bind UDP sockets to the epmd port.
 </summary>
@@ -26774,7 +26858,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
+<interface name="corenet_tcp_connect_epmd_port" lineno="26563">
 <summary>
 Make a TCP connection to the epmd port.
 </summary>
@@ -26784,7 +26868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26565">
+<interface name="corenet_send_epmd_client_packets" lineno="26583">
 <summary>
 Send epmd_client packets.
 </summary>
@@ -26795,7 +26879,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602">
 <summary>
 Do not audit attempts to send epmd_client packets.
 </summary>
@@ -26806,7 +26890,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26603">
+<interface name="corenet_receive_epmd_client_packets" lineno="26621">
 <summary>
 Receive epmd_client packets.
 </summary>
@@ -26817,7 +26901,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640">
 <summary>
 Do not audit attempts to receive epmd_client packets.
 </summary>
@@ -26828,7 +26912,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659">
 <summary>
 Send and receive epmd_client packets.
 </summary>
@@ -26839,7 +26923,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675">
 <summary>
 Do not audit attempts to send and receive epmd_client packets.
 </summary>
@@ -26850,7 +26934,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="26690">
 <summary>
 Relabel packets to epmd_client the packet type.
 </summary>
@@ -26860,7 +26944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26692">
+<interface name="corenet_send_epmd_server_packets" lineno="26710">
 <summary>
 Send epmd_server packets.
 </summary>
@@ -26871,7 +26955,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729">
 <summary>
 Do not audit attempts to send epmd_server packets.
 </summary>
@@ -26882,7 +26966,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26730">
+<interface name="corenet_receive_epmd_server_packets" lineno="26748">
 <summary>
 Receive epmd_server packets.
 </summary>
@@ -26893,7 +26977,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767">
 <summary>
 Do not audit attempts to receive epmd_server packets.
 </summary>
@@ -26904,7 +26988,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786">
 <summary>
 Send and receive epmd_server packets.
 </summary>
@@ -26915,7 +26999,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802">
 <summary>
 Do not audit attempts to send and receive epmd_server packets.
 </summary>
@@ -26926,7 +27010,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="26817">
 <summary>
 Relabel packets to epmd_server the packet type.
 </summary>
@@ -26936,7 +27020,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
+<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839">
 <summary>
 Send and receive TCP traffic on the fingerd port.
 </summary>
@@ -26947,7 +27031,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26836">
+<interface name="corenet_udp_send_fingerd_port" lineno="26854">
 <summary>
 Send UDP traffic on the fingerd port.
 </summary>
@@ -26958,7 +27042,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
+<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869">
 <summary>
 Do not audit attempts to send UDP traffic on the fingerd port.
 </summary>
@@ -26969,7 +27053,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
+<interface name="corenet_udp_receive_fingerd_port" lineno="26884">
 <summary>
 Receive UDP traffic on the fingerd port.
 </summary>
@@ -26980,7 +27064,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
+<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899">
 <summary>
 Do not audit attempts to receive UDP traffic on the fingerd port.
 </summary>
@@ -26991,7 +27075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
+<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914">
 <summary>
 Send and receive UDP traffic on the fingerd port.
 </summary>
@@ -27002,7 +27086,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
+<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the fingerd port.
@@ -27014,7 +27098,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="26945">
 <summary>
 Bind TCP sockets to the fingerd port.
 </summary>
@@ -27025,7 +27109,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
+<interface name="corenet_udp_bind_fingerd_port" lineno="26965">
 <summary>
 Bind UDP sockets to the fingerd port.
 </summary>
@@ -27036,7 +27120,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="26984">
 <summary>
 Make a TCP connection to the fingerd port.
 </summary>
@@ -27046,7 +27130,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="26986">
+<interface name="corenet_send_fingerd_client_packets" lineno="27004">
 <summary>
 Send fingerd_client packets.
 </summary>
@@ -27057,7 +27141,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023">
 <summary>
 Do not audit attempts to send fingerd_client packets.
 </summary>
@@ -27068,7 +27152,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
+<interface name="corenet_receive_fingerd_client_packets" lineno="27042">
 <summary>
 Receive fingerd_client packets.
 </summary>
@@ -27079,7 +27163,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061">
 <summary>
 Do not audit attempts to receive fingerd_client packets.
 </summary>
@@ -27090,7 +27174,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080">
 <summary>
 Send and receive fingerd_client packets.
 </summary>
@@ -27101,7 +27185,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096">
 <summary>
 Do not audit attempts to send and receive fingerd_client packets.
 </summary>
@@ -27112,7 +27196,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111">
 <summary>
 Relabel packets to fingerd_client the packet type.
 </summary>
@@ -27122,7 +27206,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="27113">
+<interface name="corenet_send_fingerd_server_packets" lineno="27131">
 <summary>
 Send fingerd_server packets.
 </summary>
@@ -27133,7 +27217,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150">
 <summary>
 Do not audit attempts to send fingerd_server packets.
 </summary>
@@ -27144,7 +27228,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
+<interface name="corenet_receive_fingerd_server_packets" lineno="27169">
 <summary>
 Receive fingerd_server packets.
 </summary>
@@ -27155,7 +27239,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188">
 <summary>
 Do not audit attempts to receive fingerd_server packets.
 </summary>
@@ -27166,7 +27250,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207">
 <summary>
 Send and receive fingerd_server packets.
 </summary>
@@ -27177,7 +27261,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223">
 <summary>
 Do not audit attempts to send and receive fingerd_server packets.
 </summary>
@@ -27188,7 +27272,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238">
 <summary>
 Relabel packets to fingerd_server the packet type.
 </summary>
@@ -27198,7 +27282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
+<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260">
 <summary>
 Send and receive TCP traffic on the ftp port.
 </summary>
@@ -27209,7 +27293,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ftp_port" lineno="27257">
+<interface name="corenet_udp_send_ftp_port" lineno="27275">
 <summary>
 Send UDP traffic on the ftp port.
 </summary>
@@ -27220,7 +27304,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
+<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290">
 <summary>
 Do not audit attempts to send UDP traffic on the ftp port.
 </summary>
@@ -27231,7 +27315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="27287">
+<interface name="corenet_udp_receive_ftp_port" lineno="27305">
 <summary>
 Receive UDP traffic on the ftp port.
 </summary>
@@ -27242,7 +27326,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
+<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320">
 <summary>
 Do not audit attempts to receive UDP traffic on the ftp port.
 </summary>
@@ -27253,7 +27337,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
+<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335">
 <summary>
 Send and receive UDP traffic on the ftp port.
 </summary>
@@ -27264,7 +27348,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ftp port.
@@ -27276,7 +27360,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
+<interface name="corenet_tcp_bind_ftp_port" lineno="27366">
 <summary>
 Bind TCP sockets to the ftp port.
 </summary>
@@ -27287,7 +27371,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="27368">
+<interface name="corenet_udp_bind_ftp_port" lineno="27386">
 <summary>
 Bind UDP sockets to the ftp port.
 </summary>
@@ -27298,7 +27382,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
+<interface name="corenet_tcp_connect_ftp_port" lineno="27405">
 <summary>
 Make a TCP connection to the ftp port.
 </summary>
@@ -27308,7 +27392,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_client_packets" lineno="27407">
+<interface name="corenet_send_ftp_client_packets" lineno="27425">
 <summary>
 Send ftp_client packets.
 </summary>
@@ -27319,7 +27403,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444">
 <summary>
 Do not audit attempts to send ftp_client packets.
 </summary>
@@ -27330,7 +27414,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="27445">
+<interface name="corenet_receive_ftp_client_packets" lineno="27463">
 <summary>
 Receive ftp_client packets.
 </summary>
@@ -27341,7 +27425,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482">
 <summary>
 Do not audit attempts to receive ftp_client packets.
 </summary>
@@ -27352,7 +27436,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501">
 <summary>
 Send and receive ftp_client packets.
 </summary>
@@ -27363,7 +27447,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517">
 <summary>
 Do not audit attempts to send and receive ftp_client packets.
 </summary>
@@ -27374,7 +27458,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="27532">
 <summary>
 Relabel packets to ftp_client the packet type.
 </summary>
@@ -27384,7 +27468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_server_packets" lineno="27534">
+<interface name="corenet_send_ftp_server_packets" lineno="27552">
 <summary>
 Send ftp_server packets.
 </summary>
@@ -27395,7 +27479,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571">
 <summary>
 Do not audit attempts to send ftp_server packets.
 </summary>
@@ -27406,7 +27490,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27572">
+<interface name="corenet_receive_ftp_server_packets" lineno="27590">
 <summary>
 Receive ftp_server packets.
 </summary>
@@ -27417,7 +27501,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609">
 <summary>
 Do not audit attempts to receive ftp_server packets.
 </summary>
@@ -27428,7 +27512,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628">
 <summary>
 Send and receive ftp_server packets.
 </summary>
@@ -27439,7 +27523,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644">
 <summary>
 Do not audit attempts to send and receive ftp_server packets.
 </summary>
@@ -27450,7 +27534,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="27659">
 <summary>
 Relabel packets to ftp_server the packet type.
 </summary>
@@ -27460,7 +27544,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
+<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681">
 <summary>
 Send and receive TCP traffic on the ftp_data port.
 </summary>
@@ -27471,7 +27555,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
+<interface name="corenet_udp_send_ftp_data_port" lineno="27696">
 <summary>
 Send UDP traffic on the ftp_data port.
 </summary>
@@ -27482,7 +27566,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
+<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711">
 <summary>
 Do not audit attempts to send UDP traffic on the ftp_data port.
 </summary>
@@ -27493,7 +27577,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
+<interface name="corenet_udp_receive_ftp_data_port" lineno="27726">
 <summary>
 Receive UDP traffic on the ftp_data port.
 </summary>
@@ -27504,7 +27588,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
+<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741">
 <summary>
 Do not audit attempts to receive UDP traffic on the ftp_data port.
 </summary>
@@ -27515,7 +27599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
+<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756">
 <summary>
 Send and receive UDP traffic on the ftp_data port.
 </summary>
@@ -27526,7 +27610,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ftp_data port.
@@ -27538,7 +27622,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787">
 <summary>
 Bind TCP sockets to the ftp_data port.
 </summary>
@@ -27549,7 +27633,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="27807">
 <summary>
 Bind UDP sockets to the ftp_data port.
 </summary>
@@ -27560,7 +27644,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826">
 <summary>
 Make a TCP connection to the ftp_data port.
 </summary>
@@ -27570,7 +27654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
+<interface name="corenet_send_ftp_data_client_packets" lineno="27846">
 <summary>
 Send ftp_data_client packets.
 </summary>
@@ -27581,7 +27665,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865">
 <summary>
 Do not audit attempts to send ftp_data_client packets.
 </summary>
@@ -27592,7 +27676,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="27884">
 <summary>
 Receive ftp_data_client packets.
 </summary>
@@ -27603,7 +27687,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903">
 <summary>
 Do not audit attempts to receive ftp_data_client packets.
 </summary>
@@ -27614,7 +27698,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922">
 <summary>
 Send and receive ftp_data_client packets.
 </summary>
@@ -27625,7 +27709,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938">
 <summary>
 Do not audit attempts to send and receive ftp_data_client packets.
 </summary>
@@ -27636,7 +27720,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953">
 <summary>
 Relabel packets to ftp_data_client the packet type.
 </summary>
@@ -27646,7 +27730,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
+<interface name="corenet_send_ftp_data_server_packets" lineno="27973">
 <summary>
 Send ftp_data_server packets.
 </summary>
@@ -27657,7 +27741,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992">
 <summary>
 Do not audit attempts to send ftp_data_server packets.
 </summary>
@@ -27668,7 +27752,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="28011">
 <summary>
 Receive ftp_data_server packets.
 </summary>
@@ -27679,7 +27763,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030">
 <summary>
 Do not audit attempts to receive ftp_data_server packets.
 </summary>
@@ -27690,7 +27774,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049">
 <summary>
 Send and receive ftp_data_server packets.
 </summary>
@@ -27701,7 +27785,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065">
 <summary>
 Do not audit attempts to send and receive ftp_data_server packets.
 </summary>
@@ -27712,7 +27796,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080">
 <summary>
 Relabel packets to ftp_data_server the packet type.
 </summary>
@@ -27722,7 +27806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
+<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102">
 <summary>
 Send and receive TCP traffic on the gatekeeper port.
 </summary>
@@ -27733,7 +27817,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
+<interface name="corenet_udp_send_gatekeeper_port" lineno="28117">
 <summary>
 Send UDP traffic on the gatekeeper port.
 </summary>
@@ -27744,7 +27828,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
+<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132">
 <summary>
 Do not audit attempts to send UDP traffic on the gatekeeper port.
 </summary>
@@ -27755,7 +27839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
+<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147">
 <summary>
 Receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27766,7 +27850,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
+<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162">
 <summary>
 Do not audit attempts to receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27777,7 +27861,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
+<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177">
 <summary>
 Send and receive UDP traffic on the gatekeeper port.
 </summary>
@@ -27788,7 +27872,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
+<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gatekeeper port.
@@ -27800,7 +27884,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208">
 <summary>
 Bind TCP sockets to the gatekeeper port.
 </summary>
@@ -27811,7 +27895,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228">
 <summary>
 Bind UDP sockets to the gatekeeper port.
 </summary>
@@ -27822,7 +27906,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247">
 <summary>
 Make a TCP connection to the gatekeeper port.
 </summary>
@@ -27832,7 +27916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="28267">
 <summary>
 Send gatekeeper_client packets.
 </summary>
@@ -27843,7 +27927,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286">
 <summary>
 Do not audit attempts to send gatekeeper_client packets.
 </summary>
@@ -27854,7 +27938,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305">
 <summary>
 Receive gatekeeper_client packets.
 </summary>
@@ -27865,7 +27949,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324">
 <summary>
 Do not audit attempts to receive gatekeeper_client packets.
 </summary>
@@ -27876,7 +27960,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343">
 <summary>
 Send and receive gatekeeper_client packets.
 </summary>
@@ -27887,7 +27971,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359">
 <summary>
 Do not audit attempts to send and receive gatekeeper_client packets.
 </summary>
@@ -27898,7 +27982,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374">
 <summary>
 Relabel packets to gatekeeper_client the packet type.
 </summary>
@@ -27908,7 +27992,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="28394">
 <summary>
 Send gatekeeper_server packets.
 </summary>
@@ -27919,7 +28003,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413">
 <summary>
 Do not audit attempts to send gatekeeper_server packets.
 </summary>
@@ -27930,7 +28014,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432">
 <summary>
 Receive gatekeeper_server packets.
 </summary>
@@ -27941,7 +28025,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451">
 <summary>
 Do not audit attempts to receive gatekeeper_server packets.
 </summary>
@@ -27952,7 +28036,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470">
 <summary>
 Send and receive gatekeeper_server packets.
 </summary>
@@ -27963,7 +28047,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486">
 <summary>
 Do not audit attempts to send and receive gatekeeper_server packets.
 </summary>
@@ -27974,7 +28058,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501">
 <summary>
 Relabel packets to gatekeeper_server the packet type.
 </summary>
@@ -27984,7 +28068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
+<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523">
 <summary>
 Send and receive TCP traffic on the gdomap port.
 </summary>
@@ -27995,7 +28079,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="28520">
+<interface name="corenet_udp_send_gdomap_port" lineno="28538">
 <summary>
 Send UDP traffic on the gdomap port.
 </summary>
@@ -28006,7 +28090,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
+<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553">
 <summary>
 Do not audit attempts to send UDP traffic on the gdomap port.
 </summary>
@@ -28017,7 +28101,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
+<interface name="corenet_udp_receive_gdomap_port" lineno="28568">
 <summary>
 Receive UDP traffic on the gdomap port.
 </summary>
@@ -28028,7 +28112,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
+<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583">
 <summary>
 Do not audit attempts to receive UDP traffic on the gdomap port.
 </summary>
@@ -28039,7 +28123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
+<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598">
 <summary>
 Send and receive UDP traffic on the gdomap port.
 </summary>
@@ -28050,7 +28134,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
+<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gdomap port.
@@ -28062,7 +28146,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="28629">
 <summary>
 Bind TCP sockets to the gdomap port.
 </summary>
@@ -28073,7 +28157,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
+<interface name="corenet_udp_bind_gdomap_port" lineno="28649">
 <summary>
 Bind UDP sockets to the gdomap port.
 </summary>
@@ -28084,7 +28168,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="28668">
 <summary>
 Make a TCP connection to the gdomap port.
 </summary>
@@ -28094,7 +28178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28670">
+<interface name="corenet_send_gdomap_client_packets" lineno="28688">
 <summary>
 Send gdomap_client packets.
 </summary>
@@ -28105,7 +28189,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707">
 <summary>
 Do not audit attempts to send gdomap_client packets.
 </summary>
@@ -28116,7 +28200,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
+<interface name="corenet_receive_gdomap_client_packets" lineno="28726">
 <summary>
 Receive gdomap_client packets.
 </summary>
@@ -28127,7 +28211,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745">
 <summary>
 Do not audit attempts to receive gdomap_client packets.
 </summary>
@@ -28138,7 +28222,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764">
 <summary>
 Send and receive gdomap_client packets.
 </summary>
@@ -28149,7 +28233,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780">
 <summary>
 Do not audit attempts to send and receive gdomap_client packets.
 </summary>
@@ -28160,7 +28244,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795">
 <summary>
 Relabel packets to gdomap_client the packet type.
 </summary>
@@ -28170,7 +28254,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28797">
+<interface name="corenet_send_gdomap_server_packets" lineno="28815">
 <summary>
 Send gdomap_server packets.
 </summary>
@@ -28181,7 +28265,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834">
 <summary>
 Do not audit attempts to send gdomap_server packets.
 </summary>
@@ -28192,7 +28276,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
+<interface name="corenet_receive_gdomap_server_packets" lineno="28853">
 <summary>
 Receive gdomap_server packets.
 </summary>
@@ -28203,7 +28287,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872">
 <summary>
 Do not audit attempts to receive gdomap_server packets.
 </summary>
@@ -28214,7 +28298,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891">
 <summary>
 Send and receive gdomap_server packets.
 </summary>
@@ -28225,7 +28309,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907">
 <summary>
 Do not audit attempts to send and receive gdomap_server packets.
 </summary>
@@ -28236,7 +28320,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922">
 <summary>
 Relabel packets to gdomap_server the packet type.
 </summary>
@@ -28246,7 +28330,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
+<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944">
 <summary>
 Send and receive TCP traffic on the gds_db port.
 </summary>
@@ -28257,7 +28341,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28941">
+<interface name="corenet_udp_send_gds_db_port" lineno="28959">
 <summary>
 Send UDP traffic on the gds_db port.
 </summary>
@@ -28268,7 +28352,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
+<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974">
 <summary>
 Do not audit attempts to send UDP traffic on the gds_db port.
 </summary>
@@ -28279,7 +28363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
+<interface name="corenet_udp_receive_gds_db_port" lineno="28989">
 <summary>
 Receive UDP traffic on the gds_db port.
 </summary>
@@ -28290,7 +28374,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
+<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004">
 <summary>
 Do not audit attempts to receive UDP traffic on the gds_db port.
 </summary>
@@ -28301,7 +28385,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
+<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019">
 <summary>
 Send and receive UDP traffic on the gds_db port.
 </summary>
@@ -28312,7 +28396,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
+<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gds_db port.
@@ -28324,7 +28408,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="29050">
 <summary>
 Bind TCP sockets to the gds_db port.
 </summary>
@@ -28335,7 +28419,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
+<interface name="corenet_udp_bind_gds_db_port" lineno="29070">
 <summary>
 Bind UDP sockets to the gds_db port.
 </summary>
@@ -28346,7 +28430,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="29089">
 <summary>
 Make a TCP connection to the gds_db port.
 </summary>
@@ -28356,7 +28440,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="29091">
+<interface name="corenet_send_gds_db_client_packets" lineno="29109">
 <summary>
 Send gds_db_client packets.
 </summary>
@@ -28367,7 +28451,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128">
 <summary>
 Do not audit attempts to send gds_db_client packets.
 </summary>
@@ -28378,7 +28462,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
+<interface name="corenet_receive_gds_db_client_packets" lineno="29147">
 <summary>
 Receive gds_db_client packets.
 </summary>
@@ -28389,7 +28473,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166">
 <summary>
 Do not audit attempts to receive gds_db_client packets.
 </summary>
@@ -28400,7 +28484,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185">
 <summary>
 Send and receive gds_db_client packets.
 </summary>
@@ -28411,7 +28495,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201">
 <summary>
 Do not audit attempts to send and receive gds_db_client packets.
 </summary>
@@ -28422,7 +28506,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216">
 <summary>
 Relabel packets to gds_db_client the packet type.
 </summary>
@@ -28432,7 +28516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="29218">
+<interface name="corenet_send_gds_db_server_packets" lineno="29236">
 <summary>
 Send gds_db_server packets.
 </summary>
@@ -28443,7 +28527,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255">
 <summary>
 Do not audit attempts to send gds_db_server packets.
 </summary>
@@ -28454,7 +28538,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
+<interface name="corenet_receive_gds_db_server_packets" lineno="29274">
 <summary>
 Receive gds_db_server packets.
 </summary>
@@ -28465,7 +28549,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293">
 <summary>
 Do not audit attempts to receive gds_db_server packets.
 </summary>
@@ -28476,7 +28560,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312">
 <summary>
 Send and receive gds_db_server packets.
 </summary>
@@ -28487,7 +28571,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328">
 <summary>
 Do not audit attempts to send and receive gds_db_server packets.
 </summary>
@@ -28498,7 +28582,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343">
 <summary>
 Relabel packets to gds_db_server the packet type.
 </summary>
@@ -28508,7 +28592,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
+<interface name="corenet_tcp_sendrecv_git_port" lineno="29365">
 <summary>
 Send and receive TCP traffic on the git port.
 </summary>
@@ -28519,7 +28603,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_git_port" lineno="29362">
+<interface name="corenet_udp_send_git_port" lineno="29380">
 <summary>
 Send UDP traffic on the git port.
 </summary>
@@ -28530,7 +28614,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
+<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395">
 <summary>
 Do not audit attempts to send UDP traffic on the git port.
 </summary>
@@ -28541,7 +28625,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_git_port" lineno="29392">
+<interface name="corenet_udp_receive_git_port" lineno="29410">
 <summary>
 Receive UDP traffic on the git port.
 </summary>
@@ -28552,7 +28636,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
+<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425">
 <summary>
 Do not audit attempts to receive UDP traffic on the git port.
 </summary>
@@ -28563,7 +28647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
+<interface name="corenet_udp_sendrecv_git_port" lineno="29440">
 <summary>
 Send and receive UDP traffic on the git port.
 </summary>
@@ -28574,7 +28658,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
+<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the git port.
@@ -28586,7 +28670,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29453">
+<interface name="corenet_tcp_bind_git_port" lineno="29471">
 <summary>
 Bind TCP sockets to the git port.
 </summary>
@@ -28597,7 +28681,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_git_port" lineno="29473">
+<interface name="corenet_udp_bind_git_port" lineno="29491">
 <summary>
 Bind UDP sockets to the git port.
 </summary>
@@ -28608,7 +28692,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29492">
+<interface name="corenet_tcp_connect_git_port" lineno="29510">
 <summary>
 Make a TCP connection to the git port.
 </summary>
@@ -28618,7 +28702,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_client_packets" lineno="29512">
+<interface name="corenet_send_git_client_packets" lineno="29530">
 <summary>
 Send git_client packets.
 </summary>
@@ -28629,7 +28713,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549">
 <summary>
 Do not audit attempts to send git_client packets.
 </summary>
@@ -28640,7 +28724,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_client_packets" lineno="29550">
+<interface name="corenet_receive_git_client_packets" lineno="29568">
 <summary>
 Receive git_client packets.
 </summary>
@@ -28651,7 +28735,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587">
 <summary>
 Do not audit attempts to receive git_client packets.
 </summary>
@@ -28662,7 +28746,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
+<interface name="corenet_sendrecv_git_client_packets" lineno="29606">
 <summary>
 Send and receive git_client packets.
 </summary>
@@ -28673,7 +28757,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622">
 <summary>
 Do not audit attempts to send and receive git_client packets.
 </summary>
@@ -28684,7 +28768,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29619">
+<interface name="corenet_relabelto_git_client_packets" lineno="29637">
 <summary>
 Relabel packets to git_client the packet type.
 </summary>
@@ -28694,7 +28778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_server_packets" lineno="29639">
+<interface name="corenet_send_git_server_packets" lineno="29657">
 <summary>
 Send git_server packets.
 </summary>
@@ -28705,7 +28789,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676">
 <summary>
 Do not audit attempts to send git_server packets.
 </summary>
@@ -28716,7 +28800,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_server_packets" lineno="29677">
+<interface name="corenet_receive_git_server_packets" lineno="29695">
 <summary>
 Receive git_server packets.
 </summary>
@@ -28727,7 +28811,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714">
 <summary>
 Do not audit attempts to receive git_server packets.
 </summary>
@@ -28738,7 +28822,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
+<interface name="corenet_sendrecv_git_server_packets" lineno="29733">
 <summary>
 Send and receive git_server packets.
 </summary>
@@ -28749,7 +28833,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749">
 <summary>
 Do not audit attempts to send and receive git_server packets.
 </summary>
@@ -28760,7 +28844,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29746">
+<interface name="corenet_relabelto_git_server_packets" lineno="29764">
 <summary>
 Relabel packets to git_server the packet type.
 </summary>
@@ -28770,7 +28854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
+<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786">
 <summary>
 Send and receive TCP traffic on the glance_registry port.
 </summary>
@@ -28781,7 +28865,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
+<interface name="corenet_udp_send_glance_registry_port" lineno="29801">
 <summary>
 Send UDP traffic on the glance_registry port.
 </summary>
@@ -28792,7 +28876,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
+<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816">
 <summary>
 Do not audit attempts to send UDP traffic on the glance_registry port.
 </summary>
@@ -28803,7 +28887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
+<interface name="corenet_udp_receive_glance_registry_port" lineno="29831">
 <summary>
 Receive UDP traffic on the glance_registry port.
 </summary>
@@ -28814,7 +28898,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
+<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846">
 <summary>
 Do not audit attempts to receive UDP traffic on the glance_registry port.
 </summary>
@@ -28825,7 +28909,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
+<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861">
 <summary>
 Send and receive UDP traffic on the glance_registry port.
 </summary>
@@ -28836,7 +28920,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
+<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the glance_registry port.
@@ -28848,7 +28932,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892">
 <summary>
 Bind TCP sockets to the glance_registry port.
 </summary>
@@ -28859,7 +28943,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="29912">
 <summary>
 Bind UDP sockets to the glance_registry port.
 </summary>
@@ -28870,7 +28954,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931">
 <summary>
 Make a TCP connection to the glance_registry port.
 </summary>
@@ -28880,7 +28964,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
+<interface name="corenet_send_glance_registry_client_packets" lineno="29951">
 <summary>
 Send glance_registry_client packets.
 </summary>
@@ -28891,7 +28975,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970">
 <summary>
 Do not audit attempts to send glance_registry_client packets.
 </summary>
@@ -28902,7 +28986,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="29989">
 <summary>
 Receive glance_registry_client packets.
 </summary>
@@ -28913,7 +28997,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008">
 <summary>
 Do not audit attempts to receive glance_registry_client packets.
 </summary>
@@ -28924,7 +29008,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027">
 <summary>
 Send and receive glance_registry_client packets.
 </summary>
@@ -28935,7 +29019,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043">
 <summary>
 Do not audit attempts to send and receive glance_registry_client packets.
 </summary>
@@ -28946,7 +29030,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058">
 <summary>
 Relabel packets to glance_registry_client the packet type.
 </summary>
@@ -28956,7 +29040,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
+<interface name="corenet_send_glance_registry_server_packets" lineno="30078">
 <summary>
 Send glance_registry_server packets.
 </summary>
@@ -28967,7 +29051,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097">
 <summary>
 Do not audit attempts to send glance_registry_server packets.
 </summary>
@@ -28978,7 +29062,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="30116">
 <summary>
 Receive glance_registry_server packets.
 </summary>
@@ -28989,7 +29073,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135">
 <summary>
 Do not audit attempts to receive glance_registry_server packets.
 </summary>
@@ -29000,7 +29084,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154">
 <summary>
 Send and receive glance_registry_server packets.
 </summary>
@@ -29011,7 +29095,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170">
 <summary>
 Do not audit attempts to send and receive glance_registry_server packets.
 </summary>
@@ -29022,7 +29106,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185">
 <summary>
 Relabel packets to glance_registry_server the packet type.
 </summary>
@@ -29032,7 +29116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
+<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207">
 <summary>
 Send and receive TCP traffic on the gopher port.
 </summary>
@@ -29043,7 +29127,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30204">
+<interface name="corenet_udp_send_gopher_port" lineno="30222">
 <summary>
 Send UDP traffic on the gopher port.
 </summary>
@@ -29054,7 +29138,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
+<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237">
 <summary>
 Do not audit attempts to send UDP traffic on the gopher port.
 </summary>
@@ -29065,7 +29149,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30234">
+<interface name="corenet_udp_receive_gopher_port" lineno="30252">
 <summary>
 Receive UDP traffic on the gopher port.
 </summary>
@@ -29076,7 +29160,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
+<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267">
 <summary>
 Do not audit attempts to receive UDP traffic on the gopher port.
 </summary>
@@ -29087,7 +29171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
+<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282">
 <summary>
 Send and receive UDP traffic on the gopher port.
 </summary>
@@ -29098,7 +29182,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
+<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gopher port.
@@ -29110,7 +29194,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
+<interface name="corenet_tcp_bind_gopher_port" lineno="30313">
 <summary>
 Bind TCP sockets to the gopher port.
 </summary>
@@ -29121,7 +29205,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30315">
+<interface name="corenet_udp_bind_gopher_port" lineno="30333">
 <summary>
 Bind UDP sockets to the gopher port.
 </summary>
@@ -29132,7 +29216,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
+<interface name="corenet_tcp_connect_gopher_port" lineno="30352">
 <summary>
 Make a TCP connection to the gopher port.
 </summary>
@@ -29142,7 +29226,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30354">
+<interface name="corenet_send_gopher_client_packets" lineno="30372">
 <summary>
 Send gopher_client packets.
 </summary>
@@ -29153,7 +29237,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391">
 <summary>
 Do not audit attempts to send gopher_client packets.
 </summary>
@@ -29164,7 +29248,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30392">
+<interface name="corenet_receive_gopher_client_packets" lineno="30410">
 <summary>
 Receive gopher_client packets.
 </summary>
@@ -29175,7 +29259,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429">
 <summary>
 Do not audit attempts to receive gopher_client packets.
 </summary>
@@ -29186,7 +29270,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448">
 <summary>
 Send and receive gopher_client packets.
 </summary>
@@ -29197,7 +29281,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464">
 <summary>
 Do not audit attempts to send and receive gopher_client packets.
 </summary>
@@ -29208,7 +29292,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="30479">
 <summary>
 Relabel packets to gopher_client the packet type.
 </summary>
@@ -29218,7 +29302,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30481">
+<interface name="corenet_send_gopher_server_packets" lineno="30499">
 <summary>
 Send gopher_server packets.
 </summary>
@@ -29229,7 +29313,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518">
 <summary>
 Do not audit attempts to send gopher_server packets.
 </summary>
@@ -29240,7 +29324,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30519">
+<interface name="corenet_receive_gopher_server_packets" lineno="30537">
 <summary>
 Receive gopher_server packets.
 </summary>
@@ -29251,7 +29335,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556">
 <summary>
 Do not audit attempts to receive gopher_server packets.
 </summary>
@@ -29262,7 +29346,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575">
 <summary>
 Send and receive gopher_server packets.
 </summary>
@@ -29273,7 +29357,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591">
 <summary>
 Do not audit attempts to send and receive gopher_server packets.
 </summary>
@@ -29284,7 +29368,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="30606">
 <summary>
 Relabel packets to gopher_server the packet type.
 </summary>
@@ -29294,7 +29378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
+<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628">
 <summary>
 Send and receive TCP traffic on the gpsd port.
 </summary>
@@ -29305,7 +29389,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30625">
+<interface name="corenet_udp_send_gpsd_port" lineno="30643">
 <summary>
 Send UDP traffic on the gpsd port.
 </summary>
@@ -29316,7 +29400,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
+<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658">
 <summary>
 Do not audit attempts to send UDP traffic on the gpsd port.
 </summary>
@@ -29327,7 +29411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
+<interface name="corenet_udp_receive_gpsd_port" lineno="30673">
 <summary>
 Receive UDP traffic on the gpsd port.
 </summary>
@@ -29338,7 +29422,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
+<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688">
 <summary>
 Do not audit attempts to receive UDP traffic on the gpsd port.
 </summary>
@@ -29349,7 +29433,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
+<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703">
 <summary>
 Send and receive UDP traffic on the gpsd port.
 </summary>
@@ -29360,7 +29444,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
+<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the gpsd port.
@@ -29372,7 +29456,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
+<interface name="corenet_tcp_bind_gpsd_port" lineno="30734">
 <summary>
 Bind TCP sockets to the gpsd port.
 </summary>
@@ -29383,7 +29467,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
+<interface name="corenet_udp_bind_gpsd_port" lineno="30754">
 <summary>
 Bind UDP sockets to the gpsd port.
 </summary>
@@ -29394,7 +29478,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="30773">
 <summary>
 Make a TCP connection to the gpsd port.
 </summary>
@@ -29404,7 +29488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30775">
+<interface name="corenet_send_gpsd_client_packets" lineno="30793">
 <summary>
 Send gpsd_client packets.
 </summary>
@@ -29415,7 +29499,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812">
 <summary>
 Do not audit attempts to send gpsd_client packets.
 </summary>
@@ -29426,7 +29510,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
+<interface name="corenet_receive_gpsd_client_packets" lineno="30831">
 <summary>
 Receive gpsd_client packets.
 </summary>
@@ -29437,7 +29521,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850">
 <summary>
 Do not audit attempts to receive gpsd_client packets.
 </summary>
@@ -29448,7 +29532,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869">
 <summary>
 Send and receive gpsd_client packets.
 </summary>
@@ -29459,7 +29543,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885">
 <summary>
 Do not audit attempts to send and receive gpsd_client packets.
 </summary>
@@ -29470,7 +29554,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900">
 <summary>
 Relabel packets to gpsd_client the packet type.
 </summary>
@@ -29480,7 +29564,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30902">
+<interface name="corenet_send_gpsd_server_packets" lineno="30920">
 <summary>
 Send gpsd_server packets.
 </summary>
@@ -29491,7 +29575,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939">
 <summary>
 Do not audit attempts to send gpsd_server packets.
 </summary>
@@ -29502,7 +29586,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
+<interface name="corenet_receive_gpsd_server_packets" lineno="30958">
 <summary>
 Receive gpsd_server packets.
 </summary>
@@ -29513,7 +29597,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977">
 <summary>
 Do not audit attempts to receive gpsd_server packets.
 </summary>
@@ -29524,7 +29608,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996">
 <summary>
 Send and receive gpsd_server packets.
 </summary>
@@ -29535,7 +29619,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012">
 <summary>
 Do not audit attempts to send and receive gpsd_server packets.
 </summary>
@@ -29546,7 +29630,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027">
 <summary>
 Relabel packets to gpsd_server the packet type.
 </summary>
@@ -29556,7 +29640,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
+<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049">
 <summary>
 Send and receive TCP traffic on the hadoop_datanode port.
 </summary>
@@ -29567,7 +29651,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
+<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064">
 <summary>
 Send UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29578,7 +29662,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
+<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079">
 <summary>
 Do not audit attempts to send UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29589,7 +29673,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
+<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094">
 <summary>
 Receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29600,7 +29684,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
+<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109">
 <summary>
 Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29611,7 +29695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
+<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124">
 <summary>
 Send and receive UDP traffic on the hadoop_datanode port.
 </summary>
@@ -29622,7 +29706,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hadoop_datanode port.
@@ -29634,7 +29718,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155">
 <summary>
 Bind TCP sockets to the hadoop_datanode port.
 </summary>
@@ -29645,7 +29729,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175">
 <summary>
 Bind UDP sockets to the hadoop_datanode port.
 </summary>
@@ -29656,7 +29740,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194">
 <summary>
 Make a TCP connection to the hadoop_datanode port.
 </summary>
@@ -29666,7 +29750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214">
 <summary>
 Send hadoop_datanode_client packets.
 </summary>
@@ -29677,7 +29761,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233">
 <summary>
 Do not audit attempts to send hadoop_datanode_client packets.
 </summary>
@@ -29688,7 +29772,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252">
 <summary>
 Receive hadoop_datanode_client packets.
 </summary>
@@ -29699,7 +29783,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271">
 <summary>
 Do not audit attempts to receive hadoop_datanode_client packets.
 </summary>
@@ -29710,7 +29794,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290">
 <summary>
 Send and receive hadoop_datanode_client packets.
 </summary>
@@ -29721,7 +29805,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_client packets.
 </summary>
@@ -29732,7 +29816,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321">
 <summary>
 Relabel packets to hadoop_datanode_client the packet type.
 </summary>
@@ -29742,7 +29826,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341">
 <summary>
 Send hadoop_datanode_server packets.
 </summary>
@@ -29753,7 +29837,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360">
 <summary>
 Do not audit attempts to send hadoop_datanode_server packets.
 </summary>
@@ -29764,7 +29848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379">
 <summary>
 Receive hadoop_datanode_server packets.
 </summary>
@@ -29775,7 +29859,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398">
 <summary>
 Do not audit attempts to receive hadoop_datanode_server packets.
 </summary>
@@ -29786,7 +29870,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417">
 <summary>
 Send and receive hadoop_datanode_server packets.
 </summary>
@@ -29797,7 +29881,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_server packets.
 </summary>
@@ -29808,7 +29892,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448">
 <summary>
 Relabel packets to hadoop_datanode_server the packet type.
 </summary>
@@ -29818,7 +29902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
+<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470">
 <summary>
 Send and receive TCP traffic on the hadoop_namenode port.
 </summary>
@@ -29829,7 +29913,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
+<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485">
 <summary>
 Send UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29840,7 +29924,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
+<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500">
 <summary>
 Do not audit attempts to send UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29851,7 +29935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
+<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515">
 <summary>
 Receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29862,7 +29946,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
+<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530">
 <summary>
 Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29873,7 +29957,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
+<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545">
 <summary>
 Send and receive UDP traffic on the hadoop_namenode port.
 </summary>
@@ -29884,7 +29968,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hadoop_namenode port.
@@ -29896,7 +29980,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576">
 <summary>
 Bind TCP sockets to the hadoop_namenode port.
 </summary>
@@ -29907,7 +29991,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596">
 <summary>
 Bind UDP sockets to the hadoop_namenode port.
 </summary>
@@ -29918,7 +30002,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615">
 <summary>
 Make a TCP connection to the hadoop_namenode port.
 </summary>
@@ -29928,7 +30012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635">
 <summary>
 Send hadoop_namenode_client packets.
 </summary>
@@ -29939,7 +30023,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654">
 <summary>
 Do not audit attempts to send hadoop_namenode_client packets.
 </summary>
@@ -29950,7 +30034,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673">
 <summary>
 Receive hadoop_namenode_client packets.
 </summary>
@@ -29961,7 +30045,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692">
 <summary>
 Do not audit attempts to receive hadoop_namenode_client packets.
 </summary>
@@ -29972,7 +30056,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711">
 <summary>
 Send and receive hadoop_namenode_client packets.
 </summary>
@@ -29983,7 +30067,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_client packets.
 </summary>
@@ -29994,7 +30078,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742">
 <summary>
 Relabel packets to hadoop_namenode_client the packet type.
 </summary>
@@ -30004,7 +30088,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762">
 <summary>
 Send hadoop_namenode_server packets.
 </summary>
@@ -30015,7 +30099,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781">
 <summary>
 Do not audit attempts to send hadoop_namenode_server packets.
 </summary>
@@ -30026,7 +30110,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800">
 <summary>
 Receive hadoop_namenode_server packets.
 </summary>
@@ -30037,7 +30121,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819">
 <summary>
 Do not audit attempts to receive hadoop_namenode_server packets.
 </summary>
@@ -30048,7 +30132,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838">
 <summary>
 Send and receive hadoop_namenode_server packets.
 </summary>
@@ -30059,7 +30143,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_server packets.
 </summary>
@@ -30070,7 +30154,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869">
 <summary>
 Relabel packets to hadoop_namenode_server the packet type.
 </summary>
@@ -30080,7 +30164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
+<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891">
 <summary>
 Send and receive TCP traffic on the hddtemp port.
 </summary>
@@ -30091,7 +30175,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
+<interface name="corenet_udp_send_hddtemp_port" lineno="31906">
 <summary>
 Send UDP traffic on the hddtemp port.
 </summary>
@@ -30102,7 +30186,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
+<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921">
 <summary>
 Do not audit attempts to send UDP traffic on the hddtemp port.
 </summary>
@@ -30113,7 +30197,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
+<interface name="corenet_udp_receive_hddtemp_port" lineno="31936">
 <summary>
 Receive UDP traffic on the hddtemp port.
 </summary>
@@ -30124,7 +30208,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
+<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951">
 <summary>
 Do not audit attempts to receive UDP traffic on the hddtemp port.
 </summary>
@@ -30135,7 +30219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
+<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966">
 <summary>
 Send and receive UDP traffic on the hddtemp port.
 </summary>
@@ -30146,7 +30230,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
+<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hddtemp port.
@@ -30158,7 +30242,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997">
 <summary>
 Bind TCP sockets to the hddtemp port.
 </summary>
@@ -30169,7 +30253,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="32017">
 <summary>
 Bind UDP sockets to the hddtemp port.
 </summary>
@@ -30180,7 +30264,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036">
 <summary>
 Make a TCP connection to the hddtemp port.
 </summary>
@@ -30190,7 +30274,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
+<interface name="corenet_send_hddtemp_client_packets" lineno="32056">
 <summary>
 Send hddtemp_client packets.
 </summary>
@@ -30201,7 +30285,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075">
 <summary>
 Do not audit attempts to send hddtemp_client packets.
 </summary>
@@ -30212,7 +30296,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="32094">
 <summary>
 Receive hddtemp_client packets.
 </summary>
@@ -30223,7 +30307,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113">
 <summary>
 Do not audit attempts to receive hddtemp_client packets.
 </summary>
@@ -30234,7 +30318,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132">
 <summary>
 Send and receive hddtemp_client packets.
 </summary>
@@ -30245,7 +30329,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148">
 <summary>
 Do not audit attempts to send and receive hddtemp_client packets.
 </summary>
@@ -30256,7 +30340,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163">
 <summary>
 Relabel packets to hddtemp_client the packet type.
 </summary>
@@ -30266,7 +30350,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
+<interface name="corenet_send_hddtemp_server_packets" lineno="32183">
 <summary>
 Send hddtemp_server packets.
 </summary>
@@ -30277,7 +30361,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202">
 <summary>
 Do not audit attempts to send hddtemp_server packets.
 </summary>
@@ -30288,7 +30372,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="32221">
 <summary>
 Receive hddtemp_server packets.
 </summary>
@@ -30299,7 +30383,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240">
 <summary>
 Do not audit attempts to receive hddtemp_server packets.
 </summary>
@@ -30310,7 +30394,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259">
 <summary>
 Send and receive hddtemp_server packets.
 </summary>
@@ -30321,7 +30405,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275">
 <summary>
 Do not audit attempts to send and receive hddtemp_server packets.
 </summary>
@@ -30332,7 +30416,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290">
 <summary>
 Relabel packets to hddtemp_server the packet type.
 </summary>
@@ -30342,7 +30426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
+<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312">
 <summary>
 Send and receive TCP traffic on the howl port.
 </summary>
@@ -30353,7 +30437,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_howl_port" lineno="32309">
+<interface name="corenet_udp_send_howl_port" lineno="32327">
 <summary>
 Send UDP traffic on the howl port.
 </summary>
@@ -30364,7 +30448,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
+<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342">
 <summary>
 Do not audit attempts to send UDP traffic on the howl port.
 </summary>
@@ -30375,7 +30459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32339">
+<interface name="corenet_udp_receive_howl_port" lineno="32357">
 <summary>
 Receive UDP traffic on the howl port.
 </summary>
@@ -30386,7 +30470,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
+<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372">
 <summary>
 Do not audit attempts to receive UDP traffic on the howl port.
 </summary>
@@ -30397,7 +30481,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
+<interface name="corenet_udp_sendrecv_howl_port" lineno="32387">
 <summary>
 Send and receive UDP traffic on the howl port.
 </summary>
@@ -30408,7 +30492,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
+<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the howl port.
@@ -30420,7 +30504,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32400">
+<interface name="corenet_tcp_bind_howl_port" lineno="32418">
 <summary>
 Bind TCP sockets to the howl port.
 </summary>
@@ -30431,7 +30515,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32420">
+<interface name="corenet_udp_bind_howl_port" lineno="32438">
 <summary>
 Bind UDP sockets to the howl port.
 </summary>
@@ -30442,7 +30526,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32439">
+<interface name="corenet_tcp_connect_howl_port" lineno="32457">
 <summary>
 Make a TCP connection to the howl port.
 </summary>
@@ -30452,7 +30536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_client_packets" lineno="32459">
+<interface name="corenet_send_howl_client_packets" lineno="32477">
 <summary>
 Send howl_client packets.
 </summary>
@@ -30463,7 +30547,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496">
 <summary>
 Do not audit attempts to send howl_client packets.
 </summary>
@@ -30474,7 +30558,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32497">
+<interface name="corenet_receive_howl_client_packets" lineno="32515">
 <summary>
 Receive howl_client packets.
 </summary>
@@ -30485,7 +30569,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534">
 <summary>
 Do not audit attempts to receive howl_client packets.
 </summary>
@@ -30496,7 +30580,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="32553">
 <summary>
 Send and receive howl_client packets.
 </summary>
@@ -30507,7 +30591,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569">
 <summary>
 Do not audit attempts to send and receive howl_client packets.
 </summary>
@@ -30518,7 +30602,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
+<interface name="corenet_relabelto_howl_client_packets" lineno="32584">
 <summary>
 Relabel packets to howl_client the packet type.
 </summary>
@@ -30528,7 +30612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_server_packets" lineno="32586">
+<interface name="corenet_send_howl_server_packets" lineno="32604">
 <summary>
 Send howl_server packets.
 </summary>
@@ -30539,7 +30623,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623">
 <summary>
 Do not audit attempts to send howl_server packets.
 </summary>
@@ -30550,7 +30634,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32624">
+<interface name="corenet_receive_howl_server_packets" lineno="32642">
 <summary>
 Receive howl_server packets.
 </summary>
@@ -30561,7 +30645,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661">
 <summary>
 Do not audit attempts to receive howl_server packets.
 </summary>
@@ -30572,7 +30656,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="32680">
 <summary>
 Send and receive howl_server packets.
 </summary>
@@ -30583,7 +30667,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696">
 <summary>
 Do not audit attempts to send and receive howl_server packets.
 </summary>
@@ -30594,7 +30678,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
+<interface name="corenet_relabelto_howl_server_packets" lineno="32711">
 <summary>
 Relabel packets to howl_server the packet type.
 </summary>
@@ -30604,7 +30688,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
+<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733">
 <summary>
 Send and receive TCP traffic on the hplip port.
 </summary>
@@ -30615,7 +30699,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32730">
+<interface name="corenet_udp_send_hplip_port" lineno="32748">
 <summary>
 Send UDP traffic on the hplip port.
 </summary>
@@ -30626,7 +30710,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
+<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763">
 <summary>
 Do not audit attempts to send UDP traffic on the hplip port.
 </summary>
@@ -30637,7 +30721,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32760">
+<interface name="corenet_udp_receive_hplip_port" lineno="32778">
 <summary>
 Receive UDP traffic on the hplip port.
 </summary>
@@ -30648,7 +30732,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
+<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793">
 <summary>
 Do not audit attempts to receive UDP traffic on the hplip port.
 </summary>
@@ -30659,7 +30743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
+<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808">
 <summary>
 Send and receive UDP traffic on the hplip port.
 </summary>
@@ -30670,7 +30754,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
+<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the hplip port.
@@ -30682,7 +30766,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
+<interface name="corenet_tcp_bind_hplip_port" lineno="32839">
 <summary>
 Bind TCP sockets to the hplip port.
 </summary>
@@ -30693,7 +30777,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32841">
+<interface name="corenet_udp_bind_hplip_port" lineno="32859">
 <summary>
 Bind UDP sockets to the hplip port.
 </summary>
@@ -30704,7 +30788,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
+<interface name="corenet_tcp_connect_hplip_port" lineno="32878">
 <summary>
 Make a TCP connection to the hplip port.
 </summary>
@@ -30714,7 +30798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32880">
+<interface name="corenet_send_hplip_client_packets" lineno="32898">
 <summary>
 Send hplip_client packets.
 </summary>
@@ -30725,7 +30809,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917">
 <summary>
 Do not audit attempts to send hplip_client packets.
 </summary>
@@ -30736,7 +30820,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32918">
+<interface name="corenet_receive_hplip_client_packets" lineno="32936">
 <summary>
 Receive hplip_client packets.
 </summary>
@@ -30747,7 +30831,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955">
 <summary>
 Do not audit attempts to receive hplip_client packets.
 </summary>
@@ -30758,7 +30842,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974">
 <summary>
 Send and receive hplip_client packets.
 </summary>
@@ -30769,7 +30853,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990">
 <summary>
 Do not audit attempts to send and receive hplip_client packets.
 </summary>
@@ -30780,7 +30864,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="33005">
 <summary>
 Relabel packets to hplip_client the packet type.
 </summary>
@@ -30790,7 +30874,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_server_packets" lineno="33007">
+<interface name="corenet_send_hplip_server_packets" lineno="33025">
 <summary>
 Send hplip_server packets.
 </summary>
@@ -30801,7 +30885,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044">
 <summary>
 Do not audit attempts to send hplip_server packets.
 </summary>
@@ -30812,7 +30896,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="33045">
+<interface name="corenet_receive_hplip_server_packets" lineno="33063">
 <summary>
 Receive hplip_server packets.
 </summary>
@@ -30823,7 +30907,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082">
 <summary>
 Do not audit attempts to receive hplip_server packets.
 </summary>
@@ -30834,7 +30918,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101">
 <summary>
 Send and receive hplip_server packets.
 </summary>
@@ -30845,7 +30929,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117">
 <summary>
 Do not audit attempts to send and receive hplip_server packets.
 </summary>
@@ -30856,7 +30940,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="33132">
 <summary>
 Relabel packets to hplip_server the packet type.
 </summary>
@@ -30866,7 +30950,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
+<interface name="corenet_tcp_sendrecv_http_port" lineno="33154">
 <summary>
 Send and receive TCP traffic on the http port.
 </summary>
@@ -30877,7 +30961,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_http_port" lineno="33151">
+<interface name="corenet_udp_send_http_port" lineno="33169">
 <summary>
 Send UDP traffic on the http port.
 </summary>
@@ -30888,7 +30972,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
+<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184">
 <summary>
 Do not audit attempts to send UDP traffic on the http port.
 </summary>
@@ -30899,7 +30983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_http_port" lineno="33181">
+<interface name="corenet_udp_receive_http_port" lineno="33199">
 <summary>
 Receive UDP traffic on the http port.
 </summary>
@@ -30910,7 +30994,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
+<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214">
 <summary>
 Do not audit attempts to receive UDP traffic on the http port.
 </summary>
@@ -30921,7 +31005,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
+<interface name="corenet_udp_sendrecv_http_port" lineno="33229">
 <summary>
 Send and receive UDP traffic on the http port.
 </summary>
@@ -30932,7 +31016,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
+<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the http port.
@@ -30944,7 +31028,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33242">
+<interface name="corenet_tcp_bind_http_port" lineno="33260">
 <summary>
 Bind TCP sockets to the http port.
 </summary>
@@ -30955,7 +31039,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_port" lineno="33262">
+<interface name="corenet_udp_bind_http_port" lineno="33280">
 <summary>
 Bind UDP sockets to the http port.
 </summary>
@@ -30966,7 +31050,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33281">
+<interface name="corenet_tcp_connect_http_port" lineno="33299">
 <summary>
 Make a TCP connection to the http port.
 </summary>
@@ -30976,7 +31060,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_client_packets" lineno="33301">
+<interface name="corenet_send_http_client_packets" lineno="33319">
 <summary>
 Send http_client packets.
 </summary>
@@ -30987,7 +31071,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338">
 <summary>
 Do not audit attempts to send http_client packets.
 </summary>
@@ -30998,7 +31082,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_client_packets" lineno="33339">
+<interface name="corenet_receive_http_client_packets" lineno="33357">
 <summary>
 Receive http_client packets.
 </summary>
@@ -31009,7 +31093,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376">
 <summary>
 Do not audit attempts to receive http_client packets.
 </summary>
@@ -31020,7 +31104,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
+<interface name="corenet_sendrecv_http_client_packets" lineno="33395">
 <summary>
 Send and receive http_client packets.
 </summary>
@@ -31031,7 +31115,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411">
 <summary>
 Do not audit attempts to send and receive http_client packets.
 </summary>
@@ -31042,7 +31126,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33408">
+<interface name="corenet_relabelto_http_client_packets" lineno="33426">
 <summary>
 Relabel packets to http_client the packet type.
 </summary>
@@ -31052,7 +31136,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_server_packets" lineno="33428">
+<interface name="corenet_send_http_server_packets" lineno="33446">
 <summary>
 Send http_server packets.
 </summary>
@@ -31063,7 +31147,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465">
 <summary>
 Do not audit attempts to send http_server packets.
 </summary>
@@ -31074,7 +31158,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_server_packets" lineno="33466">
+<interface name="corenet_receive_http_server_packets" lineno="33484">
 <summary>
 Receive http_server packets.
 </summary>
@@ -31085,7 +31169,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503">
 <summary>
 Do not audit attempts to receive http_server packets.
 </summary>
@@ -31096,7 +31180,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
+<interface name="corenet_sendrecv_http_server_packets" lineno="33522">
 <summary>
 Send and receive http_server packets.
 </summary>
@@ -31107,7 +31191,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538">
 <summary>
 Do not audit attempts to send and receive http_server packets.
 </summary>
@@ -31118,7 +31202,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33535">
+<interface name="corenet_relabelto_http_server_packets" lineno="33553">
 <summary>
 Relabel packets to http_server the packet type.
 </summary>
@@ -31128,7 +31212,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
+<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575">
 <summary>
 Send and receive TCP traffic on the http_cache port.
 </summary>
@@ -31139,7 +31223,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33572">
+<interface name="corenet_udp_send_http_cache_port" lineno="33590">
 <summary>
 Send UDP traffic on the http_cache port.
 </summary>
@@ -31150,7 +31234,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
+<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605">
 <summary>
 Do not audit attempts to send UDP traffic on the http_cache port.
 </summary>
@@ -31161,7 +31245,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
+<interface name="corenet_udp_receive_http_cache_port" lineno="33620">
 <summary>
 Receive UDP traffic on the http_cache port.
 </summary>
@@ -31172,7 +31256,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
+<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635">
 <summary>
 Do not audit attempts to receive UDP traffic on the http_cache port.
 </summary>
@@ -31183,7 +31267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
+<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650">
 <summary>
 Send and receive UDP traffic on the http_cache port.
 </summary>
@@ -31194,7 +31278,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
+<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the http_cache port.
@@ -31206,7 +31290,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="33681">
 <summary>
 Bind TCP sockets to the http_cache port.
 </summary>
@@ -31217,7 +31301,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
+<interface name="corenet_udp_bind_http_cache_port" lineno="33701">
 <summary>
 Bind UDP sockets to the http_cache port.
 </summary>
@@ -31228,7 +31312,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="33720">
 <summary>
 Make a TCP connection to the http_cache port.
 </summary>
@@ -31238,7 +31322,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33722">
+<interface name="corenet_send_http_cache_client_packets" lineno="33740">
 <summary>
 Send http_cache_client packets.
 </summary>
@@ -31249,7 +31333,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759">
 <summary>
 Do not audit attempts to send http_cache_client packets.
 </summary>
@@ -31260,7 +31344,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
+<interface name="corenet_receive_http_cache_client_packets" lineno="33778">
 <summary>
 Receive http_cache_client packets.
 </summary>
@@ -31271,7 +31355,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797">
 <summary>
 Do not audit attempts to receive http_cache_client packets.
 </summary>
@@ -31282,7 +31366,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816">
 <summary>
 Send and receive http_cache_client packets.
 </summary>
@@ -31293,7 +31377,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832">
 <summary>
 Do not audit attempts to send and receive http_cache_client packets.
 </summary>
@@ -31304,7 +31388,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847">
 <summary>
 Relabel packets to http_cache_client the packet type.
 </summary>
@@ -31314,7 +31398,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33849">
+<interface name="corenet_send_http_cache_server_packets" lineno="33867">
 <summary>
 Send http_cache_server packets.
 </summary>
@@ -31325,7 +31409,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886">
 <summary>
 Do not audit attempts to send http_cache_server packets.
 </summary>
@@ -31336,7 +31420,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
+<interface name="corenet_receive_http_cache_server_packets" lineno="33905">
 <summary>
 Receive http_cache_server packets.
 </summary>
@@ -31347,7 +31431,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924">
 <summary>
 Do not audit attempts to receive http_cache_server packets.
 </summary>
@@ -31358,7 +31442,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943">
 <summary>
 Send and receive http_cache_server packets.
 </summary>
@@ -31369,7 +31453,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959">
 <summary>
 Do not audit attempts to send and receive http_cache_server packets.
 </summary>
@@ -31380,7 +31464,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974">
 <summary>
 Relabel packets to http_cache_server the packet type.
 </summary>
@@ -31390,7 +31474,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
+<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996">
 <summary>
 Send and receive TCP traffic on the i18n_input port.
 </summary>
@@ -31401,7 +31485,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
+<interface name="corenet_udp_send_i18n_input_port" lineno="34011">
 <summary>
 Send UDP traffic on the i18n_input port.
 </summary>
@@ -31412,7 +31496,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
+<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026">
 <summary>
 Do not audit attempts to send UDP traffic on the i18n_input port.
 </summary>
@@ -31423,7 +31507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
+<interface name="corenet_udp_receive_i18n_input_port" lineno="34041">
 <summary>
 Receive UDP traffic on the i18n_input port.
 </summary>
@@ -31434,7 +31518,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
+<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056">
 <summary>
 Do not audit attempts to receive UDP traffic on the i18n_input port.
 </summary>
@@ -31445,7 +31529,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
+<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071">
 <summary>
 Send and receive UDP traffic on the i18n_input port.
 </summary>
@@ -31456,7 +31540,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
+<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the i18n_input port.
@@ -31468,7 +31552,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102">
 <summary>
 Bind TCP sockets to the i18n_input port.
 </summary>
@@ -31479,7 +31563,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="34122">
 <summary>
 Bind UDP sockets to the i18n_input port.
 </summary>
@@ -31490,7 +31574,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141">
 <summary>
 Make a TCP connection to the i18n_input port.
 </summary>
@@ -31500,7 +31584,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
+<interface name="corenet_send_i18n_input_client_packets" lineno="34161">
 <summary>
 Send i18n_input_client packets.
 </summary>
@@ -31511,7 +31595,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180">
 <summary>
 Do not audit attempts to send i18n_input_client packets.
 </summary>
@@ -31522,7 +31606,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="34199">
 <summary>
 Receive i18n_input_client packets.
 </summary>
@@ -31533,7 +31617,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218">
 <summary>
 Do not audit attempts to receive i18n_input_client packets.
 </summary>
@@ -31544,7 +31628,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237">
 <summary>
 Send and receive i18n_input_client packets.
 </summary>
@@ -31555,7 +31639,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253">
 <summary>
 Do not audit attempts to send and receive i18n_input_client packets.
 </summary>
@@ -31566,7 +31650,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268">
 <summary>
 Relabel packets to i18n_input_client the packet type.
 </summary>
@@ -31576,7 +31660,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
+<interface name="corenet_send_i18n_input_server_packets" lineno="34288">
 <summary>
 Send i18n_input_server packets.
 </summary>
@@ -31587,7 +31671,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307">
 <summary>
 Do not audit attempts to send i18n_input_server packets.
 </summary>
@@ -31598,7 +31682,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="34326">
 <summary>
 Receive i18n_input_server packets.
 </summary>
@@ -31609,7 +31693,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345">
 <summary>
 Do not audit attempts to receive i18n_input_server packets.
 </summary>
@@ -31620,7 +31704,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364">
 <summary>
 Send and receive i18n_input_server packets.
 </summary>
@@ -31631,7 +31715,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380">
 <summary>
 Do not audit attempts to send and receive i18n_input_server packets.
 </summary>
@@ -31642,7 +31726,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395">
 <summary>
 Relabel packets to i18n_input_server the packet type.
 </summary>
@@ -31652,7 +31736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
+<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417">
 <summary>
 Send and receive TCP traffic on the imaze port.
 </summary>
@@ -31663,7 +31747,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34414">
+<interface name="corenet_udp_send_imaze_port" lineno="34432">
 <summary>
 Send UDP traffic on the imaze port.
 </summary>
@@ -31674,7 +31758,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
+<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447">
 <summary>
 Do not audit attempts to send UDP traffic on the imaze port.
 </summary>
@@ -31685,7 +31769,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34444">
+<interface name="corenet_udp_receive_imaze_port" lineno="34462">
 <summary>
 Receive UDP traffic on the imaze port.
 </summary>
@@ -31696,7 +31780,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
+<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477">
 <summary>
 Do not audit attempts to receive UDP traffic on the imaze port.
 </summary>
@@ -31707,7 +31791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
+<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492">
 <summary>
 Send and receive UDP traffic on the imaze port.
 </summary>
@@ -31718,7 +31802,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
+<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the imaze port.
@@ -31730,7 +31814,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
+<interface name="corenet_tcp_bind_imaze_port" lineno="34523">
 <summary>
 Bind TCP sockets to the imaze port.
 </summary>
@@ -31741,7 +31825,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34525">
+<interface name="corenet_udp_bind_imaze_port" lineno="34543">
 <summary>
 Bind UDP sockets to the imaze port.
 </summary>
@@ -31752,7 +31836,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
+<interface name="corenet_tcp_connect_imaze_port" lineno="34562">
 <summary>
 Make a TCP connection to the imaze port.
 </summary>
@@ -31762,7 +31846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34564">
+<interface name="corenet_send_imaze_client_packets" lineno="34582">
 <summary>
 Send imaze_client packets.
 </summary>
@@ -31773,7 +31857,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601">
 <summary>
 Do not audit attempts to send imaze_client packets.
 </summary>
@@ -31784,7 +31868,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34602">
+<interface name="corenet_receive_imaze_client_packets" lineno="34620">
 <summary>
 Receive imaze_client packets.
 </summary>
@@ -31795,7 +31879,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639">
 <summary>
 Do not audit attempts to receive imaze_client packets.
 </summary>
@@ -31806,7 +31890,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658">
 <summary>
 Send and receive imaze_client packets.
 </summary>
@@ -31817,7 +31901,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674">
 <summary>
 Do not audit attempts to send and receive imaze_client packets.
 </summary>
@@ -31828,7 +31912,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="34689">
 <summary>
 Relabel packets to imaze_client the packet type.
 </summary>
@@ -31838,7 +31922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34691">
+<interface name="corenet_send_imaze_server_packets" lineno="34709">
 <summary>
 Send imaze_server packets.
 </summary>
@@ -31849,7 +31933,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728">
 <summary>
 Do not audit attempts to send imaze_server packets.
 </summary>
@@ -31860,7 +31944,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34729">
+<interface name="corenet_receive_imaze_server_packets" lineno="34747">
 <summary>
 Receive imaze_server packets.
 </summary>
@@ -31871,7 +31955,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766">
 <summary>
 Do not audit attempts to receive imaze_server packets.
 </summary>
@@ -31882,7 +31966,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785">
 <summary>
 Send and receive imaze_server packets.
 </summary>
@@ -31893,7 +31977,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801">
 <summary>
 Do not audit attempts to send and receive imaze_server packets.
 </summary>
@@ -31904,7 +31988,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="34816">
 <summary>
 Relabel packets to imaze_server the packet type.
 </summary>
@@ -31914,7 +31998,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
+<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838">
 <summary>
 Send and receive TCP traffic on the inetd_child port.
 </summary>
@@ -31925,7 +32009,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
+<interface name="corenet_udp_send_inetd_child_port" lineno="34853">
 <summary>
 Send UDP traffic on the inetd_child port.
 </summary>
@@ -31936,7 +32020,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
+<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868">
 <summary>
 Do not audit attempts to send UDP traffic on the inetd_child port.
 </summary>
@@ -31947,7 +32031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
+<interface name="corenet_udp_receive_inetd_child_port" lineno="34883">
 <summary>
 Receive UDP traffic on the inetd_child port.
 </summary>
@@ -31958,7 +32042,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
+<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898">
 <summary>
 Do not audit attempts to receive UDP traffic on the inetd_child port.
 </summary>
@@ -31969,7 +32053,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
+<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913">
 <summary>
 Send and receive UDP traffic on the inetd_child port.
 </summary>
@@ -31980,7 +32064,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
+<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the inetd_child port.
@@ -31992,7 +32076,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944">
 <summary>
 Bind TCP sockets to the inetd_child port.
 </summary>
@@ -32003,7 +32087,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="34964">
 <summary>
 Bind UDP sockets to the inetd_child port.
 </summary>
@@ -32014,7 +32098,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983">
 <summary>
 Make a TCP connection to the inetd_child port.
 </summary>
@@ -32024,7 +32108,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
+<interface name="corenet_send_inetd_child_client_packets" lineno="35003">
 <summary>
 Send inetd_child_client packets.
 </summary>
@@ -32035,7 +32119,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022">
 <summary>
 Do not audit attempts to send inetd_child_client packets.
 </summary>
@@ -32046,7 +32130,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="35041">
 <summary>
 Receive inetd_child_client packets.
 </summary>
@@ -32057,7 +32141,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060">
 <summary>
 Do not audit attempts to receive inetd_child_client packets.
 </summary>
@@ -32068,7 +32152,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079">
 <summary>
 Send and receive inetd_child_client packets.
 </summary>
@@ -32079,7 +32163,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095">
 <summary>
 Do not audit attempts to send and receive inetd_child_client packets.
 </summary>
@@ -32090,7 +32174,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110">
 <summary>
 Relabel packets to inetd_child_client the packet type.
 </summary>
@@ -32100,7 +32184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
+<interface name="corenet_send_inetd_child_server_packets" lineno="35130">
 <summary>
 Send inetd_child_server packets.
 </summary>
@@ -32111,7 +32195,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149">
 <summary>
 Do not audit attempts to send inetd_child_server packets.
 </summary>
@@ -32122,7 +32206,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="35168">
 <summary>
 Receive inetd_child_server packets.
 </summary>
@@ -32133,7 +32217,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187">
 <summary>
 Do not audit attempts to receive inetd_child_server packets.
 </summary>
@@ -32144,7 +32228,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206">
 <summary>
 Send and receive inetd_child_server packets.
 </summary>
@@ -32155,7 +32239,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222">
 <summary>
 Do not audit attempts to send and receive inetd_child_server packets.
 </summary>
@@ -32166,7 +32250,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237">
 <summary>
 Relabel packets to inetd_child_server the packet type.
 </summary>
@@ -32176,7 +32260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
+<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259">
 <summary>
 Send and receive TCP traffic on the innd port.
 </summary>
@@ -32187,7 +32271,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_innd_port" lineno="35256">
+<interface name="corenet_udp_send_innd_port" lineno="35274">
 <summary>
 Send UDP traffic on the innd port.
 </summary>
@@ -32198,7 +32282,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
+<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289">
 <summary>
 Do not audit attempts to send UDP traffic on the innd port.
 </summary>
@@ -32209,7 +32293,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35286">
+<interface name="corenet_udp_receive_innd_port" lineno="35304">
 <summary>
 Receive UDP traffic on the innd port.
 </summary>
@@ -32220,7 +32304,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
+<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319">
 <summary>
 Do not audit attempts to receive UDP traffic on the innd port.
 </summary>
@@ -32231,7 +32315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
+<interface name="corenet_udp_sendrecv_innd_port" lineno="35334">
 <summary>
 Send and receive UDP traffic on the innd port.
 </summary>
@@ -32242,7 +32326,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
+<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the innd port.
@@ -32254,7 +32338,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35347">
+<interface name="corenet_tcp_bind_innd_port" lineno="35365">
 <summary>
 Bind TCP sockets to the innd port.
 </summary>
@@ -32265,7 +32349,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35367">
+<interface name="corenet_udp_bind_innd_port" lineno="35385">
 <summary>
 Bind UDP sockets to the innd port.
 </summary>
@@ -32276,7 +32360,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35386">
+<interface name="corenet_tcp_connect_innd_port" lineno="35404">
 <summary>
 Make a TCP connection to the innd port.
 </summary>
@@ -32286,7 +32370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_client_packets" lineno="35406">
+<interface name="corenet_send_innd_client_packets" lineno="35424">
 <summary>
 Send innd_client packets.
 </summary>
@@ -32297,7 +32381,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443">
 <summary>
 Do not audit attempts to send innd_client packets.
 </summary>
@@ -32308,7 +32392,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35444">
+<interface name="corenet_receive_innd_client_packets" lineno="35462">
 <summary>
 Receive innd_client packets.
 </summary>
@@ -32319,7 +32403,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481">
 <summary>
 Do not audit attempts to receive innd_client packets.
 </summary>
@@ -32330,7 +32414,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="35500">
 <summary>
 Send and receive innd_client packets.
 </summary>
@@ -32341,7 +32425,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516">
 <summary>
 Do not audit attempts to send and receive innd_client packets.
 </summary>
@@ -32352,7 +32436,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
+<interface name="corenet_relabelto_innd_client_packets" lineno="35531">
 <summary>
 Relabel packets to innd_client the packet type.
 </summary>
@@ -32362,7 +32446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_server_packets" lineno="35533">
+<interface name="corenet_send_innd_server_packets" lineno="35551">
 <summary>
 Send innd_server packets.
 </summary>
@@ -32373,7 +32457,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570">
 <summary>
 Do not audit attempts to send innd_server packets.
 </summary>
@@ -32384,7 +32468,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35571">
+<interface name="corenet_receive_innd_server_packets" lineno="35589">
 <summary>
 Receive innd_server packets.
 </summary>
@@ -32395,7 +32479,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608">
 <summary>
 Do not audit attempts to receive innd_server packets.
 </summary>
@@ -32406,7 +32490,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="35627">
 <summary>
 Send and receive innd_server packets.
 </summary>
@@ -32417,7 +32501,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643">
 <summary>
 Do not audit attempts to send and receive innd_server packets.
 </summary>
@@ -32428,7 +32512,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
+<interface name="corenet_relabelto_innd_server_packets" lineno="35658">
 <summary>
 Relabel packets to innd_server the packet type.
 </summary>
@@ -32438,7 +32522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
+<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680">
 <summary>
 Send and receive TCP traffic on the interwise port.
 </summary>
@@ -32449,7 +32533,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35677">
+<interface name="corenet_udp_send_interwise_port" lineno="35695">
 <summary>
 Send UDP traffic on the interwise port.
 </summary>
@@ -32460,7 +32544,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
+<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710">
 <summary>
 Do not audit attempts to send UDP traffic on the interwise port.
 </summary>
@@ -32471,7 +32555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35707">
+<interface name="corenet_udp_receive_interwise_port" lineno="35725">
 <summary>
 Receive UDP traffic on the interwise port.
 </summary>
@@ -32482,7 +32566,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
+<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740">
 <summary>
 Do not audit attempts to receive UDP traffic on the interwise port.
 </summary>
@@ -32493,7 +32577,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
+<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755">
 <summary>
 Send and receive UDP traffic on the interwise port.
 </summary>
@@ -32504,7 +32588,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
+<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the interwise port.
@@ -32516,7 +32600,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
+<interface name="corenet_tcp_bind_interwise_port" lineno="35786">
 <summary>
 Bind TCP sockets to the interwise port.
 </summary>
@@ -32527,7 +32611,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35788">
+<interface name="corenet_udp_bind_interwise_port" lineno="35806">
 <summary>
 Bind UDP sockets to the interwise port.
 </summary>
@@ -32538,7 +32622,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
+<interface name="corenet_tcp_connect_interwise_port" lineno="35825">
 <summary>
 Make a TCP connection to the interwise port.
 </summary>
@@ -32548,7 +32632,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35827">
+<interface name="corenet_send_interwise_client_packets" lineno="35845">
 <summary>
 Send interwise_client packets.
 </summary>
@@ -32559,7 +32643,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864">
 <summary>
 Do not audit attempts to send interwise_client packets.
 </summary>
@@ -32570,7 +32654,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35865">
+<interface name="corenet_receive_interwise_client_packets" lineno="35883">
 <summary>
 Receive interwise_client packets.
 </summary>
@@ -32581,7 +32665,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902">
 <summary>
 Do not audit attempts to receive interwise_client packets.
 </summary>
@@ -32592,7 +32676,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921">
 <summary>
 Send and receive interwise_client packets.
 </summary>
@@ -32603,7 +32687,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937">
 <summary>
 Do not audit attempts to send and receive interwise_client packets.
 </summary>
@@ -32614,7 +32698,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="35952">
 <summary>
 Relabel packets to interwise_client the packet type.
 </summary>
@@ -32624,7 +32708,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35954">
+<interface name="corenet_send_interwise_server_packets" lineno="35972">
 <summary>
 Send interwise_server packets.
 </summary>
@@ -32635,7 +32719,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991">
 <summary>
 Do not audit attempts to send interwise_server packets.
 </summary>
@@ -32646,7 +32730,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="35992">
+<interface name="corenet_receive_interwise_server_packets" lineno="36010">
 <summary>
 Receive interwise_server packets.
 </summary>
@@ -32657,7 +32741,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029">
 <summary>
 Do not audit attempts to receive interwise_server packets.
 </summary>
@@ -32668,7 +32752,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048">
 <summary>
 Send and receive interwise_server packets.
 </summary>
@@ -32679,7 +32763,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064">
 <summary>
 Do not audit attempts to send and receive interwise_server packets.
 </summary>
@@ -32690,7 +32774,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="36079">
 <summary>
 Relabel packets to interwise_server the packet type.
 </summary>
@@ -32700,7 +32784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
+<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101">
 <summary>
 Send and receive TCP traffic on the ionixnetmon port.
 </summary>
@@ -32711,7 +32795,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
+<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116">
 <summary>
 Send UDP traffic on the ionixnetmon port.
 </summary>
@@ -32722,7 +32806,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
+<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131">
 <summary>
 Do not audit attempts to send UDP traffic on the ionixnetmon port.
 </summary>
@@ -32733,7 +32817,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
+<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146">
 <summary>
 Receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32744,7 +32828,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
+<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161">
 <summary>
 Do not audit attempts to receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32755,7 +32839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
+<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176">
 <summary>
 Send and receive UDP traffic on the ionixnetmon port.
 </summary>
@@ -32766,7 +32850,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
+<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ionixnetmon port.
@@ -32778,7 +32862,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207">
 <summary>
 Bind TCP sockets to the ionixnetmon port.
 </summary>
@@ -32789,7 +32873,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227">
 <summary>
 Bind UDP sockets to the ionixnetmon port.
 </summary>
@@ -32800,7 +32884,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246">
 <summary>
 Make a TCP connection to the ionixnetmon port.
 </summary>
@@ -32810,7 +32894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266">
 <summary>
 Send ionixnetmon_client packets.
 </summary>
@@ -32821,7 +32905,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285">
 <summary>
 Do not audit attempts to send ionixnetmon_client packets.
 </summary>
@@ -32832,7 +32916,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304">
 <summary>
 Receive ionixnetmon_client packets.
 </summary>
@@ -32843,7 +32927,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323">
 <summary>
 Do not audit attempts to receive ionixnetmon_client packets.
 </summary>
@@ -32854,7 +32938,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342">
 <summary>
 Send and receive ionixnetmon_client packets.
 </summary>
@@ -32865,7 +32949,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_client packets.
 </summary>
@@ -32876,7 +32960,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373">
 <summary>
 Relabel packets to ionixnetmon_client the packet type.
 </summary>
@@ -32886,7 +32970,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393">
 <summary>
 Send ionixnetmon_server packets.
 </summary>
@@ -32897,7 +32981,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412">
 <summary>
 Do not audit attempts to send ionixnetmon_server packets.
 </summary>
@@ -32908,7 +32992,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431">
 <summary>
 Receive ionixnetmon_server packets.
 </summary>
@@ -32919,7 +33003,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450">
 <summary>
 Do not audit attempts to receive ionixnetmon_server packets.
 </summary>
@@ -32930,7 +33014,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469">
 <summary>
 Send and receive ionixnetmon_server packets.
 </summary>
@@ -32941,7 +33025,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_server packets.
 </summary>
@@ -32952,7 +33036,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500">
 <summary>
 Relabel packets to ionixnetmon_server the packet type.
 </summary>
@@ -32962,7 +33046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
+<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522">
 <summary>
 Send and receive TCP traffic on the ipmi port.
 </summary>
@@ -32973,7 +33057,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36519">
+<interface name="corenet_udp_send_ipmi_port" lineno="36537">
 <summary>
 Send UDP traffic on the ipmi port.
 </summary>
@@ -32984,7 +33068,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
+<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552">
 <summary>
 Do not audit attempts to send UDP traffic on the ipmi port.
 </summary>
@@ -32995,7 +33079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
+<interface name="corenet_udp_receive_ipmi_port" lineno="36567">
 <summary>
 Receive UDP traffic on the ipmi port.
 </summary>
@@ -33006,7 +33090,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
+<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipmi port.
 </summary>
@@ -33017,7 +33101,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
+<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597">
 <summary>
 Send and receive UDP traffic on the ipmi port.
 </summary>
@@ -33028,7 +33112,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
+<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipmi port.
@@ -33040,7 +33124,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="36628">
 <summary>
 Bind TCP sockets to the ipmi port.
 </summary>
@@ -33051,7 +33135,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
+<interface name="corenet_udp_bind_ipmi_port" lineno="36648">
 <summary>
 Bind UDP sockets to the ipmi port.
 </summary>
@@ -33062,7 +33146,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="36667">
 <summary>
 Make a TCP connection to the ipmi port.
 </summary>
@@ -33072,7 +33156,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36669">
+<interface name="corenet_send_ipmi_client_packets" lineno="36687">
 <summary>
 Send ipmi_client packets.
 </summary>
@@ -33083,7 +33167,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706">
 <summary>
 Do not audit attempts to send ipmi_client packets.
 </summary>
@@ -33094,7 +33178,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
+<interface name="corenet_receive_ipmi_client_packets" lineno="36725">
 <summary>
 Receive ipmi_client packets.
 </summary>
@@ -33105,7 +33189,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744">
 <summary>
 Do not audit attempts to receive ipmi_client packets.
 </summary>
@@ -33116,7 +33200,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763">
 <summary>
 Send and receive ipmi_client packets.
 </summary>
@@ -33127,7 +33211,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779">
 <summary>
 Do not audit attempts to send and receive ipmi_client packets.
 </summary>
@@ -33138,7 +33222,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794">
 <summary>
 Relabel packets to ipmi_client the packet type.
 </summary>
@@ -33148,7 +33232,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36796">
+<interface name="corenet_send_ipmi_server_packets" lineno="36814">
 <summary>
 Send ipmi_server packets.
 </summary>
@@ -33159,7 +33243,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833">
 <summary>
 Do not audit attempts to send ipmi_server packets.
 </summary>
@@ -33170,7 +33254,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
+<interface name="corenet_receive_ipmi_server_packets" lineno="36852">
 <summary>
 Receive ipmi_server packets.
 </summary>
@@ -33181,7 +33265,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871">
 <summary>
 Do not audit attempts to receive ipmi_server packets.
 </summary>
@@ -33192,7 +33276,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890">
 <summary>
 Send and receive ipmi_server packets.
 </summary>
@@ -33203,7 +33287,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906">
 <summary>
 Do not audit attempts to send and receive ipmi_server packets.
 </summary>
@@ -33214,7 +33298,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921">
 <summary>
 Relabel packets to ipmi_server the packet type.
 </summary>
@@ -33224,7 +33308,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
+<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943">
 <summary>
 Send and receive TCP traffic on the ipp port.
 </summary>
@@ -33235,7 +33319,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36940">
+<interface name="corenet_udp_send_ipp_port" lineno="36958">
 <summary>
 Send UDP traffic on the ipp port.
 </summary>
@@ -33246,7 +33330,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
+<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973">
 <summary>
 Do not audit attempts to send UDP traffic on the ipp port.
 </summary>
@@ -33257,7 +33341,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36970">
+<interface name="corenet_udp_receive_ipp_port" lineno="36988">
 <summary>
 Receive UDP traffic on the ipp port.
 </summary>
@@ -33268,7 +33352,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
+<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipp port.
 </summary>
@@ -33279,7 +33363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
+<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018">
 <summary>
 Send and receive UDP traffic on the ipp port.
 </summary>
@@ -33290,7 +33374,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
+<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipp port.
@@ -33302,7 +33386,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
+<interface name="corenet_tcp_bind_ipp_port" lineno="37049">
 <summary>
 Bind TCP sockets to the ipp port.
 </summary>
@@ -33313,7 +33397,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="37051">
+<interface name="corenet_udp_bind_ipp_port" lineno="37069">
 <summary>
 Bind UDP sockets to the ipp port.
 </summary>
@@ -33324,7 +33408,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
+<interface name="corenet_tcp_connect_ipp_port" lineno="37088">
 <summary>
 Make a TCP connection to the ipp port.
 </summary>
@@ -33334,7 +33418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_client_packets" lineno="37090">
+<interface name="corenet_send_ipp_client_packets" lineno="37108">
 <summary>
 Send ipp_client packets.
 </summary>
@@ -33345,7 +33429,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127">
 <summary>
 Do not audit attempts to send ipp_client packets.
 </summary>
@@ -33356,7 +33440,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37128">
+<interface name="corenet_receive_ipp_client_packets" lineno="37146">
 <summary>
 Receive ipp_client packets.
 </summary>
@@ -33367,7 +33451,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165">
 <summary>
 Do not audit attempts to receive ipp_client packets.
 </summary>
@@ -33378,7 +33462,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184">
 <summary>
 Send and receive ipp_client packets.
 </summary>
@@ -33389,7 +33473,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200">
 <summary>
 Do not audit attempts to send and receive ipp_client packets.
 </summary>
@@ -33400,7 +33484,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="37215">
 <summary>
 Relabel packets to ipp_client the packet type.
 </summary>
@@ -33410,7 +33494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37217">
+<interface name="corenet_send_ipp_server_packets" lineno="37235">
 <summary>
 Send ipp_server packets.
 </summary>
@@ -33421,7 +33505,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254">
 <summary>
 Do not audit attempts to send ipp_server packets.
 </summary>
@@ -33432,7 +33516,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37255">
+<interface name="corenet_receive_ipp_server_packets" lineno="37273">
 <summary>
 Receive ipp_server packets.
 </summary>
@@ -33443,7 +33527,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292">
 <summary>
 Do not audit attempts to receive ipp_server packets.
 </summary>
@@ -33454,7 +33538,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311">
 <summary>
 Send and receive ipp_server packets.
 </summary>
@@ -33465,7 +33549,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327">
 <summary>
 Do not audit attempts to send and receive ipp_server packets.
 </summary>
@@ -33476,7 +33560,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="37342">
 <summary>
 Relabel packets to ipp_server the packet type.
 </summary>
@@ -33486,7 +33570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
+<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364">
 <summary>
 Send and receive TCP traffic on the ipsecnat port.
 </summary>
@@ -33497,7 +33581,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
+<interface name="corenet_udp_send_ipsecnat_port" lineno="37379">
 <summary>
 Send UDP traffic on the ipsecnat port.
 </summary>
@@ -33508,7 +33592,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
+<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394">
 <summary>
 Do not audit attempts to send UDP traffic on the ipsecnat port.
 </summary>
@@ -33519,7 +33603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
+<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409">
 <summary>
 Receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33530,7 +33614,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
+<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424">
 <summary>
 Do not audit attempts to receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33541,7 +33625,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
+<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439">
 <summary>
 Send and receive UDP traffic on the ipsecnat port.
 </summary>
@@ -33552,7 +33636,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
+<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ipsecnat port.
@@ -33564,7 +33648,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470">
 <summary>
 Bind TCP sockets to the ipsecnat port.
 </summary>
@@ -33575,7 +33659,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490">
 <summary>
 Bind UDP sockets to the ipsecnat port.
 </summary>
@@ -33586,7 +33670,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509">
 <summary>
 Make a TCP connection to the ipsecnat port.
 </summary>
@@ -33596,7 +33680,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="37529">
 <summary>
 Send ipsecnat_client packets.
 </summary>
@@ -33607,7 +33691,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548">
 <summary>
 Do not audit attempts to send ipsecnat_client packets.
 </summary>
@@ -33618,7 +33702,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567">
 <summary>
 Receive ipsecnat_client packets.
 </summary>
@@ -33629,7 +33713,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586">
 <summary>
 Do not audit attempts to receive ipsecnat_client packets.
 </summary>
@@ -33640,7 +33724,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605">
 <summary>
 Send and receive ipsecnat_client packets.
 </summary>
@@ -33651,7 +33735,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621">
 <summary>
 Do not audit attempts to send and receive ipsecnat_client packets.
 </summary>
@@ -33662,7 +33746,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636">
 <summary>
 Relabel packets to ipsecnat_client the packet type.
 </summary>
@@ -33672,7 +33756,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="37656">
 <summary>
 Send ipsecnat_server packets.
 </summary>
@@ -33683,7 +33767,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675">
 <summary>
 Do not audit attempts to send ipsecnat_server packets.
 </summary>
@@ -33694,7 +33778,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694">
 <summary>
 Receive ipsecnat_server packets.
 </summary>
@@ -33705,7 +33789,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713">
 <summary>
 Do not audit attempts to receive ipsecnat_server packets.
 </summary>
@@ -33716,7 +33800,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732">
 <summary>
 Send and receive ipsecnat_server packets.
 </summary>
@@ -33727,7 +33811,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748">
 <summary>
 Do not audit attempts to send and receive ipsecnat_server packets.
 </summary>
@@ -33738,7 +33822,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763">
 <summary>
 Relabel packets to ipsecnat_server the packet type.
 </summary>
@@ -33748,7 +33832,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
+<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785">
 <summary>
 Send and receive TCP traffic on the ircd port.
 </summary>
@@ -33759,7 +33843,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37782">
+<interface name="corenet_udp_send_ircd_port" lineno="37800">
 <summary>
 Send UDP traffic on the ircd port.
 </summary>
@@ -33770,7 +33854,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
+<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815">
 <summary>
 Do not audit attempts to send UDP traffic on the ircd port.
 </summary>
@@ -33781,7 +33865,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37812">
+<interface name="corenet_udp_receive_ircd_port" lineno="37830">
 <summary>
 Receive UDP traffic on the ircd port.
 </summary>
@@ -33792,7 +33876,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
+<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845">
 <summary>
 Do not audit attempts to receive UDP traffic on the ircd port.
 </summary>
@@ -33803,7 +33887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
+<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860">
 <summary>
 Send and receive UDP traffic on the ircd port.
 </summary>
@@ -33814,7 +33898,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
+<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ircd port.
@@ -33826,7 +33910,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
+<interface name="corenet_tcp_bind_ircd_port" lineno="37891">
 <summary>
 Bind TCP sockets to the ircd port.
 </summary>
@@ -33837,7 +33921,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37893">
+<interface name="corenet_udp_bind_ircd_port" lineno="37911">
 <summary>
 Bind UDP sockets to the ircd port.
 </summary>
@@ -33848,7 +33932,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
+<interface name="corenet_tcp_connect_ircd_port" lineno="37930">
 <summary>
 Make a TCP connection to the ircd port.
 </summary>
@@ -33858,7 +33942,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37932">
+<interface name="corenet_send_ircd_client_packets" lineno="37950">
 <summary>
 Send ircd_client packets.
 </summary>
@@ -33869,7 +33953,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969">
 <summary>
 Do not audit attempts to send ircd_client packets.
 </summary>
@@ -33880,7 +33964,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37970">
+<interface name="corenet_receive_ircd_client_packets" lineno="37988">
 <summary>
 Receive ircd_client packets.
 </summary>
@@ -33891,7 +33975,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007">
 <summary>
 Do not audit attempts to receive ircd_client packets.
 </summary>
@@ -33902,7 +33986,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026">
 <summary>
 Send and receive ircd_client packets.
 </summary>
@@ -33913,7 +33997,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042">
 <summary>
 Do not audit attempts to send and receive ircd_client packets.
 </summary>
@@ -33924,7 +34008,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="38057">
 <summary>
 Relabel packets to ircd_client the packet type.
 </summary>
@@ -33934,7 +34018,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_server_packets" lineno="38059">
+<interface name="corenet_send_ircd_server_packets" lineno="38077">
 <summary>
 Send ircd_server packets.
 </summary>
@@ -33945,7 +34029,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096">
 <summary>
 Do not audit attempts to send ircd_server packets.
 </summary>
@@ -33956,7 +34040,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="38097">
+<interface name="corenet_receive_ircd_server_packets" lineno="38115">
 <summary>
 Receive ircd_server packets.
 </summary>
@@ -33967,7 +34051,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134">
 <summary>
 Do not audit attempts to receive ircd_server packets.
 </summary>
@@ -33978,7 +34062,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153">
 <summary>
 Send and receive ircd_server packets.
 </summary>
@@ -33989,7 +34073,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169">
 <summary>
 Do not audit attempts to send and receive ircd_server packets.
 </summary>
@@ -34000,7 +34084,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="38184">
 <summary>
 Relabel packets to ircd_server the packet type.
 </summary>
@@ -34010,7 +34094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
+<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206">
 <summary>
 Send and receive TCP traffic on the isakmp port.
 </summary>
@@ -34021,7 +34105,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38203">
+<interface name="corenet_udp_send_isakmp_port" lineno="38221">
 <summary>
 Send UDP traffic on the isakmp port.
 </summary>
@@ -34032,7 +34116,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
+<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236">
 <summary>
 Do not audit attempts to send UDP traffic on the isakmp port.
 </summary>
@@ -34043,7 +34127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
+<interface name="corenet_udp_receive_isakmp_port" lineno="38251">
 <summary>
 Receive UDP traffic on the isakmp port.
 </summary>
@@ -34054,7 +34138,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
+<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266">
 <summary>
 Do not audit attempts to receive UDP traffic on the isakmp port.
 </summary>
@@ -34065,7 +34149,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
+<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281">
 <summary>
 Send and receive UDP traffic on the isakmp port.
 </summary>
@@ -34076,7 +34160,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
+<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the isakmp port.
@@ -34088,7 +34172,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="38312">
 <summary>
 Bind TCP sockets to the isakmp port.
 </summary>
@@ -34099,7 +34183,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
+<interface name="corenet_udp_bind_isakmp_port" lineno="38332">
 <summary>
 Bind UDP sockets to the isakmp port.
 </summary>
@@ -34110,7 +34194,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="38351">
 <summary>
 Make a TCP connection to the isakmp port.
 </summary>
@@ -34120,7 +34204,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38353">
+<interface name="corenet_send_isakmp_client_packets" lineno="38371">
 <summary>
 Send isakmp_client packets.
 </summary>
@@ -34131,7 +34215,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390">
 <summary>
 Do not audit attempts to send isakmp_client packets.
 </summary>
@@ -34142,7 +34226,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
+<interface name="corenet_receive_isakmp_client_packets" lineno="38409">
 <summary>
 Receive isakmp_client packets.
 </summary>
@@ -34153,7 +34237,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428">
 <summary>
 Do not audit attempts to receive isakmp_client packets.
 </summary>
@@ -34164,7 +34248,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447">
 <summary>
 Send and receive isakmp_client packets.
 </summary>
@@ -34175,7 +34259,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463">
 <summary>
 Do not audit attempts to send and receive isakmp_client packets.
 </summary>
@@ -34186,7 +34270,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478">
 <summary>
 Relabel packets to isakmp_client the packet type.
 </summary>
@@ -34196,7 +34280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38480">
+<interface name="corenet_send_isakmp_server_packets" lineno="38498">
 <summary>
 Send isakmp_server packets.
 </summary>
@@ -34207,7 +34291,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517">
 <summary>
 Do not audit attempts to send isakmp_server packets.
 </summary>
@@ -34218,7 +34302,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
+<interface name="corenet_receive_isakmp_server_packets" lineno="38536">
 <summary>
 Receive isakmp_server packets.
 </summary>
@@ -34229,7 +34313,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555">
 <summary>
 Do not audit attempts to receive isakmp_server packets.
 </summary>
@@ -34240,7 +34324,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574">
 <summary>
 Send and receive isakmp_server packets.
 </summary>
@@ -34251,7 +34335,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590">
 <summary>
 Do not audit attempts to send and receive isakmp_server packets.
 </summary>
@@ -34262,7 +34346,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605">
 <summary>
 Relabel packets to isakmp_server the packet type.
 </summary>
@@ -34272,7 +34356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
+<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627">
 <summary>
 Send and receive TCP traffic on the iscsi port.
 </summary>
@@ -34283,7 +34367,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38624">
+<interface name="corenet_udp_send_iscsi_port" lineno="38642">
 <summary>
 Send UDP traffic on the iscsi port.
 </summary>
@@ -34294,7 +34378,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
+<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657">
 <summary>
 Do not audit attempts to send UDP traffic on the iscsi port.
 </summary>
@@ -34305,7 +34389,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
+<interface name="corenet_udp_receive_iscsi_port" lineno="38672">
 <summary>
 Receive UDP traffic on the iscsi port.
 </summary>
@@ -34316,7 +34400,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
+<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687">
 <summary>
 Do not audit attempts to receive UDP traffic on the iscsi port.
 </summary>
@@ -34327,7 +34411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
+<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702">
 <summary>
 Send and receive UDP traffic on the iscsi port.
 </summary>
@@ -34338,7 +34422,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
+<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the iscsi port.
@@ -34350,7 +34434,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="38733">
 <summary>
 Bind TCP sockets to the iscsi port.
 </summary>
@@ -34361,7 +34445,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
+<interface name="corenet_udp_bind_iscsi_port" lineno="38753">
 <summary>
 Bind UDP sockets to the iscsi port.
 </summary>
@@ -34372,7 +34456,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="38772">
 <summary>
 Make a TCP connection to the iscsi port.
 </summary>
@@ -34382,7 +34466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38774">
+<interface name="corenet_send_iscsi_client_packets" lineno="38792">
 <summary>
 Send iscsi_client packets.
 </summary>
@@ -34393,7 +34477,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811">
 <summary>
 Do not audit attempts to send iscsi_client packets.
 </summary>
@@ -34404,7 +34488,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
+<interface name="corenet_receive_iscsi_client_packets" lineno="38830">
 <summary>
 Receive iscsi_client packets.
 </summary>
@@ -34415,7 +34499,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849">
 <summary>
 Do not audit attempts to receive iscsi_client packets.
 </summary>
@@ -34426,7 +34510,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868">
 <summary>
 Send and receive iscsi_client packets.
 </summary>
@@ -34437,7 +34521,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884">
 <summary>
 Do not audit attempts to send and receive iscsi_client packets.
 </summary>
@@ -34448,7 +34532,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899">
 <summary>
 Relabel packets to iscsi_client the packet type.
 </summary>
@@ -34458,7 +34542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38901">
+<interface name="corenet_send_iscsi_server_packets" lineno="38919">
 <summary>
 Send iscsi_server packets.
 </summary>
@@ -34469,7 +34553,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938">
 <summary>
 Do not audit attempts to send iscsi_server packets.
 </summary>
@@ -34480,7 +34564,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
+<interface name="corenet_receive_iscsi_server_packets" lineno="38957">
 <summary>
 Receive iscsi_server packets.
 </summary>
@@ -34491,7 +34575,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976">
 <summary>
 Do not audit attempts to receive iscsi_server packets.
 </summary>
@@ -34502,7 +34586,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995">
 <summary>
 Send and receive iscsi_server packets.
 </summary>
@@ -34513,7 +34597,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011">
 <summary>
 Do not audit attempts to send and receive iscsi_server packets.
 </summary>
@@ -34524,7 +34608,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026">
 <summary>
 Relabel packets to iscsi_server the packet type.
 </summary>
@@ -34534,7 +34618,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
+<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048">
 <summary>
 Send and receive TCP traffic on the isns port.
 </summary>
@@ -34545,7 +34629,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_isns_port" lineno="39045">
+<interface name="corenet_udp_send_isns_port" lineno="39063">
 <summary>
 Send UDP traffic on the isns port.
 </summary>
@@ -34556,7 +34640,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
+<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078">
 <summary>
 Do not audit attempts to send UDP traffic on the isns port.
 </summary>
@@ -34567,7 +34651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_isns_port" lineno="39075">
+<interface name="corenet_udp_receive_isns_port" lineno="39093">
 <summary>
 Receive UDP traffic on the isns port.
 </summary>
@@ -34578,7 +34662,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
+<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108">
 <summary>
 Do not audit attempts to receive UDP traffic on the isns port.
 </summary>
@@ -34589,7 +34673,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
+<interface name="corenet_udp_sendrecv_isns_port" lineno="39123">
 <summary>
 Send and receive UDP traffic on the isns port.
 </summary>
@@ -34600,7 +34684,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
+<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the isns port.
@@ -34612,7 +34696,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39136">
+<interface name="corenet_tcp_bind_isns_port" lineno="39154">
 <summary>
 Bind TCP sockets to the isns port.
 </summary>
@@ -34623,7 +34707,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39156">
+<interface name="corenet_udp_bind_isns_port" lineno="39174">
 <summary>
 Bind UDP sockets to the isns port.
 </summary>
@@ -34634,7 +34718,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39175">
+<interface name="corenet_tcp_connect_isns_port" lineno="39193">
 <summary>
 Make a TCP connection to the isns port.
 </summary>
@@ -34644,7 +34728,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_client_packets" lineno="39195">
+<interface name="corenet_send_isns_client_packets" lineno="39213">
 <summary>
 Send isns_client packets.
 </summary>
@@ -34655,7 +34739,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232">
 <summary>
 Do not audit attempts to send isns_client packets.
 </summary>
@@ -34666,7 +34750,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39233">
+<interface name="corenet_receive_isns_client_packets" lineno="39251">
 <summary>
 Receive isns_client packets.
 </summary>
@@ -34677,7 +34761,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270">
 <summary>
 Do not audit attempts to receive isns_client packets.
 </summary>
@@ -34688,7 +34772,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="39289">
 <summary>
 Send and receive isns_client packets.
 </summary>
@@ -34699,7 +34783,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305">
 <summary>
 Do not audit attempts to send and receive isns_client packets.
 </summary>
@@ -34710,7 +34794,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
+<interface name="corenet_relabelto_isns_client_packets" lineno="39320">
 <summary>
 Relabel packets to isns_client the packet type.
 </summary>
@@ -34720,7 +34804,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_server_packets" lineno="39322">
+<interface name="corenet_send_isns_server_packets" lineno="39340">
 <summary>
 Send isns_server packets.
 </summary>
@@ -34731,7 +34815,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359">
 <summary>
 Do not audit attempts to send isns_server packets.
 </summary>
@@ -34742,7 +34826,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39360">
+<interface name="corenet_receive_isns_server_packets" lineno="39378">
 <summary>
 Receive isns_server packets.
 </summary>
@@ -34753,7 +34837,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397">
 <summary>
 Do not audit attempts to receive isns_server packets.
 </summary>
@@ -34764,7 +34848,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="39416">
 <summary>
 Send and receive isns_server packets.
 </summary>
@@ -34775,7 +34859,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432">
 <summary>
 Do not audit attempts to send and receive isns_server packets.
 </summary>
@@ -34786,7 +34870,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
+<interface name="corenet_relabelto_isns_server_packets" lineno="39447">
 <summary>
 Relabel packets to isns_server the packet type.
 </summary>
@@ -34796,7 +34880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
+<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469">
 <summary>
 Send and receive TCP traffic on the jabber_client port.
 </summary>
@@ -34807,7 +34891,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
+<interface name="corenet_udp_send_jabber_client_port" lineno="39484">
 <summary>
 Send UDP traffic on the jabber_client port.
 </summary>
@@ -34818,7 +34902,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
+<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499">
 <summary>
 Do not audit attempts to send UDP traffic on the jabber_client port.
 </summary>
@@ -34829,7 +34913,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
+<interface name="corenet_udp_receive_jabber_client_port" lineno="39514">
 <summary>
 Receive UDP traffic on the jabber_client port.
 </summary>
@@ -34840,7 +34924,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
+<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529">
 <summary>
 Do not audit attempts to receive UDP traffic on the jabber_client port.
 </summary>
@@ -34851,7 +34935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
+<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544">
 <summary>
 Send and receive UDP traffic on the jabber_client port.
 </summary>
@@ -34862,7 +34946,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jabber_client port.
@@ -34874,7 +34958,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575">
 <summary>
 Bind TCP sockets to the jabber_client port.
 </summary>
@@ -34885,7 +34969,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="39595">
 <summary>
 Bind UDP sockets to the jabber_client port.
 </summary>
@@ -34896,7 +34980,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614">
 <summary>
 Make a TCP connection to the jabber_client port.
 </summary>
@@ -34906,7 +34990,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
+<interface name="corenet_send_jabber_client_client_packets" lineno="39634">
 <summary>
 Send jabber_client_client packets.
 </summary>
@@ -34917,7 +35001,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653">
 <summary>
 Do not audit attempts to send jabber_client_client packets.
 </summary>
@@ -34928,7 +35012,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="39672">
 <summary>
 Receive jabber_client_client packets.
 </summary>
@@ -34939,7 +35023,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691">
 <summary>
 Do not audit attempts to receive jabber_client_client packets.
 </summary>
@@ -34950,7 +35034,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710">
 <summary>
 Send and receive jabber_client_client packets.
 </summary>
@@ -34961,7 +35045,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726">
 <summary>
 Do not audit attempts to send and receive jabber_client_client packets.
 </summary>
@@ -34972,7 +35056,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741">
 <summary>
 Relabel packets to jabber_client_client the packet type.
 </summary>
@@ -34982,7 +35066,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
+<interface name="corenet_send_jabber_client_server_packets" lineno="39761">
 <summary>
 Send jabber_client_server packets.
 </summary>
@@ -34993,7 +35077,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780">
 <summary>
 Do not audit attempts to send jabber_client_server packets.
 </summary>
@@ -35004,7 +35088,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="39799">
 <summary>
 Receive jabber_client_server packets.
 </summary>
@@ -35015,7 +35099,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818">
 <summary>
 Do not audit attempts to receive jabber_client_server packets.
 </summary>
@@ -35026,7 +35110,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837">
 <summary>
 Send and receive jabber_client_server packets.
 </summary>
@@ -35037,7 +35121,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853">
 <summary>
 Do not audit attempts to send and receive jabber_client_server packets.
 </summary>
@@ -35048,7 +35132,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868">
 <summary>
 Relabel packets to jabber_client_server the packet type.
 </summary>
@@ -35058,7 +35142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
+<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890">
 <summary>
 Send and receive TCP traffic on the jabber_interserver port.
 </summary>
@@ -35069,7 +35153,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
+<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905">
 <summary>
 Send UDP traffic on the jabber_interserver port.
 </summary>
@@ -35080,7 +35164,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
+<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920">
 <summary>
 Do not audit attempts to send UDP traffic on the jabber_interserver port.
 </summary>
@@ -35091,7 +35175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
+<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935">
 <summary>
 Receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -35102,7 +35186,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
+<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950">
 <summary>
 Do not audit attempts to receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -35113,7 +35197,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
+<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965">
 <summary>
 Send and receive UDP traffic on the jabber_interserver port.
 </summary>
@@ -35124,7 +35208,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jabber_interserver port.
@@ -35136,7 +35220,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996">
 <summary>
 Bind TCP sockets to the jabber_interserver port.
 </summary>
@@ -35147,7 +35231,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016">
 <summary>
 Bind UDP sockets to the jabber_interserver port.
 </summary>
@@ -35158,7 +35242,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035">
 <summary>
 Make a TCP connection to the jabber_interserver port.
 </summary>
@@ -35168,7 +35252,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055">
 <summary>
 Send jabber_interserver_client packets.
 </summary>
@@ -35179,7 +35263,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074">
 <summary>
 Do not audit attempts to send jabber_interserver_client packets.
 </summary>
@@ -35190,7 +35274,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093">
 <summary>
 Receive jabber_interserver_client packets.
 </summary>
@@ -35201,7 +35285,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112">
 <summary>
 Do not audit attempts to receive jabber_interserver_client packets.
 </summary>
@@ -35212,7 +35296,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131">
 <summary>
 Send and receive jabber_interserver_client packets.
 </summary>
@@ -35223,7 +35307,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_client packets.
 </summary>
@@ -35234,7 +35318,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162">
 <summary>
 Relabel packets to jabber_interserver_client the packet type.
 </summary>
@@ -35244,7 +35328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182">
 <summary>
 Send jabber_interserver_server packets.
 </summary>
@@ -35255,7 +35339,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201">
 <summary>
 Do not audit attempts to send jabber_interserver_server packets.
 </summary>
@@ -35266,7 +35350,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220">
 <summary>
 Receive jabber_interserver_server packets.
 </summary>
@@ -35277,7 +35361,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239">
 <summary>
 Do not audit attempts to receive jabber_interserver_server packets.
 </summary>
@@ -35288,7 +35372,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258">
 <summary>
 Send and receive jabber_interserver_server packets.
 </summary>
@@ -35299,7 +35383,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_server packets.
 </summary>
@@ -35310,7 +35394,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289">
 <summary>
 Relabel packets to jabber_interserver_server the packet type.
 </summary>
@@ -35320,7 +35404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
+<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311">
 <summary>
 Send and receive TCP traffic on the jboss_iiop port.
 </summary>
@@ -35331,7 +35415,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
+<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326">
 <summary>
 Send UDP traffic on the jboss_iiop port.
 </summary>
@@ -35342,7 +35426,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
+<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341">
 <summary>
 Do not audit attempts to send UDP traffic on the jboss_iiop port.
 </summary>
@@ -35353,7 +35437,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
+<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356">
 <summary>
 Receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35364,7 +35448,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
+<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371">
 <summary>
 Do not audit attempts to receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35375,7 +35459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
+<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386">
 <summary>
 Send and receive UDP traffic on the jboss_iiop port.
 </summary>
@@ -35386,7 +35470,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
+<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the jboss_iiop port.
@@ -35398,7 +35482,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417">
 <summary>
 Bind TCP sockets to the jboss_iiop port.
 </summary>
@@ -35409,7 +35493,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437">
 <summary>
 Bind UDP sockets to the jboss_iiop port.
 </summary>
@@ -35420,7 +35504,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456">
 <summary>
 Make a TCP connection to the jboss_iiop port.
 </summary>
@@ -35430,7 +35514,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476">
 <summary>
 Send jboss_iiop_client packets.
 </summary>
@@ -35441,7 +35525,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495">
 <summary>
 Do not audit attempts to send jboss_iiop_client packets.
 </summary>
@@ -35452,7 +35536,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514">
 <summary>
 Receive jboss_iiop_client packets.
 </summary>
@@ -35463,7 +35547,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533">
 <summary>
 Do not audit attempts to receive jboss_iiop_client packets.
 </summary>
@@ -35474,7 +35558,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552">
 <summary>
 Send and receive jboss_iiop_client packets.
 </summary>
@@ -35485,7 +35569,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_client packets.
 </summary>
@@ -35496,7 +35580,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583">
 <summary>
 Relabel packets to jboss_iiop_client the packet type.
 </summary>
@@ -35506,7 +35590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603">
 <summary>
 Send jboss_iiop_server packets.
 </summary>
@@ -35517,7 +35601,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622">
 <summary>
 Do not audit attempts to send jboss_iiop_server packets.
 </summary>
@@ -35528,7 +35612,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641">
 <summary>
 Receive jboss_iiop_server packets.
 </summary>
@@ -35539,7 +35623,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660">
 <summary>
 Do not audit attempts to receive jboss_iiop_server packets.
 </summary>
@@ -35550,7 +35634,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679">
 <summary>
 Send and receive jboss_iiop_server packets.
 </summary>
@@ -35561,7 +35645,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_server packets.
 </summary>
@@ -35572,7 +35656,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710">
 <summary>
 Relabel packets to jboss_iiop_server the packet type.
 </summary>
@@ -35582,7 +35666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
+<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732">
 <summary>
 Send and receive TCP traffic on the kerberos port.
 </summary>
@@ -35593,7 +35677,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40729">
+<interface name="corenet_udp_send_kerberos_port" lineno="40747">
 <summary>
 Send UDP traffic on the kerberos port.
 </summary>
@@ -35604,7 +35688,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
+<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos port.
 </summary>
@@ -35615,7 +35699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
+<interface name="corenet_udp_receive_kerberos_port" lineno="40777">
 <summary>
 Receive UDP traffic on the kerberos port.
 </summary>
@@ -35626,7 +35710,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
+<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos port.
 </summary>
@@ -35637,7 +35721,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
+<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807">
 <summary>
 Send and receive UDP traffic on the kerberos port.
 </summary>
@@ -35648,7 +35732,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos port.
@@ -35660,7 +35744,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="40838">
 <summary>
 Bind TCP sockets to the kerberos port.
 </summary>
@@ -35671,7 +35755,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
+<interface name="corenet_udp_bind_kerberos_port" lineno="40858">
 <summary>
 Bind UDP sockets to the kerberos port.
 </summary>
@@ -35682,7 +35766,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="40877">
 <summary>
 Make a TCP connection to the kerberos port.
 </summary>
@@ -35692,7 +35776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40879">
+<interface name="corenet_send_kerberos_client_packets" lineno="40897">
 <summary>
 Send kerberos_client packets.
 </summary>
@@ -35703,7 +35787,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916">
 <summary>
 Do not audit attempts to send kerberos_client packets.
 </summary>
@@ -35714,7 +35798,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
+<interface name="corenet_receive_kerberos_client_packets" lineno="40935">
 <summary>
 Receive kerberos_client packets.
 </summary>
@@ -35725,7 +35809,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954">
 <summary>
 Do not audit attempts to receive kerberos_client packets.
 </summary>
@@ -35736,7 +35820,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973">
 <summary>
 Send and receive kerberos_client packets.
 </summary>
@@ -35747,7 +35831,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989">
 <summary>
 Do not audit attempts to send and receive kerberos_client packets.
 </summary>
@@ -35758,7 +35842,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004">
 <summary>
 Relabel packets to kerberos_client the packet type.
 </summary>
@@ -35768,7 +35852,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="41006">
+<interface name="corenet_send_kerberos_server_packets" lineno="41024">
 <summary>
 Send kerberos_server packets.
 </summary>
@@ -35779,7 +35863,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043">
 <summary>
 Do not audit attempts to send kerberos_server packets.
 </summary>
@@ -35790,7 +35874,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
+<interface name="corenet_receive_kerberos_server_packets" lineno="41062">
 <summary>
 Receive kerberos_server packets.
 </summary>
@@ -35801,7 +35885,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081">
 <summary>
 Do not audit attempts to receive kerberos_server packets.
 </summary>
@@ -35812,7 +35896,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100">
 <summary>
 Send and receive kerberos_server packets.
 </summary>
@@ -35823,7 +35907,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116">
 <summary>
 Do not audit attempts to send and receive kerberos_server packets.
 </summary>
@@ -35834,7 +35918,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131">
 <summary>
 Relabel packets to kerberos_server the packet type.
 </summary>
@@ -35844,7 +35928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
+<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153">
 <summary>
 Send and receive TCP traffic on the kerberos_admin port.
 </summary>
@@ -35855,7 +35939,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
+<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168">
 <summary>
 Send UDP traffic on the kerberos_admin port.
 </summary>
@@ -35866,7 +35950,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
+<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos_admin port.
 </summary>
@@ -35877,7 +35961,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
+<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198">
 <summary>
 Receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35888,7 +35972,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
+<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35899,7 +35983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
+<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228">
 <summary>
 Send and receive UDP traffic on the kerberos_admin port.
 </summary>
@@ -35910,7 +35994,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos_admin port.
@@ -35922,7 +36006,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259">
 <summary>
 Bind TCP sockets to the kerberos_admin port.
 </summary>
@@ -35933,7 +36017,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279">
 <summary>
 Bind UDP sockets to the kerberos_admin port.
 </summary>
@@ -35944,7 +36028,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298">
 <summary>
 Make a TCP connection to the kerberos_admin port.
 </summary>
@@ -35954,7 +36038,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318">
 <summary>
 Send kerberos_admin_client packets.
 </summary>
@@ -35965,7 +36049,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337">
 <summary>
 Do not audit attempts to send kerberos_admin_client packets.
 </summary>
@@ -35976,7 +36060,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356">
 <summary>
 Receive kerberos_admin_client packets.
 </summary>
@@ -35987,7 +36071,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375">
 <summary>
 Do not audit attempts to receive kerberos_admin_client packets.
 </summary>
@@ -35998,7 +36082,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394">
 <summary>
 Send and receive kerberos_admin_client packets.
 </summary>
@@ -36009,7 +36093,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_client packets.
 </summary>
@@ -36020,7 +36104,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425">
 <summary>
 Relabel packets to kerberos_admin_client the packet type.
 </summary>
@@ -36030,7 +36114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445">
 <summary>
 Send kerberos_admin_server packets.
 </summary>
@@ -36041,7 +36125,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464">
 <summary>
 Do not audit attempts to send kerberos_admin_server packets.
 </summary>
@@ -36052,7 +36136,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483">
 <summary>
 Receive kerberos_admin_server packets.
 </summary>
@@ -36063,7 +36147,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502">
 <summary>
 Do not audit attempts to receive kerberos_admin_server packets.
 </summary>
@@ -36074,7 +36158,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521">
 <summary>
 Send and receive kerberos_admin_server packets.
 </summary>
@@ -36085,7 +36169,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_server packets.
 </summary>
@@ -36096,7 +36180,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552">
 <summary>
 Relabel packets to kerberos_admin_server the packet type.
 </summary>
@@ -36106,7 +36190,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
+<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574">
 <summary>
 Send and receive TCP traffic on the kerberos_master port.
 </summary>
@@ -36117,7 +36201,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
+<interface name="corenet_udp_send_kerberos_master_port" lineno="41589">
 <summary>
 Send UDP traffic on the kerberos_master port.
 </summary>
@@ -36128,7 +36212,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
+<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604">
 <summary>
 Do not audit attempts to send UDP traffic on the kerberos_master port.
 </summary>
@@ -36139,7 +36223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
+<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619">
 <summary>
 Receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36150,7 +36234,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
+<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634">
 <summary>
 Do not audit attempts to receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36161,7 +36245,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
+<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649">
 <summary>
 Send and receive UDP traffic on the kerberos_master port.
 </summary>
@@ -36172,7 +36256,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kerberos_master port.
@@ -36184,7 +36268,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680">
 <summary>
 Bind TCP sockets to the kerberos_master port.
 </summary>
@@ -36195,7 +36279,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700">
 <summary>
 Bind UDP sockets to the kerberos_master port.
 </summary>
@@ -36206,7 +36290,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719">
 <summary>
 Make a TCP connection to the kerberos_master port.
 </summary>
@@ -36216,7 +36300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="41739">
 <summary>
 Send kerberos_master_client packets.
 </summary>
@@ -36227,7 +36311,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758">
 <summary>
 Do not audit attempts to send kerberos_master_client packets.
 </summary>
@@ -36238,7 +36322,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777">
 <summary>
 Receive kerberos_master_client packets.
 </summary>
@@ -36249,7 +36333,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796">
 <summary>
 Do not audit attempts to receive kerberos_master_client packets.
 </summary>
@@ -36260,7 +36344,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815">
 <summary>
 Send and receive kerberos_master_client packets.
 </summary>
@@ -36271,7 +36355,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831">
 <summary>
 Do not audit attempts to send and receive kerberos_master_client packets.
 </summary>
@@ -36282,7 +36366,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846">
 <summary>
 Relabel packets to kerberos_master_client the packet type.
 </summary>
@@ -36292,7 +36376,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="41866">
 <summary>
 Send kerberos_master_server packets.
 </summary>
@@ -36303,7 +36387,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885">
 <summary>
 Do not audit attempts to send kerberos_master_server packets.
 </summary>
@@ -36314,7 +36398,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904">
 <summary>
 Receive kerberos_master_server packets.
 </summary>
@@ -36325,7 +36409,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923">
 <summary>
 Do not audit attempts to receive kerberos_master_server packets.
 </summary>
@@ -36336,7 +36420,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942">
 <summary>
 Send and receive kerberos_master_server packets.
 </summary>
@@ -36347,7 +36431,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958">
 <summary>
 Do not audit attempts to send and receive kerberos_master_server packets.
 </summary>
@@ -36358,7 +36442,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973">
 <summary>
 Relabel packets to kerberos_master_server the packet type.
 </summary>
@@ -36368,7 +36452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
+<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995">
 <summary>
 Send and receive TCP traffic on the kismet port.
 </summary>
@@ -36379,7 +36463,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kismet_port" lineno="41992">
+<interface name="corenet_udp_send_kismet_port" lineno="42010">
 <summary>
 Send UDP traffic on the kismet port.
 </summary>
@@ -36390,7 +36474,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
+<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025">
 <summary>
 Do not audit attempts to send UDP traffic on the kismet port.
 </summary>
@@ -36401,7 +36485,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="42022">
+<interface name="corenet_udp_receive_kismet_port" lineno="42040">
 <summary>
 Receive UDP traffic on the kismet port.
 </summary>
@@ -36412,7 +36496,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
+<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055">
 <summary>
 Do not audit attempts to receive UDP traffic on the kismet port.
 </summary>
@@ -36423,7 +36507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
+<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070">
 <summary>
 Send and receive UDP traffic on the kismet port.
 </summary>
@@ -36434,7 +36518,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
+<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kismet port.
@@ -36446,7 +36530,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
+<interface name="corenet_tcp_bind_kismet_port" lineno="42101">
 <summary>
 Bind TCP sockets to the kismet port.
 </summary>
@@ -36457,7 +36541,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="42103">
+<interface name="corenet_udp_bind_kismet_port" lineno="42121">
 <summary>
 Bind UDP sockets to the kismet port.
 </summary>
@@ -36468,7 +36552,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
+<interface name="corenet_tcp_connect_kismet_port" lineno="42140">
 <summary>
 Make a TCP connection to the kismet port.
 </summary>
@@ -36478,7 +36562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42142">
+<interface name="corenet_send_kismet_client_packets" lineno="42160">
 <summary>
 Send kismet_client packets.
 </summary>
@@ -36489,7 +36573,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179">
 <summary>
 Do not audit attempts to send kismet_client packets.
 </summary>
@@ -36500,7 +36584,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42180">
+<interface name="corenet_receive_kismet_client_packets" lineno="42198">
 <summary>
 Receive kismet_client packets.
 </summary>
@@ -36511,7 +36595,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217">
 <summary>
 Do not audit attempts to receive kismet_client packets.
 </summary>
@@ -36522,7 +36606,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236">
 <summary>
 Send and receive kismet_client packets.
 </summary>
@@ -36533,7 +36617,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252">
 <summary>
 Do not audit attempts to send and receive kismet_client packets.
 </summary>
@@ -36544,7 +36628,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="42267">
 <summary>
 Relabel packets to kismet_client the packet type.
 </summary>
@@ -36554,7 +36638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42269">
+<interface name="corenet_send_kismet_server_packets" lineno="42287">
 <summary>
 Send kismet_server packets.
 </summary>
@@ -36565,7 +36649,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306">
 <summary>
 Do not audit attempts to send kismet_server packets.
 </summary>
@@ -36576,7 +36660,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42307">
+<interface name="corenet_receive_kismet_server_packets" lineno="42325">
 <summary>
 Receive kismet_server packets.
 </summary>
@@ -36587,7 +36671,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344">
 <summary>
 Do not audit attempts to receive kismet_server packets.
 </summary>
@@ -36598,7 +36682,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363">
 <summary>
 Send and receive kismet_server packets.
 </summary>
@@ -36609,7 +36693,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379">
 <summary>
 Do not audit attempts to send and receive kismet_server packets.
 </summary>
@@ -36620,7 +36704,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="42394">
 <summary>
 Relabel packets to kismet_server the packet type.
 </summary>
@@ -36630,7 +36714,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
+<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416">
 <summary>
 Send and receive TCP traffic on the kdeconnect port.
 </summary>
@@ -36641,7 +36725,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
+<interface name="corenet_udp_send_kdeconnect_port" lineno="42431">
 <summary>
 Send UDP traffic on the kdeconnect port.
 </summary>
@@ -36652,7 +36736,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
+<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446">
 <summary>
 Do not audit attempts to send UDP traffic on the kdeconnect port.
 </summary>
@@ -36663,7 +36747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
+<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461">
 <summary>
 Receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36674,7 +36758,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
+<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476">
 <summary>
 Do not audit attempts to receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36685,7 +36769,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
+<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491">
 <summary>
 Send and receive UDP traffic on the kdeconnect port.
 </summary>
@@ -36696,7 +36780,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
+<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kdeconnect port.
@@ -36708,7 +36792,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522">
 <summary>
 Bind TCP sockets to the kdeconnect port.
 </summary>
@@ -36719,7 +36803,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542">
 <summary>
 Bind UDP sockets to the kdeconnect port.
 </summary>
@@ -36730,7 +36814,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561">
 <summary>
 Make a TCP connection to the kdeconnect port.
 </summary>
@@ -36740,7 +36824,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="42581">
 <summary>
 Send kdeconnect_client packets.
 </summary>
@@ -36751,7 +36835,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600">
 <summary>
 Do not audit attempts to send kdeconnect_client packets.
 </summary>
@@ -36762,7 +36846,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619">
 <summary>
 Receive kdeconnect_client packets.
 </summary>
@@ -36773,7 +36857,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638">
 <summary>
 Do not audit attempts to receive kdeconnect_client packets.
 </summary>
@@ -36784,7 +36868,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657">
 <summary>
 Send and receive kdeconnect_client packets.
 </summary>
@@ -36795,7 +36879,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673">
 <summary>
 Do not audit attempts to send and receive kdeconnect_client packets.
 </summary>
@@ -36806,7 +36890,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688">
 <summary>
 Relabel packets to kdeconnect_client the packet type.
 </summary>
@@ -36816,7 +36900,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="42708">
 <summary>
 Send kdeconnect_server packets.
 </summary>
@@ -36827,7 +36911,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727">
 <summary>
 Do not audit attempts to send kdeconnect_server packets.
 </summary>
@@ -36838,7 +36922,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746">
 <summary>
 Receive kdeconnect_server packets.
 </summary>
@@ -36849,7 +36933,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765">
 <summary>
 Do not audit attempts to receive kdeconnect_server packets.
 </summary>
@@ -36860,7 +36944,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784">
 <summary>
 Send and receive kdeconnect_server packets.
 </summary>
@@ -36871,7 +36955,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800">
 <summary>
 Do not audit attempts to send and receive kdeconnect_server packets.
 </summary>
@@ -36882,7 +36966,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815">
 <summary>
 Relabel packets to kdeconnect_server the packet type.
 </summary>
@@ -36892,7 +36976,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
+<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837">
 <summary>
 Send and receive TCP traffic on the kprop port.
 </summary>
@@ -36903,7 +36987,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42834">
+<interface name="corenet_udp_send_kprop_port" lineno="42852">
 <summary>
 Send UDP traffic on the kprop port.
 </summary>
@@ -36914,7 +36998,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
+<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867">
 <summary>
 Do not audit attempts to send UDP traffic on the kprop port.
 </summary>
@@ -36925,7 +37009,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42864">
+<interface name="corenet_udp_receive_kprop_port" lineno="42882">
 <summary>
 Receive UDP traffic on the kprop port.
 </summary>
@@ -36936,7 +37020,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
+<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897">
 <summary>
 Do not audit attempts to receive UDP traffic on the kprop port.
 </summary>
@@ -36947,7 +37031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
+<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912">
 <summary>
 Send and receive UDP traffic on the kprop port.
 </summary>
@@ -36958,7 +37042,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
+<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the kprop port.
@@ -36970,7 +37054,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
+<interface name="corenet_tcp_bind_kprop_port" lineno="42943">
 <summary>
 Bind TCP sockets to the kprop port.
 </summary>
@@ -36981,7 +37065,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42945">
+<interface name="corenet_udp_bind_kprop_port" lineno="42963">
 <summary>
 Bind UDP sockets to the kprop port.
 </summary>
@@ -36992,7 +37076,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
+<interface name="corenet_tcp_connect_kprop_port" lineno="42982">
 <summary>
 Make a TCP connection to the kprop port.
 </summary>
@@ -37002,7 +37086,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_client_packets" lineno="42984">
+<interface name="corenet_send_kprop_client_packets" lineno="43002">
 <summary>
 Send kprop_client packets.
 </summary>
@@ -37013,7 +37097,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021">
 <summary>
 Do not audit attempts to send kprop_client packets.
 </summary>
@@ -37024,7 +37108,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="43022">
+<interface name="corenet_receive_kprop_client_packets" lineno="43040">
 <summary>
 Receive kprop_client packets.
 </summary>
@@ -37035,7 +37119,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059">
 <summary>
 Do not audit attempts to receive kprop_client packets.
 </summary>
@@ -37046,7 +37130,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078">
 <summary>
 Send and receive kprop_client packets.
 </summary>
@@ -37057,7 +37141,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094">
 <summary>
 Do not audit attempts to send and receive kprop_client packets.
 </summary>
@@ -37068,7 +37152,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="43109">
 <summary>
 Relabel packets to kprop_client the packet type.
 </summary>
@@ -37078,7 +37162,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_server_packets" lineno="43111">
+<interface name="corenet_send_kprop_server_packets" lineno="43129">
 <summary>
 Send kprop_server packets.
 </summary>
@@ -37089,7 +37173,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148">
 <summary>
 Do not audit attempts to send kprop_server packets.
 </summary>
@@ -37100,7 +37184,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43149">
+<interface name="corenet_receive_kprop_server_packets" lineno="43167">
 <summary>
 Receive kprop_server packets.
 </summary>
@@ -37111,7 +37195,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186">
 <summary>
 Do not audit attempts to receive kprop_server packets.
 </summary>
@@ -37122,7 +37206,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205">
 <summary>
 Send and receive kprop_server packets.
 </summary>
@@ -37133,7 +37217,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221">
 <summary>
 Do not audit attempts to send and receive kprop_server packets.
 </summary>
@@ -37144,7 +37228,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="43236">
 <summary>
 Relabel packets to kprop_server the packet type.
 </summary>
@@ -37154,7 +37238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
+<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258">
 <summary>
 Send and receive TCP traffic on the ktalkd port.
 </summary>
@@ -37165,7 +37249,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
+<interface name="corenet_udp_send_ktalkd_port" lineno="43273">
 <summary>
 Send UDP traffic on the ktalkd port.
 </summary>
@@ -37176,7 +37260,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
+<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288">
 <summary>
 Do not audit attempts to send UDP traffic on the ktalkd port.
 </summary>
@@ -37187,7 +37271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
+<interface name="corenet_udp_receive_ktalkd_port" lineno="43303">
 <summary>
 Receive UDP traffic on the ktalkd port.
 </summary>
@@ -37198,7 +37282,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
+<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318">
 <summary>
 Do not audit attempts to receive UDP traffic on the ktalkd port.
 </summary>
@@ -37209,7 +37293,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
+<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333">
 <summary>
 Send and receive UDP traffic on the ktalkd port.
 </summary>
@@ -37220,7 +37304,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
+<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ktalkd port.
@@ -37232,7 +37316,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364">
 <summary>
 Bind TCP sockets to the ktalkd port.
 </summary>
@@ -37243,7 +37327,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="43384">
 <summary>
 Bind UDP sockets to the ktalkd port.
 </summary>
@@ -37254,7 +37338,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403">
 <summary>
 Make a TCP connection to the ktalkd port.
 </summary>
@@ -37264,7 +37348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
+<interface name="corenet_send_ktalkd_client_packets" lineno="43423">
 <summary>
 Send ktalkd_client packets.
 </summary>
@@ -37275,7 +37359,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442">
 <summary>
 Do not audit attempts to send ktalkd_client packets.
 </summary>
@@ -37286,7 +37370,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="43461">
 <summary>
 Receive ktalkd_client packets.
 </summary>
@@ -37297,7 +37381,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480">
 <summary>
 Do not audit attempts to receive ktalkd_client packets.
 </summary>
@@ -37308,7 +37392,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499">
 <summary>
 Send and receive ktalkd_client packets.
 </summary>
@@ -37319,7 +37403,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515">
 <summary>
 Do not audit attempts to send and receive ktalkd_client packets.
 </summary>
@@ -37330,7 +37414,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530">
 <summary>
 Relabel packets to ktalkd_client the packet type.
 </summary>
@@ -37340,7 +37424,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
+<interface name="corenet_send_ktalkd_server_packets" lineno="43550">
 <summary>
 Send ktalkd_server packets.
 </summary>
@@ -37351,7 +37435,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569">
 <summary>
 Do not audit attempts to send ktalkd_server packets.
 </summary>
@@ -37362,7 +37446,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="43588">
 <summary>
 Receive ktalkd_server packets.
 </summary>
@@ -37373,7 +37457,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607">
 <summary>
 Do not audit attempts to receive ktalkd_server packets.
 </summary>
@@ -37384,7 +37468,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626">
 <summary>
 Send and receive ktalkd_server packets.
 </summary>
@@ -37395,7 +37479,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642">
 <summary>
 Do not audit attempts to send and receive ktalkd_server packets.
 </summary>
@@ -37406,7 +37490,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657">
 <summary>
 Relabel packets to ktalkd_server the packet type.
 </summary>
@@ -37416,7 +37500,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
+<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679">
 <summary>
 Send and receive TCP traffic on the l2tp port.
 </summary>
@@ -37427,7 +37511,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43676">
+<interface name="corenet_udp_send_l2tp_port" lineno="43694">
 <summary>
 Send UDP traffic on the l2tp port.
 </summary>
@@ -37438,7 +37522,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
+<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709">
 <summary>
 Do not audit attempts to send UDP traffic on the l2tp port.
 </summary>
@@ -37449,7 +37533,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
+<interface name="corenet_udp_receive_l2tp_port" lineno="43724">
 <summary>
 Receive UDP traffic on the l2tp port.
 </summary>
@@ -37460,7 +37544,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
+<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739">
 <summary>
 Do not audit attempts to receive UDP traffic on the l2tp port.
 </summary>
@@ -37471,7 +37555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
+<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754">
 <summary>
 Send and receive UDP traffic on the l2tp port.
 </summary>
@@ -37482,7 +37566,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
+<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the l2tp port.
@@ -37494,7 +37578,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="43785">
 <summary>
 Bind TCP sockets to the l2tp port.
 </summary>
@@ -37505,7 +37589,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
+<interface name="corenet_udp_bind_l2tp_port" lineno="43805">
 <summary>
 Bind UDP sockets to the l2tp port.
 </summary>
@@ -37516,7 +37600,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="43824">
 <summary>
 Make a TCP connection to the l2tp port.
 </summary>
@@ -37526,7 +37610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43826">
+<interface name="corenet_send_l2tp_client_packets" lineno="43844">
 <summary>
 Send l2tp_client packets.
 </summary>
@@ -37537,7 +37621,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863">
 <summary>
 Do not audit attempts to send l2tp_client packets.
 </summary>
@@ -37548,7 +37632,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
+<interface name="corenet_receive_l2tp_client_packets" lineno="43882">
 <summary>
 Receive l2tp_client packets.
 </summary>
@@ -37559,7 +37643,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901">
 <summary>
 Do not audit attempts to receive l2tp_client packets.
 </summary>
@@ -37570,7 +37654,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920">
 <summary>
 Send and receive l2tp_client packets.
 </summary>
@@ -37581,7 +37665,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936">
 <summary>
 Do not audit attempts to send and receive l2tp_client packets.
 </summary>
@@ -37592,7 +37676,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951">
 <summary>
 Relabel packets to l2tp_client the packet type.
 </summary>
@@ -37602,7 +37686,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43953">
+<interface name="corenet_send_l2tp_server_packets" lineno="43971">
 <summary>
 Send l2tp_server packets.
 </summary>
@@ -37613,7 +37697,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990">
 <summary>
 Do not audit attempts to send l2tp_server packets.
 </summary>
@@ -37624,7 +37708,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
+<interface name="corenet_receive_l2tp_server_packets" lineno="44009">
 <summary>
 Receive l2tp_server packets.
 </summary>
@@ -37635,7 +37719,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028">
 <summary>
 Do not audit attempts to receive l2tp_server packets.
 </summary>
@@ -37646,7 +37730,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047">
 <summary>
 Send and receive l2tp_server packets.
 </summary>
@@ -37657,7 +37741,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063">
 <summary>
 Do not audit attempts to send and receive l2tp_server packets.
 </summary>
@@ -37668,7 +37752,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078">
 <summary>
 Relabel packets to l2tp_server the packet type.
 </summary>
@@ -37678,7 +37762,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
+<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100">
 <summary>
 Send and receive TCP traffic on the ldap port.
 </summary>
@@ -37689,7 +37773,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ldap_port" lineno="44097">
+<interface name="corenet_udp_send_ldap_port" lineno="44115">
 <summary>
 Send UDP traffic on the ldap port.
 </summary>
@@ -37700,7 +37784,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
+<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130">
 <summary>
 Do not audit attempts to send UDP traffic on the ldap port.
 </summary>
@@ -37711,7 +37795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44127">
+<interface name="corenet_udp_receive_ldap_port" lineno="44145">
 <summary>
 Receive UDP traffic on the ldap port.
 </summary>
@@ -37722,7 +37806,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
+<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160">
 <summary>
 Do not audit attempts to receive UDP traffic on the ldap port.
 </summary>
@@ -37733,7 +37817,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
+<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175">
 <summary>
 Send and receive UDP traffic on the ldap port.
 </summary>
@@ -37744,7 +37828,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
+<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ldap port.
@@ -37756,7 +37840,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
+<interface name="corenet_tcp_bind_ldap_port" lineno="44206">
 <summary>
 Bind TCP sockets to the ldap port.
 </summary>
@@ -37767,7 +37851,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44208">
+<interface name="corenet_udp_bind_ldap_port" lineno="44226">
 <summary>
 Bind UDP sockets to the ldap port.
 </summary>
@@ -37778,7 +37862,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
+<interface name="corenet_tcp_connect_ldap_port" lineno="44245">
 <summary>
 Make a TCP connection to the ldap port.
 </summary>
@@ -37788,7 +37872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44247">
+<interface name="corenet_send_ldap_client_packets" lineno="44265">
 <summary>
 Send ldap_client packets.
 </summary>
@@ -37799,7 +37883,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284">
 <summary>
 Do not audit attempts to send ldap_client packets.
 </summary>
@@ -37810,7 +37894,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44285">
+<interface name="corenet_receive_ldap_client_packets" lineno="44303">
 <summary>
 Receive ldap_client packets.
 </summary>
@@ -37821,7 +37905,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322">
 <summary>
 Do not audit attempts to receive ldap_client packets.
 </summary>
@@ -37832,7 +37916,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341">
 <summary>
 Send and receive ldap_client packets.
 </summary>
@@ -37843,7 +37927,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357">
 <summary>
 Do not audit attempts to send and receive ldap_client packets.
 </summary>
@@ -37854,7 +37938,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="44372">
 <summary>
 Relabel packets to ldap_client the packet type.
 </summary>
@@ -37864,7 +37948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44374">
+<interface name="corenet_send_ldap_server_packets" lineno="44392">
 <summary>
 Send ldap_server packets.
 </summary>
@@ -37875,7 +37959,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411">
 <summary>
 Do not audit attempts to send ldap_server packets.
 </summary>
@@ -37886,7 +37970,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44412">
+<interface name="corenet_receive_ldap_server_packets" lineno="44430">
 <summary>
 Receive ldap_server packets.
 </summary>
@@ -37897,7 +37981,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449">
 <summary>
 Do not audit attempts to receive ldap_server packets.
 </summary>
@@ -37908,7 +37992,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468">
 <summary>
 Send and receive ldap_server packets.
 </summary>
@@ -37919,7 +38003,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484">
 <summary>
 Do not audit attempts to send and receive ldap_server packets.
 </summary>
@@ -37930,7 +38014,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="44499">
 <summary>
 Relabel packets to ldap_server the packet type.
 </summary>
@@ -37940,7 +38024,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
+<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521">
 <summary>
 Send and receive TCP traffic on the lirc port.
 </summary>
@@ -37951,7 +38035,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44518">
+<interface name="corenet_udp_send_lirc_port" lineno="44536">
 <summary>
 Send UDP traffic on the lirc port.
 </summary>
@@ -37962,7 +38046,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
+<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551">
 <summary>
 Do not audit attempts to send UDP traffic on the lirc port.
 </summary>
@@ -37973,7 +38057,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44548">
+<interface name="corenet_udp_receive_lirc_port" lineno="44566">
 <summary>
 Receive UDP traffic on the lirc port.
 </summary>
@@ -37984,7 +38068,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
+<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581">
 <summary>
 Do not audit attempts to receive UDP traffic on the lirc port.
 </summary>
@@ -37995,7 +38079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
+<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596">
 <summary>
 Send and receive UDP traffic on the lirc port.
 </summary>
@@ -38006,7 +38090,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
+<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lirc port.
@@ -38018,7 +38102,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
+<interface name="corenet_tcp_bind_lirc_port" lineno="44627">
 <summary>
 Bind TCP sockets to the lirc port.
 </summary>
@@ -38029,7 +38113,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44629">
+<interface name="corenet_udp_bind_lirc_port" lineno="44647">
 <summary>
 Bind UDP sockets to the lirc port.
 </summary>
@@ -38040,7 +38124,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
+<interface name="corenet_tcp_connect_lirc_port" lineno="44666">
 <summary>
 Make a TCP connection to the lirc port.
 </summary>
@@ -38050,7 +38134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44668">
+<interface name="corenet_send_lirc_client_packets" lineno="44686">
 <summary>
 Send lirc_client packets.
 </summary>
@@ -38061,7 +38145,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705">
 <summary>
 Do not audit attempts to send lirc_client packets.
 </summary>
@@ -38072,7 +38156,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44706">
+<interface name="corenet_receive_lirc_client_packets" lineno="44724">
 <summary>
 Receive lirc_client packets.
 </summary>
@@ -38083,7 +38167,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743">
 <summary>
 Do not audit attempts to receive lirc_client packets.
 </summary>
@@ -38094,7 +38178,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762">
 <summary>
 Send and receive lirc_client packets.
 </summary>
@@ -38105,7 +38189,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778">
 <summary>
 Do not audit attempts to send and receive lirc_client packets.
 </summary>
@@ -38116,7 +38200,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="44793">
 <summary>
 Relabel packets to lirc_client the packet type.
 </summary>
@@ -38126,7 +38210,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44795">
+<interface name="corenet_send_lirc_server_packets" lineno="44813">
 <summary>
 Send lirc_server packets.
 </summary>
@@ -38137,7 +38221,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832">
 <summary>
 Do not audit attempts to send lirc_server packets.
 </summary>
@@ -38148,7 +38232,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44833">
+<interface name="corenet_receive_lirc_server_packets" lineno="44851">
 <summary>
 Receive lirc_server packets.
 </summary>
@@ -38159,7 +38243,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870">
 <summary>
 Do not audit attempts to receive lirc_server packets.
 </summary>
@@ -38170,7 +38254,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889">
 <summary>
 Send and receive lirc_server packets.
 </summary>
@@ -38181,7 +38265,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905">
 <summary>
 Do not audit attempts to send and receive lirc_server packets.
 </summary>
@@ -38192,7 +38276,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="44920">
 <summary>
 Relabel packets to lirc_server the packet type.
 </summary>
@@ -38202,7 +38286,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
+<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942">
 <summary>
 Send and receive TCP traffic on the llmnr port.
 </summary>
@@ -38213,7 +38297,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44939">
+<interface name="corenet_udp_send_llmnr_port" lineno="44957">
 <summary>
 Send UDP traffic on the llmnr port.
 </summary>
@@ -38224,7 +38308,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
+<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972">
 <summary>
 Do not audit attempts to send UDP traffic on the llmnr port.
 </summary>
@@ -38235,7 +38319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
+<interface name="corenet_udp_receive_llmnr_port" lineno="44987">
 <summary>
 Receive UDP traffic on the llmnr port.
 </summary>
@@ -38246,7 +38330,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
+<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002">
 <summary>
 Do not audit attempts to receive UDP traffic on the llmnr port.
 </summary>
@@ -38257,7 +38341,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
+<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017">
 <summary>
 Send and receive UDP traffic on the llmnr port.
 </summary>
@@ -38268,7 +38352,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
+<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the llmnr port.
@@ -38280,7 +38364,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="45048">
 <summary>
 Bind TCP sockets to the llmnr port.
 </summary>
@@ -38291,7 +38375,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
+<interface name="corenet_udp_bind_llmnr_port" lineno="45068">
 <summary>
 Bind UDP sockets to the llmnr port.
 </summary>
@@ -38302,7 +38386,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="45087">
 <summary>
 Make a TCP connection to the llmnr port.
 </summary>
@@ -38312,7 +38396,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="45089">
+<interface name="corenet_send_llmnr_client_packets" lineno="45107">
 <summary>
 Send llmnr_client packets.
 </summary>
@@ -38323,7 +38407,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126">
 <summary>
 Do not audit attempts to send llmnr_client packets.
 </summary>
@@ -38334,7 +38418,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
+<interface name="corenet_receive_llmnr_client_packets" lineno="45145">
 <summary>
 Receive llmnr_client packets.
 </summary>
@@ -38345,7 +38429,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164">
 <summary>
 Do not audit attempts to receive llmnr_client packets.
 </summary>
@@ -38356,7 +38440,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183">
 <summary>
 Send and receive llmnr_client packets.
 </summary>
@@ -38367,7 +38451,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199">
 <summary>
 Do not audit attempts to send and receive llmnr_client packets.
 </summary>
@@ -38378,7 +38462,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214">
 <summary>
 Relabel packets to llmnr_client the packet type.
 </summary>
@@ -38388,7 +38472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45216">
+<interface name="corenet_send_llmnr_server_packets" lineno="45234">
 <summary>
 Send llmnr_server packets.
 </summary>
@@ -38399,7 +38483,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253">
 <summary>
 Do not audit attempts to send llmnr_server packets.
 </summary>
@@ -38410,7 +38494,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
+<interface name="corenet_receive_llmnr_server_packets" lineno="45272">
 <summary>
 Receive llmnr_server packets.
 </summary>
@@ -38421,7 +38505,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291">
 <summary>
 Do not audit attempts to receive llmnr_server packets.
 </summary>
@@ -38432,7 +38516,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310">
 <summary>
 Send and receive llmnr_server packets.
 </summary>
@@ -38443,7 +38527,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326">
 <summary>
 Do not audit attempts to send and receive llmnr_server packets.
 </summary>
@@ -38454,7 +38538,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341">
 <summary>
 Relabel packets to llmnr_server the packet type.
 </summary>
@@ -38464,7 +38548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
+<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363">
 <summary>
 Send and receive TCP traffic on the lmtp port.
 </summary>
@@ -38475,7 +38559,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45360">
+<interface name="corenet_udp_send_lmtp_port" lineno="45378">
 <summary>
 Send UDP traffic on the lmtp port.
 </summary>
@@ -38486,7 +38570,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
+<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393">
 <summary>
 Do not audit attempts to send UDP traffic on the lmtp port.
 </summary>
@@ -38497,7 +38581,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
+<interface name="corenet_udp_receive_lmtp_port" lineno="45408">
 <summary>
 Receive UDP traffic on the lmtp port.
 </summary>
@@ -38508,7 +38592,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
+<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423">
 <summary>
 Do not audit attempts to receive UDP traffic on the lmtp port.
 </summary>
@@ -38519,7 +38603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
+<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438">
 <summary>
 Send and receive UDP traffic on the lmtp port.
 </summary>
@@ -38530,7 +38614,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
+<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lmtp port.
@@ -38542,7 +38626,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="45469">
 <summary>
 Bind TCP sockets to the lmtp port.
 </summary>
@@ -38553,7 +38637,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
+<interface name="corenet_udp_bind_lmtp_port" lineno="45489">
 <summary>
 Bind UDP sockets to the lmtp port.
 </summary>
@@ -38564,7 +38648,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="45508">
 <summary>
 Make a TCP connection to the lmtp port.
 </summary>
@@ -38574,7 +38658,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45510">
+<interface name="corenet_send_lmtp_client_packets" lineno="45528">
 <summary>
 Send lmtp_client packets.
 </summary>
@@ -38585,7 +38669,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547">
 <summary>
 Do not audit attempts to send lmtp_client packets.
 </summary>
@@ -38596,7 +38680,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
+<interface name="corenet_receive_lmtp_client_packets" lineno="45566">
 <summary>
 Receive lmtp_client packets.
 </summary>
@@ -38607,7 +38691,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585">
 <summary>
 Do not audit attempts to receive lmtp_client packets.
 </summary>
@@ -38618,7 +38702,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604">
 <summary>
 Send and receive lmtp_client packets.
 </summary>
@@ -38629,7 +38713,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620">
 <summary>
 Do not audit attempts to send and receive lmtp_client packets.
 </summary>
@@ -38640,7 +38724,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635">
 <summary>
 Relabel packets to lmtp_client the packet type.
 </summary>
@@ -38650,7 +38734,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45637">
+<interface name="corenet_send_lmtp_server_packets" lineno="45655">
 <summary>
 Send lmtp_server packets.
 </summary>
@@ -38661,7 +38745,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674">
 <summary>
 Do not audit attempts to send lmtp_server packets.
 </summary>
@@ -38672,7 +38756,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
+<interface name="corenet_receive_lmtp_server_packets" lineno="45693">
 <summary>
 Receive lmtp_server packets.
 </summary>
@@ -38683,7 +38767,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712">
 <summary>
 Do not audit attempts to receive lmtp_server packets.
 </summary>
@@ -38694,7 +38778,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731">
 <summary>
 Send and receive lmtp_server packets.
 </summary>
@@ -38705,7 +38789,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747">
 <summary>
 Do not audit attempts to send and receive lmtp_server packets.
 </summary>
@@ -38716,7 +38800,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762">
 <summary>
 Relabel packets to lmtp_server the packet type.
 </summary>
@@ -38726,7 +38810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
+<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784">
 <summary>
 Send and receive TCP traffic on the lrrd port.
 </summary>
@@ -38737,7 +38821,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45781">
+<interface name="corenet_udp_send_lrrd_port" lineno="45799">
 <summary>
 Send UDP traffic on the lrrd port.
 </summary>
@@ -38748,7 +38832,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
+<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814">
 <summary>
 Do not audit attempts to send UDP traffic on the lrrd port.
 </summary>
@@ -38759,7 +38843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
+<interface name="corenet_udp_receive_lrrd_port" lineno="45829">
 <summary>
 Receive UDP traffic on the lrrd port.
 </summary>
@@ -38770,7 +38854,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
+<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844">
 <summary>
 Do not audit attempts to receive UDP traffic on the lrrd port.
 </summary>
@@ -38781,7 +38865,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
+<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859">
 <summary>
 Send and receive UDP traffic on the lrrd port.
 </summary>
@@ -38792,7 +38876,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
+<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the lrrd port.
@@ -38804,7 +38888,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="45890">
 <summary>
 Bind TCP sockets to the lrrd port.
 </summary>
@@ -38815,7 +38899,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
+<interface name="corenet_udp_bind_lrrd_port" lineno="45910">
 <summary>
 Bind UDP sockets to the lrrd port.
 </summary>
@@ -38826,7 +38910,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="45929">
 <summary>
 Make a TCP connection to the lrrd port.
 </summary>
@@ -38836,7 +38920,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45931">
+<interface name="corenet_send_lrrd_client_packets" lineno="45949">
 <summary>
 Send lrrd_client packets.
 </summary>
@@ -38847,7 +38931,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968">
 <summary>
 Do not audit attempts to send lrrd_client packets.
 </summary>
@@ -38858,7 +38942,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
+<interface name="corenet_receive_lrrd_client_packets" lineno="45987">
 <summary>
 Receive lrrd_client packets.
 </summary>
@@ -38869,7 +38953,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006">
 <summary>
 Do not audit attempts to receive lrrd_client packets.
 </summary>
@@ -38880,7 +38964,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025">
 <summary>
 Send and receive lrrd_client packets.
 </summary>
@@ -38891,7 +38975,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041">
 <summary>
 Do not audit attempts to send and receive lrrd_client packets.
 </summary>
@@ -38902,7 +38986,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056">
 <summary>
 Relabel packets to lrrd_client the packet type.
 </summary>
@@ -38912,7 +38996,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="46058">
+<interface name="corenet_send_lrrd_server_packets" lineno="46076">
 <summary>
 Send lrrd_server packets.
 </summary>
@@ -38923,7 +39007,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095">
 <summary>
 Do not audit attempts to send lrrd_server packets.
 </summary>
@@ -38934,7 +39018,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
+<interface name="corenet_receive_lrrd_server_packets" lineno="46114">
 <summary>
 Receive lrrd_server packets.
 </summary>
@@ -38945,7 +39029,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133">
 <summary>
 Do not audit attempts to receive lrrd_server packets.
 </summary>
@@ -38956,7 +39040,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152">
 <summary>
 Send and receive lrrd_server packets.
 </summary>
@@ -38967,7 +39051,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168">
 <summary>
 Do not audit attempts to send and receive lrrd_server packets.
 </summary>
@@ -38978,7 +39062,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183">
 <summary>
 Relabel packets to lrrd_server the packet type.
 </summary>
@@ -38988,7 +39072,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
+<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205">
 <summary>
 Send and receive TCP traffic on the mail port.
 </summary>
@@ -38999,7 +39083,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mail_port" lineno="46202">
+<interface name="corenet_udp_send_mail_port" lineno="46220">
 <summary>
 Send UDP traffic on the mail port.
 </summary>
@@ -39010,7 +39094,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
+<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235">
 <summary>
 Do not audit attempts to send UDP traffic on the mail port.
 </summary>
@@ -39021,7 +39105,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46232">
+<interface name="corenet_udp_receive_mail_port" lineno="46250">
 <summary>
 Receive UDP traffic on the mail port.
 </summary>
@@ -39032,7 +39116,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
+<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265">
 <summary>
 Do not audit attempts to receive UDP traffic on the mail port.
 </summary>
@@ -39043,7 +39127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
+<interface name="corenet_udp_sendrecv_mail_port" lineno="46280">
 <summary>
 Send and receive UDP traffic on the mail port.
 </summary>
@@ -39054,7 +39138,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
+<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mail port.
@@ -39066,7 +39150,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46293">
+<interface name="corenet_tcp_bind_mail_port" lineno="46311">
 <summary>
 Bind TCP sockets to the mail port.
 </summary>
@@ -39077,7 +39161,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46313">
+<interface name="corenet_udp_bind_mail_port" lineno="46331">
 <summary>
 Bind UDP sockets to the mail port.
 </summary>
@@ -39088,7 +39172,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46332">
+<interface name="corenet_tcp_connect_mail_port" lineno="46350">
 <summary>
 Make a TCP connection to the mail port.
 </summary>
@@ -39098,7 +39182,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_client_packets" lineno="46352">
+<interface name="corenet_send_mail_client_packets" lineno="46370">
 <summary>
 Send mail_client packets.
 </summary>
@@ -39109,7 +39193,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389">
 <summary>
 Do not audit attempts to send mail_client packets.
 </summary>
@@ -39120,7 +39204,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46390">
+<interface name="corenet_receive_mail_client_packets" lineno="46408">
 <summary>
 Receive mail_client packets.
 </summary>
@@ -39131,7 +39215,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427">
 <summary>
 Do not audit attempts to receive mail_client packets.
 </summary>
@@ -39142,7 +39226,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="46446">
 <summary>
 Send and receive mail_client packets.
 </summary>
@@ -39153,7 +39237,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462">
 <summary>
 Do not audit attempts to send and receive mail_client packets.
 </summary>
@@ -39164,7 +39248,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
+<interface name="corenet_relabelto_mail_client_packets" lineno="46477">
 <summary>
 Relabel packets to mail_client the packet type.
 </summary>
@@ -39174,7 +39258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_server_packets" lineno="46479">
+<interface name="corenet_send_mail_server_packets" lineno="46497">
 <summary>
 Send mail_server packets.
 </summary>
@@ -39185,7 +39269,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516">
 <summary>
 Do not audit attempts to send mail_server packets.
 </summary>
@@ -39196,7 +39280,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46517">
+<interface name="corenet_receive_mail_server_packets" lineno="46535">
 <summary>
 Receive mail_server packets.
 </summary>
@@ -39207,7 +39291,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554">
 <summary>
 Do not audit attempts to receive mail_server packets.
 </summary>
@@ -39218,7 +39302,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="46573">
 <summary>
 Send and receive mail_server packets.
 </summary>
@@ -39229,7 +39313,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589">
 <summary>
 Do not audit attempts to send and receive mail_server packets.
 </summary>
@@ -39240,7 +39324,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
+<interface name="corenet_relabelto_mail_server_packets" lineno="46604">
 <summary>
 Relabel packets to mail_server the packet type.
 </summary>
@@ -39250,7 +39334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
+<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626">
 <summary>
 Send and receive TCP traffic on the matahari port.
 </summary>
@@ -39261,7 +39345,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46623">
+<interface name="corenet_udp_send_matahari_port" lineno="46641">
 <summary>
 Send UDP traffic on the matahari port.
 </summary>
@@ -39272,7 +39356,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
+<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656">
 <summary>
 Do not audit attempts to send UDP traffic on the matahari port.
 </summary>
@@ -39283,7 +39367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46653">
+<interface name="corenet_udp_receive_matahari_port" lineno="46671">
 <summary>
 Receive UDP traffic on the matahari port.
 </summary>
@@ -39294,7 +39378,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
+<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686">
 <summary>
 Do not audit attempts to receive UDP traffic on the matahari port.
 </summary>
@@ -39305,7 +39389,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
+<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701">
 <summary>
 Send and receive UDP traffic on the matahari port.
 </summary>
@@ -39316,7 +39400,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
+<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the matahari port.
@@ -39328,7 +39412,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
+<interface name="corenet_tcp_bind_matahari_port" lineno="46732">
 <summary>
 Bind TCP sockets to the matahari port.
 </summary>
@@ -39339,7 +39423,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46734">
+<interface name="corenet_udp_bind_matahari_port" lineno="46752">
 <summary>
 Bind UDP sockets to the matahari port.
 </summary>
@@ -39350,7 +39434,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
+<interface name="corenet_tcp_connect_matahari_port" lineno="46771">
 <summary>
 Make a TCP connection to the matahari port.
 </summary>
@@ -39360,7 +39444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46773">
+<interface name="corenet_send_matahari_client_packets" lineno="46791">
 <summary>
 Send matahari_client packets.
 </summary>
@@ -39371,7 +39455,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810">
 <summary>
 Do not audit attempts to send matahari_client packets.
 </summary>
@@ -39382,7 +39466,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46811">
+<interface name="corenet_receive_matahari_client_packets" lineno="46829">
 <summary>
 Receive matahari_client packets.
 </summary>
@@ -39393,7 +39477,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848">
 <summary>
 Do not audit attempts to receive matahari_client packets.
 </summary>
@@ -39404,7 +39488,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867">
 <summary>
 Send and receive matahari_client packets.
 </summary>
@@ -39415,7 +39499,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883">
 <summary>
 Do not audit attempts to send and receive matahari_client packets.
 </summary>
@@ -39426,7 +39510,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="46898">
 <summary>
 Relabel packets to matahari_client the packet type.
 </summary>
@@ -39436,7 +39520,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46900">
+<interface name="corenet_send_matahari_server_packets" lineno="46918">
 <summary>
 Send matahari_server packets.
 </summary>
@@ -39447,7 +39531,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937">
 <summary>
 Do not audit attempts to send matahari_server packets.
 </summary>
@@ -39458,7 +39542,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46938">
+<interface name="corenet_receive_matahari_server_packets" lineno="46956">
 <summary>
 Receive matahari_server packets.
 </summary>
@@ -39469,7 +39553,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975">
 <summary>
 Do not audit attempts to receive matahari_server packets.
 </summary>
@@ -39480,7 +39564,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994">
 <summary>
 Send and receive matahari_server packets.
 </summary>
@@ -39491,7 +39575,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010">
 <summary>
 Do not audit attempts to send and receive matahari_server packets.
 </summary>
@@ -39502,7 +39586,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="47025">
 <summary>
 Relabel packets to matahari_server the packet type.
 </summary>
@@ -39512,7 +39596,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
+<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047">
 <summary>
 Send and receive TCP traffic on the memcache port.
 </summary>
@@ -39523,7 +39607,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_memcache_port" lineno="47044">
+<interface name="corenet_udp_send_memcache_port" lineno="47062">
 <summary>
 Send UDP traffic on the memcache port.
 </summary>
@@ -39534,7 +39618,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
+<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077">
 <summary>
 Do not audit attempts to send UDP traffic on the memcache port.
 </summary>
@@ -39545,7 +39629,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="47074">
+<interface name="corenet_udp_receive_memcache_port" lineno="47092">
 <summary>
 Receive UDP traffic on the memcache port.
 </summary>
@@ -39556,7 +39640,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
+<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107">
 <summary>
 Do not audit attempts to receive UDP traffic on the memcache port.
 </summary>
@@ -39567,7 +39651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
+<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122">
 <summary>
 Send and receive UDP traffic on the memcache port.
 </summary>
@@ -39578,7 +39662,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
+<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the memcache port.
@@ -39590,7 +39674,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
+<interface name="corenet_tcp_bind_memcache_port" lineno="47153">
 <summary>
 Bind TCP sockets to the memcache port.
 </summary>
@@ -39601,7 +39685,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47155">
+<interface name="corenet_udp_bind_memcache_port" lineno="47173">
 <summary>
 Bind UDP sockets to the memcache port.
 </summary>
@@ -39612,7 +39696,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
+<interface name="corenet_tcp_connect_memcache_port" lineno="47192">
 <summary>
 Make a TCP connection to the memcache port.
 </summary>
@@ -39622,7 +39706,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47194">
+<interface name="corenet_send_memcache_client_packets" lineno="47212">
 <summary>
 Send memcache_client packets.
 </summary>
@@ -39633,7 +39717,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231">
 <summary>
 Do not audit attempts to send memcache_client packets.
 </summary>
@@ -39644,7 +39728,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47232">
+<interface name="corenet_receive_memcache_client_packets" lineno="47250">
 <summary>
 Receive memcache_client packets.
 </summary>
@@ -39655,7 +39739,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269">
 <summary>
 Do not audit attempts to receive memcache_client packets.
 </summary>
@@ -39666,7 +39750,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288">
 <summary>
 Send and receive memcache_client packets.
 </summary>
@@ -39677,7 +39761,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304">
 <summary>
 Do not audit attempts to send and receive memcache_client packets.
 </summary>
@@ -39688,7 +39772,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="47319">
 <summary>
 Relabel packets to memcache_client the packet type.
 </summary>
@@ -39698,7 +39782,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47321">
+<interface name="corenet_send_memcache_server_packets" lineno="47339">
 <summary>
 Send memcache_server packets.
 </summary>
@@ -39709,7 +39793,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358">
 <summary>
 Do not audit attempts to send memcache_server packets.
 </summary>
@@ -39720,7 +39804,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47359">
+<interface name="corenet_receive_memcache_server_packets" lineno="47377">
 <summary>
 Receive memcache_server packets.
 </summary>
@@ -39731,7 +39815,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396">
 <summary>
 Do not audit attempts to receive memcache_server packets.
 </summary>
@@ -39742,7 +39826,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415">
 <summary>
 Send and receive memcache_server packets.
 </summary>
@@ -39753,7 +39837,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431">
 <summary>
 Do not audit attempts to send and receive memcache_server packets.
 </summary>
@@ -39764,7 +39848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="47446">
 <summary>
 Relabel packets to memcache_server the packet type.
 </summary>
@@ -39774,7 +39858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
+<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468">
 <summary>
 Send and receive TCP traffic on the milter port.
 </summary>
@@ -39785,7 +39869,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_milter_port" lineno="47465">
+<interface name="corenet_udp_send_milter_port" lineno="47483">
 <summary>
 Send UDP traffic on the milter port.
 </summary>
@@ -39796,7 +39880,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
+<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498">
 <summary>
 Do not audit attempts to send UDP traffic on the milter port.
 </summary>
@@ -39807,7 +39891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47495">
+<interface name="corenet_udp_receive_milter_port" lineno="47513">
 <summary>
 Receive UDP traffic on the milter port.
 </summary>
@@ -39818,7 +39902,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
+<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528">
 <summary>
 Do not audit attempts to receive UDP traffic on the milter port.
 </summary>
@@ -39829,7 +39913,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
+<interface name="corenet_udp_sendrecv_milter_port" lineno="47543">
 <summary>
 Send and receive UDP traffic on the milter port.
 </summary>
@@ -39840,7 +39924,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
+<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the milter port.
@@ -39852,7 +39936,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47556">
+<interface name="corenet_tcp_bind_milter_port" lineno="47574">
 <summary>
 Bind TCP sockets to the milter port.
 </summary>
@@ -39863,7 +39947,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47576">
+<interface name="corenet_udp_bind_milter_port" lineno="47594">
 <summary>
 Bind UDP sockets to the milter port.
 </summary>
@@ -39874,7 +39958,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47595">
+<interface name="corenet_tcp_connect_milter_port" lineno="47613">
 <summary>
 Make a TCP connection to the milter port.
 </summary>
@@ -39884,7 +39968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_client_packets" lineno="47615">
+<interface name="corenet_send_milter_client_packets" lineno="47633">
 <summary>
 Send milter_client packets.
 </summary>
@@ -39895,7 +39979,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652">
 <summary>
 Do not audit attempts to send milter_client packets.
 </summary>
@@ -39906,7 +39990,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47653">
+<interface name="corenet_receive_milter_client_packets" lineno="47671">
 <summary>
 Receive milter_client packets.
 </summary>
@@ -39917,7 +40001,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690">
 <summary>
 Do not audit attempts to receive milter_client packets.
 </summary>
@@ -39928,7 +40012,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="47709">
 <summary>
 Send and receive milter_client packets.
 </summary>
@@ -39939,7 +40023,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725">
 <summary>
 Do not audit attempts to send and receive milter_client packets.
 </summary>
@@ -39950,7 +40034,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
+<interface name="corenet_relabelto_milter_client_packets" lineno="47740">
 <summary>
 Relabel packets to milter_client the packet type.
 </summary>
@@ -39960,7 +40044,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_server_packets" lineno="47742">
+<interface name="corenet_send_milter_server_packets" lineno="47760">
 <summary>
 Send milter_server packets.
 </summary>
@@ -39971,7 +40055,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779">
 <summary>
 Do not audit attempts to send milter_server packets.
 </summary>
@@ -39982,7 +40066,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47780">
+<interface name="corenet_receive_milter_server_packets" lineno="47798">
 <summary>
 Receive milter_server packets.
 </summary>
@@ -39993,7 +40077,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817">
 <summary>
 Do not audit attempts to receive milter_server packets.
 </summary>
@@ -40004,7 +40088,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="47836">
 <summary>
 Send and receive milter_server packets.
 </summary>
@@ -40015,7 +40099,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852">
 <summary>
 Do not audit attempts to send and receive milter_server packets.
 </summary>
@@ -40026,7 +40110,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
+<interface name="corenet_relabelto_milter_server_packets" lineno="47867">
 <summary>
 Relabel packets to milter_server the packet type.
 </summary>
@@ -40036,7 +40120,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
+<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889">
 <summary>
 Send and receive TCP traffic on the mmcc port.
 </summary>
@@ -40047,7 +40131,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47886">
+<interface name="corenet_udp_send_mmcc_port" lineno="47904">
 <summary>
 Send UDP traffic on the mmcc port.
 </summary>
@@ -40058,7 +40142,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
+<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919">
 <summary>
 Do not audit attempts to send UDP traffic on the mmcc port.
 </summary>
@@ -40069,7 +40153,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
+<interface name="corenet_udp_receive_mmcc_port" lineno="47934">
 <summary>
 Receive UDP traffic on the mmcc port.
 </summary>
@@ -40080,7 +40164,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
+<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949">
 <summary>
 Do not audit attempts to receive UDP traffic on the mmcc port.
 </summary>
@@ -40091,7 +40175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
+<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964">
 <summary>
 Send and receive UDP traffic on the mmcc port.
 </summary>
@@ -40102,7 +40186,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
+<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mmcc port.
@@ -40114,7 +40198,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="47995">
 <summary>
 Bind TCP sockets to the mmcc port.
 </summary>
@@ -40125,7 +40209,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
+<interface name="corenet_udp_bind_mmcc_port" lineno="48015">
 <summary>
 Bind UDP sockets to the mmcc port.
 </summary>
@@ -40136,7 +40220,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="48034">
 <summary>
 Make a TCP connection to the mmcc port.
 </summary>
@@ -40146,7 +40230,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="48036">
+<interface name="corenet_send_mmcc_client_packets" lineno="48054">
 <summary>
 Send mmcc_client packets.
 </summary>
@@ -40157,7 +40241,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073">
 <summary>
 Do not audit attempts to send mmcc_client packets.
 </summary>
@@ -40168,7 +40252,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
+<interface name="corenet_receive_mmcc_client_packets" lineno="48092">
 <summary>
 Receive mmcc_client packets.
 </summary>
@@ -40179,7 +40263,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111">
 <summary>
 Do not audit attempts to receive mmcc_client packets.
 </summary>
@@ -40190,7 +40274,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130">
 <summary>
 Send and receive mmcc_client packets.
 </summary>
@@ -40201,7 +40285,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146">
 <summary>
 Do not audit attempts to send and receive mmcc_client packets.
 </summary>
@@ -40212,7 +40296,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161">
 <summary>
 Relabel packets to mmcc_client the packet type.
 </summary>
@@ -40222,7 +40306,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48163">
+<interface name="corenet_send_mmcc_server_packets" lineno="48181">
 <summary>
 Send mmcc_server packets.
 </summary>
@@ -40233,7 +40317,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200">
 <summary>
 Do not audit attempts to send mmcc_server packets.
 </summary>
@@ -40244,7 +40328,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
+<interface name="corenet_receive_mmcc_server_packets" lineno="48219">
 <summary>
 Receive mmcc_server packets.
 </summary>
@@ -40255,7 +40339,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238">
 <summary>
 Do not audit attempts to receive mmcc_server packets.
 </summary>
@@ -40266,7 +40350,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257">
 <summary>
 Send and receive mmcc_server packets.
 </summary>
@@ -40277,7 +40361,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273">
 <summary>
 Do not audit attempts to send and receive mmcc_server packets.
 </summary>
@@ -40288,7 +40372,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288">
 <summary>
 Relabel packets to mmcc_server the packet type.
 </summary>
@@ -40298,7 +40382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
+<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310">
 <summary>
 Send and receive TCP traffic on the mon port.
 </summary>
@@ -40309,7 +40393,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mon_port" lineno="48307">
+<interface name="corenet_udp_send_mon_port" lineno="48325">
 <summary>
 Send UDP traffic on the mon port.
 </summary>
@@ -40320,7 +40404,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
+<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340">
 <summary>
 Do not audit attempts to send UDP traffic on the mon port.
 </summary>
@@ -40331,7 +40415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48337">
+<interface name="corenet_udp_receive_mon_port" lineno="48355">
 <summary>
 Receive UDP traffic on the mon port.
 </summary>
@@ -40342,7 +40426,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
+<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370">
 <summary>
 Do not audit attempts to receive UDP traffic on the mon port.
 </summary>
@@ -40353,7 +40437,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
+<interface name="corenet_udp_sendrecv_mon_port" lineno="48385">
 <summary>
 Send and receive UDP traffic on the mon port.
 </summary>
@@ -40364,7 +40448,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
+<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mon port.
@@ -40376,7 +40460,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48398">
+<interface name="corenet_tcp_bind_mon_port" lineno="48416">
 <summary>
 Bind TCP sockets to the mon port.
 </summary>
@@ -40387,7 +40471,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48418">
+<interface name="corenet_udp_bind_mon_port" lineno="48436">
 <summary>
 Bind UDP sockets to the mon port.
 </summary>
@@ -40398,7 +40482,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48437">
+<interface name="corenet_tcp_connect_mon_port" lineno="48455">
 <summary>
 Make a TCP connection to the mon port.
 </summary>
@@ -40408,7 +40492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_client_packets" lineno="48457">
+<interface name="corenet_send_mon_client_packets" lineno="48475">
 <summary>
 Send mon_client packets.
 </summary>
@@ -40419,7 +40503,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494">
 <summary>
 Do not audit attempts to send mon_client packets.
 </summary>
@@ -40430,7 +40514,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48495">
+<interface name="corenet_receive_mon_client_packets" lineno="48513">
 <summary>
 Receive mon_client packets.
 </summary>
@@ -40441,7 +40525,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532">
 <summary>
 Do not audit attempts to receive mon_client packets.
 </summary>
@@ -40452,7 +40536,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="48551">
 <summary>
 Send and receive mon_client packets.
 </summary>
@@ -40463,7 +40547,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567">
 <summary>
 Do not audit attempts to send and receive mon_client packets.
 </summary>
@@ -40474,7 +40558,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
+<interface name="corenet_relabelto_mon_client_packets" lineno="48582">
 <summary>
 Relabel packets to mon_client the packet type.
 </summary>
@@ -40484,7 +40568,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_server_packets" lineno="48584">
+<interface name="corenet_send_mon_server_packets" lineno="48602">
 <summary>
 Send mon_server packets.
 </summary>
@@ -40495,7 +40579,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621">
 <summary>
 Do not audit attempts to send mon_server packets.
 </summary>
@@ -40506,7 +40590,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48622">
+<interface name="corenet_receive_mon_server_packets" lineno="48640">
 <summary>
 Receive mon_server packets.
 </summary>
@@ -40517,7 +40601,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659">
 <summary>
 Do not audit attempts to receive mon_server packets.
 </summary>
@@ -40528,7 +40612,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="48678">
 <summary>
 Send and receive mon_server packets.
 </summary>
@@ -40539,7 +40623,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694">
 <summary>
 Do not audit attempts to send and receive mon_server packets.
 </summary>
@@ -40550,7 +40634,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
+<interface name="corenet_relabelto_mon_server_packets" lineno="48709">
 <summary>
 Relabel packets to mon_server the packet type.
 </summary>
@@ -40560,7 +40644,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
+<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731">
 <summary>
 Send and receive TCP traffic on the monit port.
 </summary>
@@ -40571,7 +40655,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_monit_port" lineno="48728">
+<interface name="corenet_udp_send_monit_port" lineno="48746">
 <summary>
 Send UDP traffic on the monit port.
 </summary>
@@ -40582,7 +40666,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
+<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761">
 <summary>
 Do not audit attempts to send UDP traffic on the monit port.
 </summary>
@@ -40593,7 +40677,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48758">
+<interface name="corenet_udp_receive_monit_port" lineno="48776">
 <summary>
 Receive UDP traffic on the monit port.
 </summary>
@@ -40604,7 +40688,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
+<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791">
 <summary>
 Do not audit attempts to receive UDP traffic on the monit port.
 </summary>
@@ -40615,7 +40699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
+<interface name="corenet_udp_sendrecv_monit_port" lineno="48806">
 <summary>
 Send and receive UDP traffic on the monit port.
 </summary>
@@ -40626,7 +40710,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
+<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the monit port.
@@ -40638,7 +40722,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48819">
+<interface name="corenet_tcp_bind_monit_port" lineno="48837">
 <summary>
 Bind TCP sockets to the monit port.
 </summary>
@@ -40649,7 +40733,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48839">
+<interface name="corenet_udp_bind_monit_port" lineno="48857">
 <summary>
 Bind UDP sockets to the monit port.
 </summary>
@@ -40660,7 +40744,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48858">
+<interface name="corenet_tcp_connect_monit_port" lineno="48876">
 <summary>
 Make a TCP connection to the monit port.
 </summary>
@@ -40670,7 +40754,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_client_packets" lineno="48878">
+<interface name="corenet_send_monit_client_packets" lineno="48896">
 <summary>
 Send monit_client packets.
 </summary>
@@ -40681,7 +40765,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915">
 <summary>
 Do not audit attempts to send monit_client packets.
 </summary>
@@ -40692,7 +40776,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48916">
+<interface name="corenet_receive_monit_client_packets" lineno="48934">
 <summary>
 Receive monit_client packets.
 </summary>
@@ -40703,7 +40787,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953">
 <summary>
 Do not audit attempts to receive monit_client packets.
 </summary>
@@ -40714,7 +40798,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="48972">
 <summary>
 Send and receive monit_client packets.
 </summary>
@@ -40725,7 +40809,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988">
 <summary>
 Do not audit attempts to send and receive monit_client packets.
 </summary>
@@ -40736,7 +40820,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
+<interface name="corenet_relabelto_monit_client_packets" lineno="49003">
 <summary>
 Relabel packets to monit_client the packet type.
 </summary>
@@ -40746,7 +40830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_server_packets" lineno="49005">
+<interface name="corenet_send_monit_server_packets" lineno="49023">
 <summary>
 Send monit_server packets.
 </summary>
@@ -40757,7 +40841,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042">
 <summary>
 Do not audit attempts to send monit_server packets.
 </summary>
@@ -40768,7 +40852,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_server_packets" lineno="49043">
+<interface name="corenet_receive_monit_server_packets" lineno="49061">
 <summary>
 Receive monit_server packets.
 </summary>
@@ -40779,7 +40863,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080">
 <summary>
 Do not audit attempts to receive monit_server packets.
 </summary>
@@ -40790,7 +40874,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="49099">
 <summary>
 Send and receive monit_server packets.
 </summary>
@@ -40801,7 +40885,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115">
 <summary>
 Do not audit attempts to send and receive monit_server packets.
 </summary>
@@ -40812,7 +40896,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
+<interface name="corenet_relabelto_monit_server_packets" lineno="49130">
 <summary>
 Relabel packets to monit_server the packet type.
 </summary>
@@ -40822,7 +40906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
+<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152">
 <summary>
 Send and receive TCP traffic on the monopd port.
 </summary>
@@ -40833,7 +40917,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49149">
+<interface name="corenet_udp_send_monopd_port" lineno="49167">
 <summary>
 Send UDP traffic on the monopd port.
 </summary>
@@ -40844,7 +40928,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
+<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182">
 <summary>
 Do not audit attempts to send UDP traffic on the monopd port.
 </summary>
@@ -40855,7 +40939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49179">
+<interface name="corenet_udp_receive_monopd_port" lineno="49197">
 <summary>
 Receive UDP traffic on the monopd port.
 </summary>
@@ -40866,7 +40950,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
+<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212">
 <summary>
 Do not audit attempts to receive UDP traffic on the monopd port.
 </summary>
@@ -40877,7 +40961,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
+<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227">
 <summary>
 Send and receive UDP traffic on the monopd port.
 </summary>
@@ -40888,7 +40972,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
+<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the monopd port.
@@ -40900,7 +40984,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
+<interface name="corenet_tcp_bind_monopd_port" lineno="49258">
 <summary>
 Bind TCP sockets to the monopd port.
 </summary>
@@ -40911,7 +40995,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49260">
+<interface name="corenet_udp_bind_monopd_port" lineno="49278">
 <summary>
 Bind UDP sockets to the monopd port.
 </summary>
@@ -40922,7 +41006,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
+<interface name="corenet_tcp_connect_monopd_port" lineno="49297">
 <summary>
 Make a TCP connection to the monopd port.
 </summary>
@@ -40932,7 +41016,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49299">
+<interface name="corenet_send_monopd_client_packets" lineno="49317">
 <summary>
 Send monopd_client packets.
 </summary>
@@ -40943,7 +41027,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336">
 <summary>
 Do not audit attempts to send monopd_client packets.
 </summary>
@@ -40954,7 +41038,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49337">
+<interface name="corenet_receive_monopd_client_packets" lineno="49355">
 <summary>
 Receive monopd_client packets.
 </summary>
@@ -40965,7 +41049,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374">
 <summary>
 Do not audit attempts to receive monopd_client packets.
 </summary>
@@ -40976,7 +41060,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393">
 <summary>
 Send and receive monopd_client packets.
 </summary>
@@ -40987,7 +41071,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409">
 <summary>
 Do not audit attempts to send and receive monopd_client packets.
 </summary>
@@ -40998,7 +41082,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="49424">
 <summary>
 Relabel packets to monopd_client the packet type.
 </summary>
@@ -41008,7 +41092,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49426">
+<interface name="corenet_send_monopd_server_packets" lineno="49444">
 <summary>
 Send monopd_server packets.
 </summary>
@@ -41019,7 +41103,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463">
 <summary>
 Do not audit attempts to send monopd_server packets.
 </summary>
@@ -41030,7 +41114,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49464">
+<interface name="corenet_receive_monopd_server_packets" lineno="49482">
 <summary>
 Receive monopd_server packets.
 </summary>
@@ -41041,7 +41125,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501">
 <summary>
 Do not audit attempts to receive monopd_server packets.
 </summary>
@@ -41052,7 +41136,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520">
 <summary>
 Send and receive monopd_server packets.
 </summary>
@@ -41063,7 +41147,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536">
 <summary>
 Do not audit attempts to send and receive monopd_server packets.
 </summary>
@@ -41074,7 +41158,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="49551">
 <summary>
 Relabel packets to monopd_server the packet type.
 </summary>
@@ -41084,7 +41168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
+<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573">
 <summary>
 Send and receive TCP traffic on the mountd port.
 </summary>
@@ -41095,7 +41179,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49570">
+<interface name="corenet_udp_send_mountd_port" lineno="49588">
 <summary>
 Send UDP traffic on the mountd port.
 </summary>
@@ -41106,7 +41190,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
+<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603">
 <summary>
 Do not audit attempts to send UDP traffic on the mountd port.
 </summary>
@@ -41117,7 +41201,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49600">
+<interface name="corenet_udp_receive_mountd_port" lineno="49618">
 <summary>
 Receive UDP traffic on the mountd port.
 </summary>
@@ -41128,7 +41212,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
+<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633">
 <summary>
 Do not audit attempts to receive UDP traffic on the mountd port.
 </summary>
@@ -41139,7 +41223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
+<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648">
 <summary>
 Send and receive UDP traffic on the mountd port.
 </summary>
@@ -41150,7 +41234,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
+<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mountd port.
@@ -41162,7 +41246,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
+<interface name="corenet_tcp_bind_mountd_port" lineno="49679">
 <summary>
 Bind TCP sockets to the mountd port.
 </summary>
@@ -41173,7 +41257,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49681">
+<interface name="corenet_udp_bind_mountd_port" lineno="49699">
 <summary>
 Bind UDP sockets to the mountd port.
 </summary>
@@ -41184,7 +41268,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
+<interface name="corenet_tcp_connect_mountd_port" lineno="49718">
 <summary>
 Make a TCP connection to the mountd port.
 </summary>
@@ -41194,7 +41278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49720">
+<interface name="corenet_send_mountd_client_packets" lineno="49738">
 <summary>
 Send mountd_client packets.
 </summary>
@@ -41205,7 +41289,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757">
 <summary>
 Do not audit attempts to send mountd_client packets.
 </summary>
@@ -41216,7 +41300,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49758">
+<interface name="corenet_receive_mountd_client_packets" lineno="49776">
 <summary>
 Receive mountd_client packets.
 </summary>
@@ -41227,7 +41311,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795">
 <summary>
 Do not audit attempts to receive mountd_client packets.
 </summary>
@@ -41238,7 +41322,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814">
 <summary>
 Send and receive mountd_client packets.
 </summary>
@@ -41249,7 +41333,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830">
 <summary>
 Do not audit attempts to send and receive mountd_client packets.
 </summary>
@@ -41260,7 +41344,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="49845">
 <summary>
 Relabel packets to mountd_client the packet type.
 </summary>
@@ -41270,7 +41354,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49847">
+<interface name="corenet_send_mountd_server_packets" lineno="49865">
 <summary>
 Send mountd_server packets.
 </summary>
@@ -41281,7 +41365,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884">
 <summary>
 Do not audit attempts to send mountd_server packets.
 </summary>
@@ -41292,7 +41376,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49885">
+<interface name="corenet_receive_mountd_server_packets" lineno="49903">
 <summary>
 Receive mountd_server packets.
 </summary>
@@ -41303,7 +41387,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922">
 <summary>
 Do not audit attempts to receive mountd_server packets.
 </summary>
@@ -41314,7 +41398,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941">
 <summary>
 Send and receive mountd_server packets.
 </summary>
@@ -41325,7 +41409,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957">
 <summary>
 Do not audit attempts to send and receive mountd_server packets.
 </summary>
@@ -41336,7 +41420,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="49972">
 <summary>
 Relabel packets to mountd_server the packet type.
 </summary>
@@ -41346,7 +41430,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
+<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994">
 <summary>
 Send and receive TCP traffic on the movaz_ssc port.
 </summary>
@@ -41357,7 +41441,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
+<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009">
 <summary>
 Send UDP traffic on the movaz_ssc port.
 </summary>
@@ -41368,7 +41452,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
+<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024">
 <summary>
 Do not audit attempts to send UDP traffic on the movaz_ssc port.
 </summary>
@@ -41379,7 +41463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
+<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039">
 <summary>
 Receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41390,7 +41474,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
+<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054">
 <summary>
 Do not audit attempts to receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41401,7 +41485,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
+<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069">
 <summary>
 Send and receive UDP traffic on the movaz_ssc port.
 </summary>
@@ -41412,7 +41496,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
+<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the movaz_ssc port.
@@ -41424,7 +41508,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100">
 <summary>
 Bind TCP sockets to the movaz_ssc port.
 </summary>
@@ -41435,7 +41519,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120">
 <summary>
 Bind UDP sockets to the movaz_ssc port.
 </summary>
@@ -41446,7 +41530,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139">
 <summary>
 Make a TCP connection to the movaz_ssc port.
 </summary>
@@ -41456,7 +41540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159">
 <summary>
 Send movaz_ssc_client packets.
 </summary>
@@ -41467,7 +41551,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178">
 <summary>
 Do not audit attempts to send movaz_ssc_client packets.
 </summary>
@@ -41478,7 +41562,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197">
 <summary>
 Receive movaz_ssc_client packets.
 </summary>
@@ -41489,7 +41573,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216">
 <summary>
 Do not audit attempts to receive movaz_ssc_client packets.
 </summary>
@@ -41500,7 +41584,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235">
 <summary>
 Send and receive movaz_ssc_client packets.
 </summary>
@@ -41511,7 +41595,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_client packets.
 </summary>
@@ -41522,7 +41606,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266">
 <summary>
 Relabel packets to movaz_ssc_client the packet type.
 </summary>
@@ -41532,7 +41616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286">
 <summary>
 Send movaz_ssc_server packets.
 </summary>
@@ -41543,7 +41627,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305">
 <summary>
 Do not audit attempts to send movaz_ssc_server packets.
 </summary>
@@ -41554,7 +41638,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324">
 <summary>
 Receive movaz_ssc_server packets.
 </summary>
@@ -41565,7 +41649,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343">
 <summary>
 Do not audit attempts to receive movaz_ssc_server packets.
 </summary>
@@ -41576,7 +41660,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362">
 <summary>
 Send and receive movaz_ssc_server packets.
 </summary>
@@ -41587,7 +41671,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_server packets.
 </summary>
@@ -41598,7 +41682,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393">
 <summary>
 Relabel packets to movaz_ssc_server the packet type.
 </summary>
@@ -41608,7 +41692,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
+<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415">
 <summary>
 Send and receive TCP traffic on the mpd port.
 </summary>
@@ -41619,7 +41703,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50412">
+<interface name="corenet_udp_send_mpd_port" lineno="50430">
 <summary>
 Send UDP traffic on the mpd port.
 </summary>
@@ -41630,7 +41714,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
+<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445">
 <summary>
 Do not audit attempts to send UDP traffic on the mpd port.
 </summary>
@@ -41641,7 +41725,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50442">
+<interface name="corenet_udp_receive_mpd_port" lineno="50460">
 <summary>
 Receive UDP traffic on the mpd port.
 </summary>
@@ -41652,7 +41736,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
+<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475">
 <summary>
 Do not audit attempts to receive UDP traffic on the mpd port.
 </summary>
@@ -41663,7 +41747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
+<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490">
 <summary>
 Send and receive UDP traffic on the mpd port.
 </summary>
@@ -41674,7 +41758,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
+<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mpd port.
@@ -41686,7 +41770,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
+<interface name="corenet_tcp_bind_mpd_port" lineno="50521">
 <summary>
 Bind TCP sockets to the mpd port.
 </summary>
@@ -41697,7 +41781,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50523">
+<interface name="corenet_udp_bind_mpd_port" lineno="50541">
 <summary>
 Bind UDP sockets to the mpd port.
 </summary>
@@ -41708,7 +41792,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
+<interface name="corenet_tcp_connect_mpd_port" lineno="50560">
 <summary>
 Make a TCP connection to the mpd port.
 </summary>
@@ -41718,7 +41802,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50562">
+<interface name="corenet_send_mpd_client_packets" lineno="50580">
 <summary>
 Send mpd_client packets.
 </summary>
@@ -41729,7 +41813,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599">
 <summary>
 Do not audit attempts to send mpd_client packets.
 </summary>
@@ -41740,7 +41824,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50600">
+<interface name="corenet_receive_mpd_client_packets" lineno="50618">
 <summary>
 Receive mpd_client packets.
 </summary>
@@ -41751,7 +41835,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637">
 <summary>
 Do not audit attempts to receive mpd_client packets.
 </summary>
@@ -41762,7 +41846,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656">
 <summary>
 Send and receive mpd_client packets.
 </summary>
@@ -41773,7 +41857,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672">
 <summary>
 Do not audit attempts to send and receive mpd_client packets.
 </summary>
@@ -41784,7 +41868,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="50687">
 <summary>
 Relabel packets to mpd_client the packet type.
 </summary>
@@ -41794,7 +41878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50689">
+<interface name="corenet_send_mpd_server_packets" lineno="50707">
 <summary>
 Send mpd_server packets.
 </summary>
@@ -41805,7 +41889,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726">
 <summary>
 Do not audit attempts to send mpd_server packets.
 </summary>
@@ -41816,7 +41900,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50727">
+<interface name="corenet_receive_mpd_server_packets" lineno="50745">
 <summary>
 Receive mpd_server packets.
 </summary>
@@ -41827,7 +41911,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764">
 <summary>
 Do not audit attempts to receive mpd_server packets.
 </summary>
@@ -41838,7 +41922,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783">
 <summary>
 Send and receive mpd_server packets.
 </summary>
@@ -41849,7 +41933,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799">
 <summary>
 Do not audit attempts to send and receive mpd_server packets.
 </summary>
@@ -41860,7 +41944,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="50814">
 <summary>
 Relabel packets to mpd_server the packet type.
 </summary>
@@ -41870,7 +41954,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
+<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836">
 <summary>
 Send and receive TCP traffic on the msgsrvr port.
 </summary>
@@ -41881,7 +41965,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
+<interface name="corenet_udp_send_msgsrvr_port" lineno="50851">
 <summary>
 Send UDP traffic on the msgsrvr port.
 </summary>
@@ -41892,7 +41976,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
+<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866">
 <summary>
 Do not audit attempts to send UDP traffic on the msgsrvr port.
 </summary>
@@ -41903,7 +41987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
+<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881">
 <summary>
 Receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41914,7 +41998,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
+<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896">
 <summary>
 Do not audit attempts to receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41925,7 +42009,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
+<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911">
 <summary>
 Send and receive UDP traffic on the msgsrvr port.
 </summary>
@@ -41936,7 +42020,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
+<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the msgsrvr port.
@@ -41948,7 +42032,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942">
 <summary>
 Bind TCP sockets to the msgsrvr port.
 </summary>
@@ -41959,7 +42043,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962">
 <summary>
 Bind UDP sockets to the msgsrvr port.
 </summary>
@@ -41970,7 +42054,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981">
 <summary>
 Make a TCP connection to the msgsrvr port.
 </summary>
@@ -41980,7 +42064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="51001">
 <summary>
 Send msgsrvr_client packets.
 </summary>
@@ -41991,7 +42075,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020">
 <summary>
 Do not audit attempts to send msgsrvr_client packets.
 </summary>
@@ -42002,7 +42086,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039">
 <summary>
 Receive msgsrvr_client packets.
 </summary>
@@ -42013,7 +42097,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058">
 <summary>
 Do not audit attempts to receive msgsrvr_client packets.
 </summary>
@@ -42024,7 +42108,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077">
 <summary>
 Send and receive msgsrvr_client packets.
 </summary>
@@ -42035,7 +42119,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093">
 <summary>
 Do not audit attempts to send and receive msgsrvr_client packets.
 </summary>
@@ -42046,7 +42130,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108">
 <summary>
 Relabel packets to msgsrvr_client the packet type.
 </summary>
@@ -42056,7 +42140,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="51128">
 <summary>
 Send msgsrvr_server packets.
 </summary>
@@ -42067,7 +42151,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147">
 <summary>
 Do not audit attempts to send msgsrvr_server packets.
 </summary>
@@ -42078,7 +42162,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166">
 <summary>
 Receive msgsrvr_server packets.
 </summary>
@@ -42089,7 +42173,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185">
 <summary>
 Do not audit attempts to receive msgsrvr_server packets.
 </summary>
@@ -42100,7 +42184,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204">
 <summary>
 Send and receive msgsrvr_server packets.
 </summary>
@@ -42111,7 +42195,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220">
 <summary>
 Do not audit attempts to send and receive msgsrvr_server packets.
 </summary>
@@ -42122,7 +42206,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235">
 <summary>
 Relabel packets to msgsrvr_server the packet type.
 </summary>
@@ -42132,7 +42216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
+<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257">
 <summary>
 Send and receive TCP traffic on the msnp port.
 </summary>
@@ -42143,7 +42227,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51254">
+<interface name="corenet_udp_send_msnp_port" lineno="51272">
 <summary>
 Send UDP traffic on the msnp port.
 </summary>
@@ -42154,7 +42238,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
+<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287">
 <summary>
 Do not audit attempts to send UDP traffic on the msnp port.
 </summary>
@@ -42165,7 +42249,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51284">
+<interface name="corenet_udp_receive_msnp_port" lineno="51302">
 <summary>
 Receive UDP traffic on the msnp port.
 </summary>
@@ -42176,7 +42260,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
+<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317">
 <summary>
 Do not audit attempts to receive UDP traffic on the msnp port.
 </summary>
@@ -42187,7 +42271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
+<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332">
 <summary>
 Send and receive UDP traffic on the msnp port.
 </summary>
@@ -42198,7 +42282,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
+<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the msnp port.
@@ -42210,7 +42294,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
+<interface name="corenet_tcp_bind_msnp_port" lineno="51363">
 <summary>
 Bind TCP sockets to the msnp port.
 </summary>
@@ -42221,7 +42305,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51365">
+<interface name="corenet_udp_bind_msnp_port" lineno="51383">
 <summary>
 Bind UDP sockets to the msnp port.
 </summary>
@@ -42232,7 +42316,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
+<interface name="corenet_tcp_connect_msnp_port" lineno="51402">
 <summary>
 Make a TCP connection to the msnp port.
 </summary>
@@ -42242,7 +42326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51404">
+<interface name="corenet_send_msnp_client_packets" lineno="51422">
 <summary>
 Send msnp_client packets.
 </summary>
@@ -42253,7 +42337,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441">
 <summary>
 Do not audit attempts to send msnp_client packets.
 </summary>
@@ -42264,7 +42348,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51442">
+<interface name="corenet_receive_msnp_client_packets" lineno="51460">
 <summary>
 Receive msnp_client packets.
 </summary>
@@ -42275,7 +42359,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479">
 <summary>
 Do not audit attempts to receive msnp_client packets.
 </summary>
@@ -42286,7 +42370,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498">
 <summary>
 Send and receive msnp_client packets.
 </summary>
@@ -42297,7 +42381,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514">
 <summary>
 Do not audit attempts to send and receive msnp_client packets.
 </summary>
@@ -42308,7 +42392,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="51529">
 <summary>
 Relabel packets to msnp_client the packet type.
 </summary>
@@ -42318,7 +42402,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51531">
+<interface name="corenet_send_msnp_server_packets" lineno="51549">
 <summary>
 Send msnp_server packets.
 </summary>
@@ -42329,7 +42413,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568">
 <summary>
 Do not audit attempts to send msnp_server packets.
 </summary>
@@ -42340,7 +42424,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51569">
+<interface name="corenet_receive_msnp_server_packets" lineno="51587">
 <summary>
 Receive msnp_server packets.
 </summary>
@@ -42351,7 +42435,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606">
 <summary>
 Do not audit attempts to receive msnp_server packets.
 </summary>
@@ -42362,7 +42446,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625">
 <summary>
 Send and receive msnp_server packets.
 </summary>
@@ -42373,7 +42457,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641">
 <summary>
 Do not audit attempts to send and receive msnp_server packets.
 </summary>
@@ -42384,7 +42468,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="51656">
 <summary>
 Relabel packets to msnp_server the packet type.
 </summary>
@@ -42394,7 +42478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
+<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678">
 <summary>
 Send and receive TCP traffic on the mssql port.
 </summary>
@@ -42405,7 +42489,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51675">
+<interface name="corenet_udp_send_mssql_port" lineno="51693">
 <summary>
 Send UDP traffic on the mssql port.
 </summary>
@@ -42416,7 +42500,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
+<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708">
 <summary>
 Do not audit attempts to send UDP traffic on the mssql port.
 </summary>
@@ -42427,7 +42511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51705">
+<interface name="corenet_udp_receive_mssql_port" lineno="51723">
 <summary>
 Receive UDP traffic on the mssql port.
 </summary>
@@ -42438,7 +42522,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
+<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738">
 <summary>
 Do not audit attempts to receive UDP traffic on the mssql port.
 </summary>
@@ -42449,7 +42533,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
+<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753">
 <summary>
 Send and receive UDP traffic on the mssql port.
 </summary>
@@ -42460,7 +42544,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
+<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mssql port.
@@ -42472,7 +42556,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
+<interface name="corenet_tcp_bind_mssql_port" lineno="51784">
 <summary>
 Bind TCP sockets to the mssql port.
 </summary>
@@ -42483,7 +42567,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51786">
+<interface name="corenet_udp_bind_mssql_port" lineno="51804">
 <summary>
 Bind UDP sockets to the mssql port.
 </summary>
@@ -42494,7 +42578,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
+<interface name="corenet_tcp_connect_mssql_port" lineno="51823">
 <summary>
 Make a TCP connection to the mssql port.
 </summary>
@@ -42504,7 +42588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51825">
+<interface name="corenet_send_mssql_client_packets" lineno="51843">
 <summary>
 Send mssql_client packets.
 </summary>
@@ -42515,7 +42599,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862">
 <summary>
 Do not audit attempts to send mssql_client packets.
 </summary>
@@ -42526,7 +42610,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51863">
+<interface name="corenet_receive_mssql_client_packets" lineno="51881">
 <summary>
 Receive mssql_client packets.
 </summary>
@@ -42537,7 +42621,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900">
 <summary>
 Do not audit attempts to receive mssql_client packets.
 </summary>
@@ -42548,7 +42632,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919">
 <summary>
 Send and receive mssql_client packets.
 </summary>
@@ -42559,7 +42643,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935">
 <summary>
 Do not audit attempts to send and receive mssql_client packets.
 </summary>
@@ -42570,7 +42654,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="51950">
 <summary>
 Relabel packets to mssql_client the packet type.
 </summary>
@@ -42580,7 +42664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51952">
+<interface name="corenet_send_mssql_server_packets" lineno="51970">
 <summary>
 Send mssql_server packets.
 </summary>
@@ -42591,7 +42675,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989">
 <summary>
 Do not audit attempts to send mssql_server packets.
 </summary>
@@ -42602,7 +42686,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="51990">
+<interface name="corenet_receive_mssql_server_packets" lineno="52008">
 <summary>
 Receive mssql_server packets.
 </summary>
@@ -42613,7 +42697,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027">
 <summary>
 Do not audit attempts to receive mssql_server packets.
 </summary>
@@ -42624,7 +42708,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046">
 <summary>
 Send and receive mssql_server packets.
 </summary>
@@ -42635,7 +42719,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062">
 <summary>
 Do not audit attempts to send and receive mssql_server packets.
 </summary>
@@ -42646,7 +42730,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="52077">
 <summary>
 Relabel packets to mssql_server the packet type.
 </summary>
@@ -42656,7 +42740,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
+<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099">
 <summary>
 Send and receive TCP traffic on the ms_streaming port.
 </summary>
@@ -42667,7 +42751,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
+<interface name="corenet_udp_send_ms_streaming_port" lineno="52114">
 <summary>
 Send UDP traffic on the ms_streaming port.
 </summary>
@@ -42678,7 +42762,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
+<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129">
 <summary>
 Do not audit attempts to send UDP traffic on the ms_streaming port.
 </summary>
@@ -42689,7 +42773,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
+<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144">
 <summary>
 Receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42700,7 +42784,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
+<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159">
 <summary>
 Do not audit attempts to receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42711,7 +42795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
+<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174">
 <summary>
 Send and receive UDP traffic on the ms_streaming port.
 </summary>
@@ -42722,7 +42806,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
+<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ms_streaming port.
@@ -42734,7 +42818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205">
 <summary>
 Bind TCP sockets to the ms_streaming port.
 </summary>
@@ -42745,7 +42829,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225">
 <summary>
 Bind UDP sockets to the ms_streaming port.
 </summary>
@@ -42756,7 +42840,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244">
 <summary>
 Make a TCP connection to the ms_streaming port.
 </summary>
@@ -42766,7 +42850,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="52264">
 <summary>
 Send ms_streaming_client packets.
 </summary>
@@ -42777,7 +42861,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283">
 <summary>
 Do not audit attempts to send ms_streaming_client packets.
 </summary>
@@ -42788,7 +42872,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302">
 <summary>
 Receive ms_streaming_client packets.
 </summary>
@@ -42799,7 +42883,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321">
 <summary>
 Do not audit attempts to receive ms_streaming_client packets.
 </summary>
@@ -42810,7 +42894,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340">
 <summary>
 Send and receive ms_streaming_client packets.
 </summary>
@@ -42821,7 +42905,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356">
 <summary>
 Do not audit attempts to send and receive ms_streaming_client packets.
 </summary>
@@ -42832,7 +42916,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371">
 <summary>
 Relabel packets to ms_streaming_client the packet type.
 </summary>
@@ -42842,7 +42926,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="52391">
 <summary>
 Send ms_streaming_server packets.
 </summary>
@@ -42853,7 +42937,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410">
 <summary>
 Do not audit attempts to send ms_streaming_server packets.
 </summary>
@@ -42864,7 +42948,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429">
 <summary>
 Receive ms_streaming_server packets.
 </summary>
@@ -42875,7 +42959,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448">
 <summary>
 Do not audit attempts to receive ms_streaming_server packets.
 </summary>
@@ -42886,7 +42970,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467">
 <summary>
 Send and receive ms_streaming_server packets.
 </summary>
@@ -42897,7 +42981,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483">
 <summary>
 Do not audit attempts to send and receive ms_streaming_server packets.
 </summary>
@@ -42908,7 +42992,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498">
 <summary>
 Relabel packets to ms_streaming_server the packet type.
 </summary>
@@ -42918,7 +43002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
+<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520">
 <summary>
 Send and receive TCP traffic on the munin port.
 </summary>
@@ -42929,7 +43013,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_munin_port" lineno="52517">
+<interface name="corenet_udp_send_munin_port" lineno="52535">
 <summary>
 Send UDP traffic on the munin port.
 </summary>
@@ -42940,7 +43024,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
+<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550">
 <summary>
 Do not audit attempts to send UDP traffic on the munin port.
 </summary>
@@ -42951,7 +43035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52547">
+<interface name="corenet_udp_receive_munin_port" lineno="52565">
 <summary>
 Receive UDP traffic on the munin port.
 </summary>
@@ -42962,7 +43046,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
+<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580">
 <summary>
 Do not audit attempts to receive UDP traffic on the munin port.
 </summary>
@@ -42973,7 +43057,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
+<interface name="corenet_udp_sendrecv_munin_port" lineno="52595">
 <summary>
 Send and receive UDP traffic on the munin port.
 </summary>
@@ -42984,7 +43068,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
+<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the munin port.
@@ -42996,7 +43080,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52608">
+<interface name="corenet_tcp_bind_munin_port" lineno="52626">
 <summary>
 Bind TCP sockets to the munin port.
 </summary>
@@ -43007,7 +43091,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52628">
+<interface name="corenet_udp_bind_munin_port" lineno="52646">
 <summary>
 Bind UDP sockets to the munin port.
 </summary>
@@ -43018,7 +43102,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52647">
+<interface name="corenet_tcp_connect_munin_port" lineno="52665">
 <summary>
 Make a TCP connection to the munin port.
 </summary>
@@ -43028,7 +43112,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_client_packets" lineno="52667">
+<interface name="corenet_send_munin_client_packets" lineno="52685">
 <summary>
 Send munin_client packets.
 </summary>
@@ -43039,7 +43123,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704">
 <summary>
 Do not audit attempts to send munin_client packets.
 </summary>
@@ -43050,7 +43134,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52705">
+<interface name="corenet_receive_munin_client_packets" lineno="52723">
 <summary>
 Receive munin_client packets.
 </summary>
@@ -43061,7 +43145,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742">
 <summary>
 Do not audit attempts to receive munin_client packets.
 </summary>
@@ -43072,7 +43156,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="52761">
 <summary>
 Send and receive munin_client packets.
 </summary>
@@ -43083,7 +43167,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777">
 <summary>
 Do not audit attempts to send and receive munin_client packets.
 </summary>
@@ -43094,7 +43178,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
+<interface name="corenet_relabelto_munin_client_packets" lineno="52792">
 <summary>
 Relabel packets to munin_client the packet type.
 </summary>
@@ -43104,7 +43188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_server_packets" lineno="52794">
+<interface name="corenet_send_munin_server_packets" lineno="52812">
 <summary>
 Send munin_server packets.
 </summary>
@@ -43115,7 +43199,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831">
 <summary>
 Do not audit attempts to send munin_server packets.
 </summary>
@@ -43126,7 +43210,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52832">
+<interface name="corenet_receive_munin_server_packets" lineno="52850">
 <summary>
 Receive munin_server packets.
 </summary>
@@ -43137,7 +43221,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869">
 <summary>
 Do not audit attempts to receive munin_server packets.
 </summary>
@@ -43148,7 +43232,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="52888">
 <summary>
 Send and receive munin_server packets.
 </summary>
@@ -43159,7 +43243,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904">
 <summary>
 Do not audit attempts to send and receive munin_server packets.
 </summary>
@@ -43170,7 +43254,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
+<interface name="corenet_relabelto_munin_server_packets" lineno="52919">
 <summary>
 Relabel packets to munin_server the packet type.
 </summary>
@@ -43180,7 +43264,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
+<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941">
 <summary>
 Send and receive TCP traffic on the mxi port.
 </summary>
@@ -43191,7 +43275,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52938">
+<interface name="corenet_udp_send_mxi_port" lineno="52956">
 <summary>
 Send UDP traffic on the mxi port.
 </summary>
@@ -43202,7 +43286,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
+<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971">
 <summary>
 Do not audit attempts to send UDP traffic on the mxi port.
 </summary>
@@ -43213,7 +43297,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52968">
+<interface name="corenet_udp_receive_mxi_port" lineno="52986">
 <summary>
 Receive UDP traffic on the mxi port.
 </summary>
@@ -43224,7 +43308,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
+<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001">
 <summary>
 Do not audit attempts to receive UDP traffic on the mxi port.
 </summary>
@@ -43235,7 +43319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
+<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016">
 <summary>
 Send and receive UDP traffic on the mxi port.
 </summary>
@@ -43246,7 +43330,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
+<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mxi port.
@@ -43258,7 +43342,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
+<interface name="corenet_tcp_bind_mxi_port" lineno="53047">
 <summary>
 Bind TCP sockets to the mxi port.
 </summary>
@@ -43269,7 +43353,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="53049">
+<interface name="corenet_udp_bind_mxi_port" lineno="53067">
 <summary>
 Bind UDP sockets to the mxi port.
 </summary>
@@ -43280,7 +43364,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
+<interface name="corenet_tcp_connect_mxi_port" lineno="53086">
 <summary>
 Make a TCP connection to the mxi port.
 </summary>
@@ -43290,7 +43374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_client_packets" lineno="53088">
+<interface name="corenet_send_mxi_client_packets" lineno="53106">
 <summary>
 Send mxi_client packets.
 </summary>
@@ -43301,7 +43385,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125">
 <summary>
 Do not audit attempts to send mxi_client packets.
 </summary>
@@ -43312,7 +43396,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53126">
+<interface name="corenet_receive_mxi_client_packets" lineno="53144">
 <summary>
 Receive mxi_client packets.
 </summary>
@@ -43323,7 +43407,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163">
 <summary>
 Do not audit attempts to receive mxi_client packets.
 </summary>
@@ -43334,7 +43418,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182">
 <summary>
 Send and receive mxi_client packets.
 </summary>
@@ -43345,7 +43429,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198">
 <summary>
 Do not audit attempts to send and receive mxi_client packets.
 </summary>
@@ -43356,7 +43440,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="53213">
 <summary>
 Relabel packets to mxi_client the packet type.
 </summary>
@@ -43366,7 +43450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53215">
+<interface name="corenet_send_mxi_server_packets" lineno="53233">
 <summary>
 Send mxi_server packets.
 </summary>
@@ -43377,7 +43461,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252">
 <summary>
 Do not audit attempts to send mxi_server packets.
 </summary>
@@ -43388,7 +43472,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53253">
+<interface name="corenet_receive_mxi_server_packets" lineno="53271">
 <summary>
 Receive mxi_server packets.
 </summary>
@@ -43399,7 +43483,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290">
 <summary>
 Do not audit attempts to receive mxi_server packets.
 </summary>
@@ -43410,7 +43494,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309">
 <summary>
 Send and receive mxi_server packets.
 </summary>
@@ -43421,7 +43505,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325">
 <summary>
 Do not audit attempts to send and receive mxi_server packets.
 </summary>
@@ -43432,7 +43516,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="53340">
 <summary>
 Relabel packets to mxi_server the packet type.
 </summary>
@@ -43442,7 +43526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
+<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362">
 <summary>
 Send and receive TCP traffic on the mysqld port.
 </summary>
@@ -43453,7 +43537,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53359">
+<interface name="corenet_udp_send_mysqld_port" lineno="53377">
 <summary>
 Send UDP traffic on the mysqld port.
 </summary>
@@ -43464,7 +43548,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
+<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392">
 <summary>
 Do not audit attempts to send UDP traffic on the mysqld port.
 </summary>
@@ -43475,7 +43559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
+<interface name="corenet_udp_receive_mysqld_port" lineno="53407">
 <summary>
 Receive UDP traffic on the mysqld port.
 </summary>
@@ -43486,7 +43570,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
+<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422">
 <summary>
 Do not audit attempts to receive UDP traffic on the mysqld port.
 </summary>
@@ -43497,7 +43581,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
+<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437">
 <summary>
 Send and receive UDP traffic on the mysqld port.
 </summary>
@@ -43508,7 +43592,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mysqld port.
@@ -43520,7 +43604,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="53468">
 <summary>
 Bind TCP sockets to the mysqld port.
 </summary>
@@ -43531,7 +43615,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
+<interface name="corenet_udp_bind_mysqld_port" lineno="53488">
 <summary>
 Bind UDP sockets to the mysqld port.
 </summary>
@@ -43542,7 +43626,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="53507">
 <summary>
 Make a TCP connection to the mysqld port.
 </summary>
@@ -43552,7 +43636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53509">
+<interface name="corenet_send_mysqld_client_packets" lineno="53527">
 <summary>
 Send mysqld_client packets.
 </summary>
@@ -43563,7 +43647,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546">
 <summary>
 Do not audit attempts to send mysqld_client packets.
 </summary>
@@ -43574,7 +43658,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
+<interface name="corenet_receive_mysqld_client_packets" lineno="53565">
 <summary>
 Receive mysqld_client packets.
 </summary>
@@ -43585,7 +43669,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584">
 <summary>
 Do not audit attempts to receive mysqld_client packets.
 </summary>
@@ -43596,7 +43680,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603">
 <summary>
 Send and receive mysqld_client packets.
 </summary>
@@ -43607,7 +43691,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619">
 <summary>
 Do not audit attempts to send and receive mysqld_client packets.
 </summary>
@@ -43618,7 +43702,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634">
 <summary>
 Relabel packets to mysqld_client the packet type.
 </summary>
@@ -43628,7 +43712,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53636">
+<interface name="corenet_send_mysqld_server_packets" lineno="53654">
 <summary>
 Send mysqld_server packets.
 </summary>
@@ -43639,7 +43723,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673">
 <summary>
 Do not audit attempts to send mysqld_server packets.
 </summary>
@@ -43650,7 +43734,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
+<interface name="corenet_receive_mysqld_server_packets" lineno="53692">
 <summary>
 Receive mysqld_server packets.
 </summary>
@@ -43661,7 +43745,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711">
 <summary>
 Do not audit attempts to receive mysqld_server packets.
 </summary>
@@ -43672,7 +43756,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730">
 <summary>
 Send and receive mysqld_server packets.
 </summary>
@@ -43683,7 +43767,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746">
 <summary>
 Do not audit attempts to send and receive mysqld_server packets.
 </summary>
@@ -43694,7 +43778,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761">
 <summary>
 Relabel packets to mysqld_server the packet type.
 </summary>
@@ -43704,7 +43788,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
+<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783">
 <summary>
 Send and receive TCP traffic on the mysqlmanagerd port.
 </summary>
@@ -43715,7 +43799,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
+<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798">
 <summary>
 Send UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43726,7 +43810,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
+<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813">
 <summary>
 Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43737,7 +43821,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
+<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828">
 <summary>
 Receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43748,7 +43832,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
+<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843">
 <summary>
 Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43759,7 +43843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
+<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858">
 <summary>
 Send and receive UDP traffic on the mysqlmanagerd port.
 </summary>
@@ -43770,7 +43854,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the mysqlmanagerd port.
@@ -43782,7 +43866,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889">
 <summary>
 Bind TCP sockets to the mysqlmanagerd port.
 </summary>
@@ -43793,7 +43877,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909">
 <summary>
 Bind UDP sockets to the mysqlmanagerd port.
 </summary>
@@ -43804,7 +43888,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928">
 <summary>
 Make a TCP connection to the mysqlmanagerd port.
 </summary>
@@ -43814,7 +43898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948">
 <summary>
 Send mysqlmanagerd_client packets.
 </summary>
@@ -43825,7 +43909,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967">
 <summary>
 Do not audit attempts to send mysqlmanagerd_client packets.
 </summary>
@@ -43836,7 +43920,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986">
 <summary>
 Receive mysqlmanagerd_client packets.
 </summary>
@@ -43847,7 +43931,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_client packets.
 </summary>
@@ -43858,7 +43942,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024">
 <summary>
 Send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43869,7 +43953,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43880,7 +43964,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055">
 <summary>
 Relabel packets to mysqlmanagerd_client the packet type.
 </summary>
@@ -43890,7 +43974,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075">
 <summary>
 Send mysqlmanagerd_server packets.
 </summary>
@@ -43901,7 +43985,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094">
 <summary>
 Do not audit attempts to send mysqlmanagerd_server packets.
 </summary>
@@ -43912,7 +43996,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113">
 <summary>
 Receive mysqlmanagerd_server packets.
 </summary>
@@ -43923,7 +44007,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_server packets.
 </summary>
@@ -43934,7 +44018,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151">
 <summary>
 Send and receive mysqlmanagerd_server packets.
 </summary>
@@ -43945,7 +44029,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_server packets.
 </summary>
@@ -43956,7 +44040,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182">
 <summary>
 Relabel packets to mysqlmanagerd_server the packet type.
 </summary>
@@ -43966,7 +44050,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
+<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204">
 <summary>
 Send and receive TCP traffic on the nessus port.
 </summary>
@@ -43977,7 +44061,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54201">
+<interface name="corenet_udp_send_nessus_port" lineno="54219">
 <summary>
 Send UDP traffic on the nessus port.
 </summary>
@@ -43988,7 +44072,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
+<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234">
 <summary>
 Do not audit attempts to send UDP traffic on the nessus port.
 </summary>
@@ -43999,7 +44083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54231">
+<interface name="corenet_udp_receive_nessus_port" lineno="54249">
 <summary>
 Receive UDP traffic on the nessus port.
 </summary>
@@ -44010,7 +44094,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
+<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264">
 <summary>
 Do not audit attempts to receive UDP traffic on the nessus port.
 </summary>
@@ -44021,7 +44105,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
+<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279">
 <summary>
 Send and receive UDP traffic on the nessus port.
 </summary>
@@ -44032,7 +44116,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
+<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nessus port.
@@ -44044,7 +44128,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
+<interface name="corenet_tcp_bind_nessus_port" lineno="54310">
 <summary>
 Bind TCP sockets to the nessus port.
 </summary>
@@ -44055,7 +44139,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54312">
+<interface name="corenet_udp_bind_nessus_port" lineno="54330">
 <summary>
 Bind UDP sockets to the nessus port.
 </summary>
@@ -44066,7 +44150,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
+<interface name="corenet_tcp_connect_nessus_port" lineno="54349">
 <summary>
 Make a TCP connection to the nessus port.
 </summary>
@@ -44076,7 +44160,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54351">
+<interface name="corenet_send_nessus_client_packets" lineno="54369">
 <summary>
 Send nessus_client packets.
 </summary>
@@ -44087,7 +44171,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388">
 <summary>
 Do not audit attempts to send nessus_client packets.
 </summary>
@@ -44098,7 +44182,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54389">
+<interface name="corenet_receive_nessus_client_packets" lineno="54407">
 <summary>
 Receive nessus_client packets.
 </summary>
@@ -44109,7 +44193,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426">
 <summary>
 Do not audit attempts to receive nessus_client packets.
 </summary>
@@ -44120,7 +44204,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445">
 <summary>
 Send and receive nessus_client packets.
 </summary>
@@ -44131,7 +44215,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461">
 <summary>
 Do not audit attempts to send and receive nessus_client packets.
 </summary>
@@ -44142,7 +44226,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="54476">
 <summary>
 Relabel packets to nessus_client the packet type.
 </summary>
@@ -44152,7 +44236,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54478">
+<interface name="corenet_send_nessus_server_packets" lineno="54496">
 <summary>
 Send nessus_server packets.
 </summary>
@@ -44163,7 +44247,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515">
 <summary>
 Do not audit attempts to send nessus_server packets.
 </summary>
@@ -44174,7 +44258,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54516">
+<interface name="corenet_receive_nessus_server_packets" lineno="54534">
 <summary>
 Receive nessus_server packets.
 </summary>
@@ -44185,7 +44269,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553">
 <summary>
 Do not audit attempts to receive nessus_server packets.
 </summary>
@@ -44196,7 +44280,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572">
 <summary>
 Send and receive nessus_server packets.
 </summary>
@@ -44207,7 +44291,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588">
 <summary>
 Do not audit attempts to send and receive nessus_server packets.
 </summary>
@@ -44218,7 +44302,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="54603">
 <summary>
 Relabel packets to nessus_server the packet type.
 </summary>
@@ -44228,7 +44312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
+<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625">
 <summary>
 Send and receive TCP traffic on the netport port.
 </summary>
@@ -44239,7 +44323,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_netport_port" lineno="54622">
+<interface name="corenet_udp_send_netport_port" lineno="54640">
 <summary>
 Send UDP traffic on the netport port.
 </summary>
@@ -44250,7 +44334,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
+<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655">
 <summary>
 Do not audit attempts to send UDP traffic on the netport port.
 </summary>
@@ -44261,7 +44345,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54652">
+<interface name="corenet_udp_receive_netport_port" lineno="54670">
 <summary>
 Receive UDP traffic on the netport port.
 </summary>
@@ -44272,7 +44356,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
+<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685">
 <summary>
 Do not audit attempts to receive UDP traffic on the netport port.
 </summary>
@@ -44283,7 +44367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
+<interface name="corenet_udp_sendrecv_netport_port" lineno="54700">
 <summary>
 Send and receive UDP traffic on the netport port.
 </summary>
@@ -44294,7 +44378,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
+<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the netport port.
@@ -44306,7 +44390,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54713">
+<interface name="corenet_tcp_bind_netport_port" lineno="54731">
 <summary>
 Bind TCP sockets to the netport port.
 </summary>
@@ -44317,7 +44401,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54733">
+<interface name="corenet_udp_bind_netport_port" lineno="54751">
 <summary>
 Bind UDP sockets to the netport port.
 </summary>
@@ -44328,7 +44412,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54752">
+<interface name="corenet_tcp_connect_netport_port" lineno="54770">
 <summary>
 Make a TCP connection to the netport port.
 </summary>
@@ -44338,7 +44422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_client_packets" lineno="54772">
+<interface name="corenet_send_netport_client_packets" lineno="54790">
 <summary>
 Send netport_client packets.
 </summary>
@@ -44349,7 +44433,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809">
 <summary>
 Do not audit attempts to send netport_client packets.
 </summary>
@@ -44360,7 +44444,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54810">
+<interface name="corenet_receive_netport_client_packets" lineno="54828">
 <summary>
 Receive netport_client packets.
 </summary>
@@ -44371,7 +44455,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847">
 <summary>
 Do not audit attempts to receive netport_client packets.
 </summary>
@@ -44382,7 +44466,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="54866">
 <summary>
 Send and receive netport_client packets.
 </summary>
@@ -44393,7 +44477,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882">
 <summary>
 Do not audit attempts to send and receive netport_client packets.
 </summary>
@@ -44404,7 +44488,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
+<interface name="corenet_relabelto_netport_client_packets" lineno="54897">
 <summary>
 Relabel packets to netport_client the packet type.
 </summary>
@@ -44414,7 +44498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_server_packets" lineno="54899">
+<interface name="corenet_send_netport_server_packets" lineno="54917">
 <summary>
 Send netport_server packets.
 </summary>
@@ -44425,7 +44509,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936">
 <summary>
 Do not audit attempts to send netport_server packets.
 </summary>
@@ -44436,7 +44520,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54937">
+<interface name="corenet_receive_netport_server_packets" lineno="54955">
 <summary>
 Receive netport_server packets.
 </summary>
@@ -44447,7 +44531,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974">
 <summary>
 Do not audit attempts to receive netport_server packets.
 </summary>
@@ -44458,7 +44542,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="54993">
 <summary>
 Send and receive netport_server packets.
 </summary>
@@ -44469,7 +44553,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009">
 <summary>
 Do not audit attempts to send and receive netport_server packets.
 </summary>
@@ -44480,7 +44564,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
+<interface name="corenet_relabelto_netport_server_packets" lineno="55024">
 <summary>
 Relabel packets to netport_server the packet type.
 </summary>
@@ -44490,7 +44574,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
+<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046">
 <summary>
 Send and receive TCP traffic on the netsupport port.
 </summary>
@@ -44501,7 +44585,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="55043">
+<interface name="corenet_udp_send_netsupport_port" lineno="55061">
 <summary>
 Send UDP traffic on the netsupport port.
 </summary>
@@ -44512,7 +44596,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
+<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076">
 <summary>
 Do not audit attempts to send UDP traffic on the netsupport port.
 </summary>
@@ -44523,7 +44607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
+<interface name="corenet_udp_receive_netsupport_port" lineno="55091">
 <summary>
 Receive UDP traffic on the netsupport port.
 </summary>
@@ -44534,7 +44618,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
+<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106">
 <summary>
 Do not audit attempts to receive UDP traffic on the netsupport port.
 </summary>
@@ -44545,7 +44629,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
+<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121">
 <summary>
 Send and receive UDP traffic on the netsupport port.
 </summary>
@@ -44556,7 +44640,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
+<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the netsupport port.
@@ -44568,7 +44652,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="55152">
 <summary>
 Bind TCP sockets to the netsupport port.
 </summary>
@@ -44579,7 +44663,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
+<interface name="corenet_udp_bind_netsupport_port" lineno="55172">
 <summary>
 Bind UDP sockets to the netsupport port.
 </summary>
@@ -44590,7 +44674,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="55191">
 <summary>
 Make a TCP connection to the netsupport port.
 </summary>
@@ -44600,7 +44684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55193">
+<interface name="corenet_send_netsupport_client_packets" lineno="55211">
 <summary>
 Send netsupport_client packets.
 </summary>
@@ -44611,7 +44695,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230">
 <summary>
 Do not audit attempts to send netsupport_client packets.
 </summary>
@@ -44622,7 +44706,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
+<interface name="corenet_receive_netsupport_client_packets" lineno="55249">
 <summary>
 Receive netsupport_client packets.
 </summary>
@@ -44633,7 +44717,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268">
 <summary>
 Do not audit attempts to receive netsupport_client packets.
 </summary>
@@ -44644,7 +44728,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287">
 <summary>
 Send and receive netsupport_client packets.
 </summary>
@@ -44655,7 +44739,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303">
 <summary>
 Do not audit attempts to send and receive netsupport_client packets.
 </summary>
@@ -44666,7 +44750,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318">
 <summary>
 Relabel packets to netsupport_client the packet type.
 </summary>
@@ -44676,7 +44760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55320">
+<interface name="corenet_send_netsupport_server_packets" lineno="55338">
 <summary>
 Send netsupport_server packets.
 </summary>
@@ -44687,7 +44771,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357">
 <summary>
 Do not audit attempts to send netsupport_server packets.
 </summary>
@@ -44698,7 +44782,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
+<interface name="corenet_receive_netsupport_server_packets" lineno="55376">
 <summary>
 Receive netsupport_server packets.
 </summary>
@@ -44709,7 +44793,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395">
 <summary>
 Do not audit attempts to receive netsupport_server packets.
 </summary>
@@ -44720,7 +44804,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414">
 <summary>
 Send and receive netsupport_server packets.
 </summary>
@@ -44731,7 +44815,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430">
 <summary>
 Do not audit attempts to send and receive netsupport_server packets.
 </summary>
@@ -44742,7 +44826,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445">
 <summary>
 Relabel packets to netsupport_server the packet type.
 </summary>
@@ -44752,7 +44836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
+<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467">
 <summary>
 Send and receive TCP traffic on the nfs port.
 </summary>
@@ -44763,7 +44847,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55464">
+<interface name="corenet_udp_send_nfs_port" lineno="55482">
 <summary>
 Send UDP traffic on the nfs port.
 </summary>
@@ -44774,7 +44858,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
+<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497">
 <summary>
 Do not audit attempts to send UDP traffic on the nfs port.
 </summary>
@@ -44785,7 +44869,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55494">
+<interface name="corenet_udp_receive_nfs_port" lineno="55512">
 <summary>
 Receive UDP traffic on the nfs port.
 </summary>
@@ -44796,7 +44880,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
+<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527">
 <summary>
 Do not audit attempts to receive UDP traffic on the nfs port.
 </summary>
@@ -44807,7 +44891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
+<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542">
 <summary>
 Send and receive UDP traffic on the nfs port.
 </summary>
@@ -44818,7 +44902,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
+<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nfs port.
@@ -44830,7 +44914,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
+<interface name="corenet_tcp_bind_nfs_port" lineno="55573">
 <summary>
 Bind TCP sockets to the nfs port.
 </summary>
@@ -44841,7 +44925,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55575">
+<interface name="corenet_udp_bind_nfs_port" lineno="55593">
 <summary>
 Bind UDP sockets to the nfs port.
 </summary>
@@ -44852,7 +44936,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
+<interface name="corenet_tcp_connect_nfs_port" lineno="55612">
 <summary>
 Make a TCP connection to the nfs port.
 </summary>
@@ -44862,7 +44946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55614">
+<interface name="corenet_send_nfs_client_packets" lineno="55632">
 <summary>
 Send nfs_client packets.
 </summary>
@@ -44873,7 +44957,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651">
 <summary>
 Do not audit attempts to send nfs_client packets.
 </summary>
@@ -44884,7 +44968,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55652">
+<interface name="corenet_receive_nfs_client_packets" lineno="55670">
 <summary>
 Receive nfs_client packets.
 </summary>
@@ -44895,7 +44979,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689">
 <summary>
 Do not audit attempts to receive nfs_client packets.
 </summary>
@@ -44906,7 +44990,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708">
 <summary>
 Send and receive nfs_client packets.
 </summary>
@@ -44917,7 +45001,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724">
 <summary>
 Do not audit attempts to send and receive nfs_client packets.
 </summary>
@@ -44928,7 +45012,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="55739">
 <summary>
 Relabel packets to nfs_client the packet type.
 </summary>
@@ -44938,7 +45022,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55741">
+<interface name="corenet_send_nfs_server_packets" lineno="55759">
 <summary>
 Send nfs_server packets.
 </summary>
@@ -44949,7 +45033,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778">
 <summary>
 Do not audit attempts to send nfs_server packets.
 </summary>
@@ -44960,7 +45044,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55779">
+<interface name="corenet_receive_nfs_server_packets" lineno="55797">
 <summary>
 Receive nfs_server packets.
 </summary>
@@ -44971,7 +45055,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816">
 <summary>
 Do not audit attempts to receive nfs_server packets.
 </summary>
@@ -44982,7 +45066,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835">
 <summary>
 Send and receive nfs_server packets.
 </summary>
@@ -44993,7 +45077,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851">
 <summary>
 Do not audit attempts to send and receive nfs_server packets.
 </summary>
@@ -45004,7 +45088,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="55866">
 <summary>
 Relabel packets to nfs_server the packet type.
 </summary>
@@ -45014,7 +45098,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
+<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888">
 <summary>
 Send and receive TCP traffic on the nfsrdma port.
 </summary>
@@ -45025,7 +45109,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
+<interface name="corenet_udp_send_nfsrdma_port" lineno="55903">
 <summary>
 Send UDP traffic on the nfsrdma port.
 </summary>
@@ -45036,7 +45120,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
+<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918">
 <summary>
 Do not audit attempts to send UDP traffic on the nfsrdma port.
 </summary>
@@ -45047,7 +45131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
+<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933">
 <summary>
 Receive UDP traffic on the nfsrdma port.
 </summary>
@@ -45058,7 +45142,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
+<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948">
 <summary>
 Do not audit attempts to receive UDP traffic on the nfsrdma port.
 </summary>
@@ -45069,7 +45153,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
+<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963">
 <summary>
 Send and receive UDP traffic on the nfsrdma port.
 </summary>
@@ -45080,7 +45164,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
+<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nfsrdma port.
@@ -45092,7 +45176,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994">
 <summary>
 Bind TCP sockets to the nfsrdma port.
 </summary>
@@ -45103,7 +45187,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014">
 <summary>
 Bind UDP sockets to the nfsrdma port.
 </summary>
@@ -45114,7 +45198,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033">
 <summary>
 Make a TCP connection to the nfsrdma port.
 </summary>
@@ -45124,7 +45208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="56053">
 <summary>
 Send nfsrdma_client packets.
 </summary>
@@ -45135,7 +45219,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072">
 <summary>
 Do not audit attempts to send nfsrdma_client packets.
 </summary>
@@ -45146,7 +45230,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091">
 <summary>
 Receive nfsrdma_client packets.
 </summary>
@@ -45157,7 +45241,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110">
 <summary>
 Do not audit attempts to receive nfsrdma_client packets.
 </summary>
@@ -45168,7 +45252,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129">
 <summary>
 Send and receive nfsrdma_client packets.
 </summary>
@@ -45179,7 +45263,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145">
 <summary>
 Do not audit attempts to send and receive nfsrdma_client packets.
 </summary>
@@ -45190,7 +45274,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160">
 <summary>
 Relabel packets to nfsrdma_client the packet type.
 </summary>
@@ -45200,7 +45284,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="56180">
 <summary>
 Send nfsrdma_server packets.
 </summary>
@@ -45211,7 +45295,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199">
 <summary>
 Do not audit attempts to send nfsrdma_server packets.
 </summary>
@@ -45222,7 +45306,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218">
 <summary>
 Receive nfsrdma_server packets.
 </summary>
@@ -45233,7 +45317,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237">
 <summary>
 Do not audit attempts to receive nfsrdma_server packets.
 </summary>
@@ -45244,7 +45328,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256">
 <summary>
 Send and receive nfsrdma_server packets.
 </summary>
@@ -45255,7 +45339,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272">
 <summary>
 Do not audit attempts to send and receive nfsrdma_server packets.
 </summary>
@@ -45266,7 +45350,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287">
 <summary>
 Relabel packets to nfsrdma_server the packet type.
 </summary>
@@ -45276,7 +45360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
+<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309">
 <summary>
 Send and receive TCP traffic on the nmbd port.
 </summary>
@@ -45287,7 +45371,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56306">
+<interface name="corenet_udp_send_nmbd_port" lineno="56324">
 <summary>
 Send UDP traffic on the nmbd port.
 </summary>
@@ -45298,7 +45382,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
+<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339">
 <summary>
 Do not audit attempts to send UDP traffic on the nmbd port.
 </summary>
@@ -45309,7 +45393,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
+<interface name="corenet_udp_receive_nmbd_port" lineno="56354">
 <summary>
 Receive UDP traffic on the nmbd port.
 </summary>
@@ -45320,7 +45404,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
+<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369">
 <summary>
 Do not audit attempts to receive UDP traffic on the nmbd port.
 </summary>
@@ -45331,7 +45415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
+<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384">
 <summary>
 Send and receive UDP traffic on the nmbd port.
 </summary>
@@ -45342,7 +45426,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
+<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the nmbd port.
@@ -45354,7 +45438,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="56415">
 <summary>
 Bind TCP sockets to the nmbd port.
 </summary>
@@ -45365,7 +45449,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
+<interface name="corenet_udp_bind_nmbd_port" lineno="56435">
 <summary>
 Bind UDP sockets to the nmbd port.
 </summary>
@@ -45376,7 +45460,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="56454">
 <summary>
 Make a TCP connection to the nmbd port.
 </summary>
@@ -45386,7 +45470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56456">
+<interface name="corenet_send_nmbd_client_packets" lineno="56474">
 <summary>
 Send nmbd_client packets.
 </summary>
@@ -45397,7 +45481,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493">
 <summary>
 Do not audit attempts to send nmbd_client packets.
 </summary>
@@ -45408,7 +45492,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
+<interface name="corenet_receive_nmbd_client_packets" lineno="56512">
 <summary>
 Receive nmbd_client packets.
 </summary>
@@ -45419,7 +45503,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531">
 <summary>
 Do not audit attempts to receive nmbd_client packets.
 </summary>
@@ -45430,7 +45514,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550">
 <summary>
 Send and receive nmbd_client packets.
 </summary>
@@ -45441,7 +45525,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566">
 <summary>
 Do not audit attempts to send and receive nmbd_client packets.
 </summary>
@@ -45452,7 +45536,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581">
 <summary>
 Relabel packets to nmbd_client the packet type.
 </summary>
@@ -45462,7 +45546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56583">
+<interface name="corenet_send_nmbd_server_packets" lineno="56601">
 <summary>
 Send nmbd_server packets.
 </summary>
@@ -45473,7 +45557,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620">
 <summary>
 Do not audit attempts to send nmbd_server packets.
 </summary>
@@ -45484,7 +45568,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
+<interface name="corenet_receive_nmbd_server_packets" lineno="56639">
 <summary>
 Receive nmbd_server packets.
 </summary>
@@ -45495,7 +45579,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658">
 <summary>
 Do not audit attempts to receive nmbd_server packets.
 </summary>
@@ -45506,7 +45590,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677">
 <summary>
 Send and receive nmbd_server packets.
 </summary>
@@ -45517,7 +45601,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693">
 <summary>
 Do not audit attempts to send and receive nmbd_server packets.
 </summary>
@@ -45528,7 +45612,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708">
 <summary>
 Relabel packets to nmbd_server the packet type.
 </summary>
@@ -45538,7 +45622,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
+<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730">
 <summary>
 Send and receive TCP traffic on the ntop port.
 </summary>
@@ -45549,7 +45633,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56727">
+<interface name="corenet_udp_send_ntop_port" lineno="56745">
 <summary>
 Send UDP traffic on the ntop port.
 </summary>
@@ -45560,7 +45644,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
+<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760">
 <summary>
 Do not audit attempts to send UDP traffic on the ntop port.
 </summary>
@@ -45571,7 +45655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56757">
+<interface name="corenet_udp_receive_ntop_port" lineno="56775">
 <summary>
 Receive UDP traffic on the ntop port.
 </summary>
@@ -45582,7 +45666,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
+<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790">
 <summary>
 Do not audit attempts to receive UDP traffic on the ntop port.
 </summary>
@@ -45593,7 +45677,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
+<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805">
 <summary>
 Send and receive UDP traffic on the ntop port.
 </summary>
@@ -45604,7 +45688,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
+<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ntop port.
@@ -45616,7 +45700,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
+<interface name="corenet_tcp_bind_ntop_port" lineno="56836">
 <summary>
 Bind TCP sockets to the ntop port.
 </summary>
@@ -45627,7 +45711,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56838">
+<interface name="corenet_udp_bind_ntop_port" lineno="56856">
 <summary>
 Bind UDP sockets to the ntop port.
 </summary>
@@ -45638,7 +45722,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
+<interface name="corenet_tcp_connect_ntop_port" lineno="56875">
 <summary>
 Make a TCP connection to the ntop port.
 </summary>
@@ -45648,7 +45732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56877">
+<interface name="corenet_send_ntop_client_packets" lineno="56895">
 <summary>
 Send ntop_client packets.
 </summary>
@@ -45659,7 +45743,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914">
 <summary>
 Do not audit attempts to send ntop_client packets.
 </summary>
@@ -45670,7 +45754,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56915">
+<interface name="corenet_receive_ntop_client_packets" lineno="56933">
 <summary>
 Receive ntop_client packets.
 </summary>
@@ -45681,7 +45765,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952">
 <summary>
 Do not audit attempts to receive ntop_client packets.
 </summary>
@@ -45692,7 +45776,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971">
 <summary>
 Send and receive ntop_client packets.
 </summary>
@@ -45703,7 +45787,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987">
 <summary>
 Do not audit attempts to send and receive ntop_client packets.
 </summary>
@@ -45714,7 +45798,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="57002">
 <summary>
 Relabel packets to ntop_client the packet type.
 </summary>
@@ -45724,7 +45808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_server_packets" lineno="57004">
+<interface name="corenet_send_ntop_server_packets" lineno="57022">
 <summary>
 Send ntop_server packets.
 </summary>
@@ -45735,7 +45819,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041">
 <summary>
 Do not audit attempts to send ntop_server packets.
 </summary>
@@ -45746,7 +45830,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="57042">
+<interface name="corenet_receive_ntop_server_packets" lineno="57060">
 <summary>
 Receive ntop_server packets.
 </summary>
@@ -45757,7 +45841,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079">
 <summary>
 Do not audit attempts to receive ntop_server packets.
 </summary>
@@ -45768,7 +45852,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098">
 <summary>
 Send and receive ntop_server packets.
 </summary>
@@ -45779,7 +45863,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114">
 <summary>
 Do not audit attempts to send and receive ntop_server packets.
 </summary>
@@ -45790,7 +45874,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="57129">
 <summary>
 Relabel packets to ntop_server the packet type.
 </summary>
@@ -45800,7 +45884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
+<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151">
 <summary>
 Send and receive TCP traffic on the ntp port.
 </summary>
@@ -45811,7 +45895,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57148">
+<interface name="corenet_udp_send_ntp_port" lineno="57166">
 <summary>
 Send UDP traffic on the ntp port.
 </summary>
@@ -45822,7 +45906,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
+<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181">
 <summary>
 Do not audit attempts to send UDP traffic on the ntp port.
 </summary>
@@ -45833,7 +45917,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57178">
+<interface name="corenet_udp_receive_ntp_port" lineno="57196">
 <summary>
 Receive UDP traffic on the ntp port.
 </summary>
@@ -45844,7 +45928,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
+<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211">
 <summary>
 Do not audit attempts to receive UDP traffic on the ntp port.
 </summary>
@@ -45855,7 +45939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
+<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226">
 <summary>
 Send and receive UDP traffic on the ntp port.
 </summary>
@@ -45866,7 +45950,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
+<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ntp port.
@@ -45878,7 +45962,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
+<interface name="corenet_tcp_bind_ntp_port" lineno="57257">
 <summary>
 Bind TCP sockets to the ntp port.
 </summary>
@@ -45889,7 +45973,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57259">
+<interface name="corenet_udp_bind_ntp_port" lineno="57277">
 <summary>
 Bind UDP sockets to the ntp port.
 </summary>
@@ -45900,7 +45984,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
+<interface name="corenet_tcp_connect_ntp_port" lineno="57296">
 <summary>
 Make a TCP connection to the ntp port.
 </summary>
@@ -45910,7 +45994,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57298">
+<interface name="corenet_send_ntp_client_packets" lineno="57316">
 <summary>
 Send ntp_client packets.
 </summary>
@@ -45921,7 +46005,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335">
 <summary>
 Do not audit attempts to send ntp_client packets.
 </summary>
@@ -45932,7 +46016,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57336">
+<interface name="corenet_receive_ntp_client_packets" lineno="57354">
 <summary>
 Receive ntp_client packets.
 </summary>
@@ -45943,7 +46027,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373">
 <summary>
 Do not audit attempts to receive ntp_client packets.
 </summary>
@@ -45954,7 +46038,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392">
 <summary>
 Send and receive ntp_client packets.
 </summary>
@@ -45965,7 +46049,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408">
 <summary>
 Do not audit attempts to send and receive ntp_client packets.
 </summary>
@@ -45976,7 +46060,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="57423">
 <summary>
 Relabel packets to ntp_client the packet type.
 </summary>
@@ -45986,7 +46070,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57425">
+<interface name="corenet_send_ntp_server_packets" lineno="57443">
 <summary>
 Send ntp_server packets.
 </summary>
@@ -45997,7 +46081,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462">
 <summary>
 Do not audit attempts to send ntp_server packets.
 </summary>
@@ -46008,7 +46092,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57463">
+<interface name="corenet_receive_ntp_server_packets" lineno="57481">
 <summary>
 Receive ntp_server packets.
 </summary>
@@ -46019,7 +46103,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500">
 <summary>
 Do not audit attempts to receive ntp_server packets.
 </summary>
@@ -46030,7 +46114,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519">
 <summary>
 Send and receive ntp_server packets.
 </summary>
@@ -46041,7 +46125,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535">
 <summary>
 Do not audit attempts to send and receive ntp_server packets.
 </summary>
@@ -46052,7 +46136,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="57550">
 <summary>
 Relabel packets to ntp_server the packet type.
 </summary>
@@ -46062,7 +46146,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57554">
+<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572">
 <summary>
 Send and receive TCP traffic on the ntske port.
 </summary>
@@ -46073,7 +46157,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ntske_port" lineno="57569">
+<interface name="corenet_udp_send_ntske_port" lineno="57587">
 <summary>
 Send UDP traffic on the ntske port.
 </summary>
@@ -46084,7 +46168,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57584">
+<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602">
 <summary>
 Do not audit attempts to send UDP traffic on the ntske port.
 </summary>
@@ -46095,7 +46179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ntske_port" lineno="57599">
+<interface name="corenet_udp_receive_ntske_port" lineno="57617">
 <summary>
 Receive UDP traffic on the ntske port.
 </summary>
@@ -46106,7 +46190,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57614">
+<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632">
 <summary>
 Do not audit attempts to receive UDP traffic on the ntske port.
 </summary>
@@ -46117,7 +46201,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ntske_port" lineno="57629">
+<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647">
 <summary>
 Send and receive UDP traffic on the ntske port.
 </summary>
@@ -46128,7 +46212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57645">
+<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ntske port.
@@ -46140,7 +46224,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ntske_port" lineno="57660">
+<interface name="corenet_tcp_bind_ntske_port" lineno="57678">
 <summary>
 Bind TCP sockets to the ntske port.
 </summary>
@@ -46151,7 +46235,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntske_port" lineno="57680">
+<interface name="corenet_udp_bind_ntske_port" lineno="57698">
 <summary>
 Bind UDP sockets to the ntske port.
 </summary>
@@ -46162,7 +46246,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntske_port" lineno="57699">
+<interface name="corenet_tcp_connect_ntske_port" lineno="57717">
 <summary>
 Make a TCP connection to the ntske port.
 </summary>
@@ -46172,7 +46256,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntske_client_packets" lineno="57719">
+<interface name="corenet_send_ntske_client_packets" lineno="57737">
 <summary>
 Send ntske_client packets.
 </summary>
@@ -46183,7 +46267,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57738">
+<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756">
 <summary>
 Do not audit attempts to send ntske_client packets.
 </summary>
@@ -46194,7 +46278,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntske_client_packets" lineno="57757">
+<interface name="corenet_receive_ntske_client_packets" lineno="57775">
 <summary>
 Receive ntske_client packets.
 </summary>
@@ -46205,7 +46289,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57776">
+<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794">
 <summary>
 Do not audit attempts to receive ntske_client packets.
 </summary>
@@ -46216,7 +46300,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntske_client_packets" lineno="57795">
+<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813">
 <summary>
 Send and receive ntske_client packets.
 </summary>
@@ -46227,7 +46311,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57811">
+<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829">
 <summary>
 Do not audit attempts to send and receive ntske_client packets.
 </summary>
@@ -46238,7 +46322,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntske_client_packets" lineno="57826">
+<interface name="corenet_relabelto_ntske_client_packets" lineno="57844">
 <summary>
 Relabel packets to ntske_client the packet type.
 </summary>
@@ -46248,7 +46332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntske_server_packets" lineno="57846">
+<interface name="corenet_send_ntske_server_packets" lineno="57864">
 <summary>
 Send ntske_server packets.
 </summary>
@@ -46259,7 +46343,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57865">
+<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883">
 <summary>
 Do not audit attempts to send ntske_server packets.
 </summary>
@@ -46270,7 +46354,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntske_server_packets" lineno="57884">
+<interface name="corenet_receive_ntske_server_packets" lineno="57902">
 <summary>
 Receive ntske_server packets.
 </summary>
@@ -46281,7 +46365,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57903">
+<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921">
 <summary>
 Do not audit attempts to receive ntske_server packets.
 </summary>
@@ -46292,7 +46376,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntske_server_packets" lineno="57922">
+<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940">
 <summary>
 Send and receive ntske_server packets.
 </summary>
@@ -46303,7 +46387,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57938">
+<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956">
 <summary>
 Do not audit attempts to send and receive ntske_server packets.
 </summary>
@@ -46314,7 +46398,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntske_server_packets" lineno="57953">
+<interface name="corenet_relabelto_ntske_server_packets" lineno="57971">
 <summary>
 Relabel packets to ntske_server the packet type.
 </summary>
@@ -46324,7 +46408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57975">
+<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993">
 <summary>
 Send and receive TCP traffic on the oa_system port.
 </summary>
@@ -46335,7 +46419,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="57990">
+<interface name="corenet_udp_send_oa_system_port" lineno="58008">
 <summary>
 Send UDP traffic on the oa_system port.
 </summary>
@@ -46346,7 +46430,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58005">
+<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023">
 <summary>
 Do not audit attempts to send UDP traffic on the oa_system port.
 </summary>
@@ -46357,7 +46441,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="58020">
+<interface name="corenet_udp_receive_oa_system_port" lineno="58038">
 <summary>
 Receive UDP traffic on the oa_system port.
 </summary>
@@ -46368,7 +46452,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58035">
+<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053">
 <summary>
 Do not audit attempts to receive UDP traffic on the oa_system port.
 </summary>
@@ -46379,7 +46463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58050">
+<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068">
 <summary>
 Send and receive UDP traffic on the oa_system port.
 </summary>
@@ -46390,7 +46474,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58066">
+<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the oa_system port.
@@ -46402,7 +46486,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="58081">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="58099">
 <summary>
 Bind TCP sockets to the oa_system port.
 </summary>
@@ -46413,7 +46497,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="58101">
+<interface name="corenet_udp_bind_oa_system_port" lineno="58119">
 <summary>
 Bind UDP sockets to the oa_system port.
 </summary>
@@ -46424,7 +46508,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="58120">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="58138">
 <summary>
 Make a TCP connection to the oa_system port.
 </summary>
@@ -46434,7 +46518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="58140">
+<interface name="corenet_send_oa_system_client_packets" lineno="58158">
 <summary>
 Send oa_system_client packets.
 </summary>
@@ -46445,7 +46529,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58159">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177">
 <summary>
 Do not audit attempts to send oa_system_client packets.
 </summary>
@@ -46456,7 +46540,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="58178">
+<interface name="corenet_receive_oa_system_client_packets" lineno="58196">
 <summary>
 Receive oa_system_client packets.
 </summary>
@@ -46467,7 +46551,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58197">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215">
 <summary>
 Do not audit attempts to receive oa_system_client packets.
 </summary>
@@ -46478,7 +46562,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58216">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234">
 <summary>
 Send and receive oa_system_client packets.
 </summary>
@@ -46489,7 +46573,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58232">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250">
 <summary>
 Do not audit attempts to send and receive oa_system_client packets.
 </summary>
@@ -46500,7 +46584,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="58247">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265">
 <summary>
 Relabel packets to oa_system_client the packet type.
 </summary>
@@ -46510,7 +46594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="58267">
+<interface name="corenet_send_oa_system_server_packets" lineno="58285">
 <summary>
 Send oa_system_server packets.
 </summary>
@@ -46521,7 +46605,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58286">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304">
 <summary>
 Do not audit attempts to send oa_system_server packets.
 </summary>
@@ -46532,7 +46616,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="58305">
+<interface name="corenet_receive_oa_system_server_packets" lineno="58323">
 <summary>
 Receive oa_system_server packets.
 </summary>
@@ -46543,7 +46627,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58324">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342">
 <summary>
 Do not audit attempts to receive oa_system_server packets.
 </summary>
@@ -46554,7 +46638,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58343">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361">
 <summary>
 Send and receive oa_system_server packets.
 </summary>
@@ -46565,7 +46649,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58359">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377">
 <summary>
 Do not audit attempts to send and receive oa_system_server packets.
 </summary>
@@ -46576,7 +46660,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="58374">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392">
 <summary>
 Relabel packets to oa_system_server the packet type.
 </summary>
@@ -46586,7 +46670,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58396">
+<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414">
 <summary>
 Send and receive TCP traffic on the oracledb port.
 </summary>
@@ -46597,7 +46681,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="58411">
+<interface name="corenet_udp_send_oracledb_port" lineno="58429">
 <summary>
 Send UDP traffic on the oracledb port.
 </summary>
@@ -46608,7 +46692,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58426">
+<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444">
 <summary>
 Do not audit attempts to send UDP traffic on the oracledb port.
 </summary>
@@ -46619,7 +46703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="58441">
+<interface name="corenet_udp_receive_oracledb_port" lineno="58459">
 <summary>
 Receive UDP traffic on the oracledb port.
 </summary>
@@ -46630,7 +46714,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58456">
+<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474">
 <summary>
 Do not audit attempts to receive UDP traffic on the oracledb port.
 </summary>
@@ -46641,7 +46725,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58471">
+<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489">
 <summary>
 Send and receive UDP traffic on the oracledb port.
 </summary>
@@ -46652,7 +46736,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58487">
+<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the oracledb port.
@@ -46664,7 +46748,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="58502">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="58520">
 <summary>
 Bind TCP sockets to the oracledb port.
 </summary>
@@ -46675,7 +46759,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="58522">
+<interface name="corenet_udp_bind_oracledb_port" lineno="58540">
 <summary>
 Bind UDP sockets to the oracledb port.
 </summary>
@@ -46686,7 +46770,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="58541">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="58559">
 <summary>
 Make a TCP connection to the oracledb port.
 </summary>
@@ -46696,7 +46780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58561">
+<interface name="corenet_send_oracledb_client_packets" lineno="58579">
 <summary>
 Send oracledb_client packets.
 </summary>
@@ -46707,7 +46791,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58580">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598">
 <summary>
 Do not audit attempts to send oracledb_client packets.
 </summary>
@@ -46718,7 +46802,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58599">
+<interface name="corenet_receive_oracledb_client_packets" lineno="58617">
 <summary>
 Receive oracledb_client packets.
 </summary>
@@ -46729,7 +46813,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58618">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636">
 <summary>
 Do not audit attempts to receive oracledb_client packets.
 </summary>
@@ -46740,7 +46824,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58637">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655">
 <summary>
 Send and receive oracledb_client packets.
 </summary>
@@ -46751,7 +46835,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58653">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671">
 <summary>
 Do not audit attempts to send and receive oracledb_client packets.
 </summary>
@@ -46762,7 +46846,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58668">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686">
 <summary>
 Relabel packets to oracledb_client the packet type.
 </summary>
@@ -46772,7 +46856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58688">
+<interface name="corenet_send_oracledb_server_packets" lineno="58706">
 <summary>
 Send oracledb_server packets.
 </summary>
@@ -46783,7 +46867,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58707">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725">
 <summary>
 Do not audit attempts to send oracledb_server packets.
 </summary>
@@ -46794,7 +46878,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58726">
+<interface name="corenet_receive_oracledb_server_packets" lineno="58744">
 <summary>
 Receive oracledb_server packets.
 </summary>
@@ -46805,7 +46889,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58745">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763">
 <summary>
 Do not audit attempts to receive oracledb_server packets.
 </summary>
@@ -46816,7 +46900,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58764">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782">
 <summary>
 Send and receive oracledb_server packets.
 </summary>
@@ -46827,7 +46911,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58780">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798">
 <summary>
 Do not audit attempts to send and receive oracledb_server packets.
 </summary>
@@ -46838,7 +46922,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58795">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813">
 <summary>
 Relabel packets to oracledb_server the packet type.
 </summary>
@@ -46848,7 +46932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58817">
+<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835">
 <summary>
 Send and receive TCP traffic on the ocsp port.
 </summary>
@@ -46859,7 +46943,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58832">
+<interface name="corenet_udp_send_ocsp_port" lineno="58850">
 <summary>
 Send UDP traffic on the ocsp port.
 </summary>
@@ -46870,7 +46954,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58847">
+<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865">
 <summary>
 Do not audit attempts to send UDP traffic on the ocsp port.
 </summary>
@@ -46881,7 +46965,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58862">
+<interface name="corenet_udp_receive_ocsp_port" lineno="58880">
 <summary>
 Receive UDP traffic on the ocsp port.
 </summary>
@@ -46892,7 +46976,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58877">
+<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895">
 <summary>
 Do not audit attempts to receive UDP traffic on the ocsp port.
 </summary>
@@ -46903,7 +46987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58892">
+<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910">
 <summary>
 Send and receive UDP traffic on the ocsp port.
 </summary>
@@ -46914,7 +46998,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58908">
+<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ocsp port.
@@ -46926,7 +47010,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58923">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="58941">
 <summary>
 Bind TCP sockets to the ocsp port.
 </summary>
@@ -46937,7 +47021,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58943">
+<interface name="corenet_udp_bind_ocsp_port" lineno="58961">
 <summary>
 Bind UDP sockets to the ocsp port.
 </summary>
@@ -46948,7 +47032,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58962">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="58980">
 <summary>
 Make a TCP connection to the ocsp port.
 </summary>
@@ -46958,7 +47042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="58982">
+<interface name="corenet_send_ocsp_client_packets" lineno="59000">
 <summary>
 Send ocsp_client packets.
 </summary>
@@ -46969,7 +47053,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59001">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019">
 <summary>
 Do not audit attempts to send ocsp_client packets.
 </summary>
@@ -46980,7 +47064,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="59020">
+<interface name="corenet_receive_ocsp_client_packets" lineno="59038">
 <summary>
 Receive ocsp_client packets.
 </summary>
@@ -46991,7 +47075,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59039">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057">
 <summary>
 Do not audit attempts to receive ocsp_client packets.
 </summary>
@@ -47002,7 +47086,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59058">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076">
 <summary>
 Send and receive ocsp_client packets.
 </summary>
@@ -47013,7 +47097,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59074">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092">
 <summary>
 Do not audit attempts to send and receive ocsp_client packets.
 </summary>
@@ -47024,7 +47108,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="59089">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107">
 <summary>
 Relabel packets to ocsp_client the packet type.
 </summary>
@@ -47034,7 +47118,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="59109">
+<interface name="corenet_send_ocsp_server_packets" lineno="59127">
 <summary>
 Send ocsp_server packets.
 </summary>
@@ -47045,7 +47129,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59128">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146">
 <summary>
 Do not audit attempts to send ocsp_server packets.
 </summary>
@@ -47056,7 +47140,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="59147">
+<interface name="corenet_receive_ocsp_server_packets" lineno="59165">
 <summary>
 Receive ocsp_server packets.
 </summary>
@@ -47067,7 +47151,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59166">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184">
 <summary>
 Do not audit attempts to receive ocsp_server packets.
 </summary>
@@ -47078,7 +47162,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59185">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203">
 <summary>
 Send and receive ocsp_server packets.
 </summary>
@@ -47089,7 +47173,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59201">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219">
 <summary>
 Do not audit attempts to send and receive ocsp_server packets.
 </summary>
@@ -47100,7 +47184,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="59216">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234">
 <summary>
 Relabel packets to ocsp_server the packet type.
 </summary>
@@ -47110,7 +47194,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59238">
+<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256">
 <summary>
 Send and receive TCP traffic on the openhpid port.
 </summary>
@@ -47121,7 +47205,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="59253">
+<interface name="corenet_udp_send_openhpid_port" lineno="59271">
 <summary>
 Send UDP traffic on the openhpid port.
 </summary>
@@ -47132,7 +47216,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59268">
+<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286">
 <summary>
 Do not audit attempts to send UDP traffic on the openhpid port.
 </summary>
@@ -47143,7 +47227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="59283">
+<interface name="corenet_udp_receive_openhpid_port" lineno="59301">
 <summary>
 Receive UDP traffic on the openhpid port.
 </summary>
@@ -47154,7 +47238,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59298">
+<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316">
 <summary>
 Do not audit attempts to receive UDP traffic on the openhpid port.
 </summary>
@@ -47165,7 +47249,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59313">
+<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331">
 <summary>
 Send and receive UDP traffic on the openhpid port.
 </summary>
@@ -47176,7 +47260,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59329">
+<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the openhpid port.
@@ -47188,7 +47272,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="59344">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="59362">
 <summary>
 Bind TCP sockets to the openhpid port.
 </summary>
@@ -47199,7 +47283,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="59364">
+<interface name="corenet_udp_bind_openhpid_port" lineno="59382">
 <summary>
 Bind UDP sockets to the openhpid port.
 </summary>
@@ -47210,7 +47294,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="59383">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="59401">
 <summary>
 Make a TCP connection to the openhpid port.
 </summary>
@@ -47220,7 +47304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="59403">
+<interface name="corenet_send_openhpid_client_packets" lineno="59421">
 <summary>
 Send openhpid_client packets.
 </summary>
@@ -47231,7 +47315,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59422">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440">
 <summary>
 Do not audit attempts to send openhpid_client packets.
 </summary>
@@ -47242,7 +47326,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="59441">
+<interface name="corenet_receive_openhpid_client_packets" lineno="59459">
 <summary>
 Receive openhpid_client packets.
 </summary>
@@ -47253,7 +47337,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59460">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478">
 <summary>
 Do not audit attempts to receive openhpid_client packets.
 </summary>
@@ -47264,7 +47348,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59479">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497">
 <summary>
 Send and receive openhpid_client packets.
 </summary>
@@ -47275,7 +47359,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59495">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513">
 <summary>
 Do not audit attempts to send and receive openhpid_client packets.
 </summary>
@@ -47286,7 +47370,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="59510">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528">
 <summary>
 Relabel packets to openhpid_client the packet type.
 </summary>
@@ -47296,7 +47380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="59530">
+<interface name="corenet_send_openhpid_server_packets" lineno="59548">
 <summary>
 Send openhpid_server packets.
 </summary>
@@ -47307,7 +47391,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59549">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567">
 <summary>
 Do not audit attempts to send openhpid_server packets.
 </summary>
@@ -47318,7 +47402,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59568">
+<interface name="corenet_receive_openhpid_server_packets" lineno="59586">
 <summary>
 Receive openhpid_server packets.
 </summary>
@@ -47329,7 +47413,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59587">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605">
 <summary>
 Do not audit attempts to receive openhpid_server packets.
 </summary>
@@ -47340,7 +47424,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59606">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624">
 <summary>
 Send and receive openhpid_server packets.
 </summary>
@@ -47351,7 +47435,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59622">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640">
 <summary>
 Do not audit attempts to send and receive openhpid_server packets.
 </summary>
@@ -47362,7 +47446,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59637">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655">
 <summary>
 Relabel packets to openhpid_server the packet type.
 </summary>
@@ -47372,7 +47456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59659">
+<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677">
 <summary>
 Send and receive TCP traffic on the openvpn port.
 </summary>
@@ -47383,7 +47467,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59674">
+<interface name="corenet_udp_send_openvpn_port" lineno="59692">
 <summary>
 Send UDP traffic on the openvpn port.
 </summary>
@@ -47394,7 +47478,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59689">
+<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707">
 <summary>
 Do not audit attempts to send UDP traffic on the openvpn port.
 </summary>
@@ -47405,7 +47489,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59704">
+<interface name="corenet_udp_receive_openvpn_port" lineno="59722">
 <summary>
 Receive UDP traffic on the openvpn port.
 </summary>
@@ -47416,7 +47500,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59719">
+<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737">
 <summary>
 Do not audit attempts to receive UDP traffic on the openvpn port.
 </summary>
@@ -47427,7 +47511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59734">
+<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752">
 <summary>
 Send and receive UDP traffic on the openvpn port.
 </summary>
@@ -47438,7 +47522,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59750">
+<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the openvpn port.
@@ -47450,7 +47534,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59765">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="59783">
 <summary>
 Bind TCP sockets to the openvpn port.
 </summary>
@@ -47461,7 +47545,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59785">
+<interface name="corenet_udp_bind_openvpn_port" lineno="59803">
 <summary>
 Bind UDP sockets to the openvpn port.
 </summary>
@@ -47472,7 +47556,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59804">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="59822">
 <summary>
 Make a TCP connection to the openvpn port.
 </summary>
@@ -47482,7 +47566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59824">
+<interface name="corenet_send_openvpn_client_packets" lineno="59842">
 <summary>
 Send openvpn_client packets.
 </summary>
@@ -47493,7 +47577,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59843">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861">
 <summary>
 Do not audit attempts to send openvpn_client packets.
 </summary>
@@ -47504,7 +47588,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59862">
+<interface name="corenet_receive_openvpn_client_packets" lineno="59880">
 <summary>
 Receive openvpn_client packets.
 </summary>
@@ -47515,7 +47599,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59881">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899">
 <summary>
 Do not audit attempts to receive openvpn_client packets.
 </summary>
@@ -47526,7 +47610,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59900">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918">
 <summary>
 Send and receive openvpn_client packets.
 </summary>
@@ -47537,7 +47621,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59916">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934">
 <summary>
 Do not audit attempts to send and receive openvpn_client packets.
 </summary>
@@ -47548,7 +47632,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59931">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949">
 <summary>
 Relabel packets to openvpn_client the packet type.
 </summary>
@@ -47558,7 +47642,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59951">
+<interface name="corenet_send_openvpn_server_packets" lineno="59969">
 <summary>
 Send openvpn_server packets.
 </summary>
@@ -47569,7 +47653,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59970">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988">
 <summary>
 Do not audit attempts to send openvpn_server packets.
 </summary>
@@ -47580,7 +47664,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="59989">
+<interface name="corenet_receive_openvpn_server_packets" lineno="60007">
 <summary>
 Receive openvpn_server packets.
 </summary>
@@ -47591,7 +47675,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60008">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026">
 <summary>
 Do not audit attempts to receive openvpn_server packets.
 </summary>
@@ -47602,7 +47686,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60027">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045">
 <summary>
 Send and receive openvpn_server packets.
 </summary>
@@ -47613,7 +47697,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60043">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061">
 <summary>
 Do not audit attempts to send and receive openvpn_server packets.
 </summary>
@@ -47624,7 +47708,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="60058">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076">
 <summary>
 Relabel packets to openvpn_server the packet type.
 </summary>
@@ -47634,7 +47718,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60080">
+<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098">
 <summary>
 Send and receive TCP traffic on the pdps port.
 </summary>
@@ -47645,7 +47729,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pdps_port" lineno="60095">
+<interface name="corenet_udp_send_pdps_port" lineno="60113">
 <summary>
 Send UDP traffic on the pdps port.
 </summary>
@@ -47656,7 +47740,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60110">
+<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128">
 <summary>
 Do not audit attempts to send UDP traffic on the pdps port.
 </summary>
@@ -47667,7 +47751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="60125">
+<interface name="corenet_udp_receive_pdps_port" lineno="60143">
 <summary>
 Receive UDP traffic on the pdps port.
 </summary>
@@ -47678,7 +47762,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60140">
+<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158">
 <summary>
 Do not audit attempts to receive UDP traffic on the pdps port.
 </summary>
@@ -47689,7 +47773,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="60155">
+<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173">
 <summary>
 Send and receive UDP traffic on the pdps port.
 </summary>
@@ -47700,7 +47784,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60171">
+<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pdps port.
@@ -47712,7 +47796,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="60186">
+<interface name="corenet_tcp_bind_pdps_port" lineno="60204">
 <summary>
 Bind TCP sockets to the pdps port.
 </summary>
@@ -47723,7 +47807,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="60206">
+<interface name="corenet_udp_bind_pdps_port" lineno="60224">
 <summary>
 Bind UDP sockets to the pdps port.
 </summary>
@@ -47734,7 +47818,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="60225">
+<interface name="corenet_tcp_connect_pdps_port" lineno="60243">
 <summary>
 Make a TCP connection to the pdps port.
 </summary>
@@ -47744,7 +47828,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_client_packets" lineno="60245">
+<interface name="corenet_send_pdps_client_packets" lineno="60263">
 <summary>
 Send pdps_client packets.
 </summary>
@@ -47755,7 +47839,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60264">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282">
 <summary>
 Do not audit attempts to send pdps_client packets.
 </summary>
@@ -47766,7 +47850,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="60283">
+<interface name="corenet_receive_pdps_client_packets" lineno="60301">
 <summary>
 Receive pdps_client packets.
 </summary>
@@ -47777,7 +47861,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60302">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320">
 <summary>
 Do not audit attempts to receive pdps_client packets.
 </summary>
@@ -47788,7 +47872,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="60321">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339">
 <summary>
 Send and receive pdps_client packets.
 </summary>
@@ -47799,7 +47883,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60337">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355">
 <summary>
 Do not audit attempts to send and receive pdps_client packets.
 </summary>
@@ -47810,7 +47894,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="60352">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="60370">
 <summary>
 Relabel packets to pdps_client the packet type.
 </summary>
@@ -47820,7 +47904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_server_packets" lineno="60372">
+<interface name="corenet_send_pdps_server_packets" lineno="60390">
 <summary>
 Send pdps_server packets.
 </summary>
@@ -47831,7 +47915,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60391">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409">
 <summary>
 Do not audit attempts to send pdps_server packets.
 </summary>
@@ -47842,7 +47926,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="60410">
+<interface name="corenet_receive_pdps_server_packets" lineno="60428">
 <summary>
 Receive pdps_server packets.
 </summary>
@@ -47853,7 +47937,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60429">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447">
 <summary>
 Do not audit attempts to receive pdps_server packets.
 </summary>
@@ -47864,7 +47948,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="60448">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466">
 <summary>
 Send and receive pdps_server packets.
 </summary>
@@ -47875,7 +47959,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60464">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482">
 <summary>
 Do not audit attempts to send and receive pdps_server packets.
 </summary>
@@ -47886,7 +47970,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="60479">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="60497">
 <summary>
 Relabel packets to pdps_server the packet type.
 </summary>
@@ -47896,7 +47980,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60501">
+<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519">
 <summary>
 Send and receive TCP traffic on the pegasus_http port.
 </summary>
@@ -47907,7 +47991,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="60516">
+<interface name="corenet_udp_send_pegasus_http_port" lineno="60534">
 <summary>
 Send UDP traffic on the pegasus_http port.
 </summary>
@@ -47918,7 +48002,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60531">
+<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549">
 <summary>
 Do not audit attempts to send UDP traffic on the pegasus_http port.
 </summary>
@@ -47929,7 +48013,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60546">
+<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564">
 <summary>
 Receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47940,7 +48024,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60561">
+<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579">
 <summary>
 Do not audit attempts to receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47951,7 +48035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60576">
+<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594">
 <summary>
 Send and receive UDP traffic on the pegasus_http port.
 </summary>
@@ -47962,7 +48046,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60592">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pegasus_http port.
@@ -47974,7 +48058,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60607">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625">
 <summary>
 Bind TCP sockets to the pegasus_http port.
 </summary>
@@ -47985,7 +48069,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60627">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645">
 <summary>
 Bind UDP sockets to the pegasus_http port.
 </summary>
@@ -47996,7 +48080,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60646">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664">
 <summary>
 Make a TCP connection to the pegasus_http port.
 </summary>
@@ -48006,7 +48090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60666">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="60684">
 <summary>
 Send pegasus_http_client packets.
 </summary>
@@ -48017,7 +48101,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60685">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703">
 <summary>
 Do not audit attempts to send pegasus_http_client packets.
 </summary>
@@ -48028,7 +48112,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60704">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722">
 <summary>
 Receive pegasus_http_client packets.
 </summary>
@@ -48039,7 +48123,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60723">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741">
 <summary>
 Do not audit attempts to receive pegasus_http_client packets.
 </summary>
@@ -48050,7 +48134,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60742">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760">
 <summary>
 Send and receive pegasus_http_client packets.
 </summary>
@@ -48061,7 +48145,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60758">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776">
 <summary>
 Do not audit attempts to send and receive pegasus_http_client packets.
 </summary>
@@ -48072,7 +48156,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60773">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791">
 <summary>
 Relabel packets to pegasus_http_client the packet type.
 </summary>
@@ -48082,7 +48166,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60793">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="60811">
 <summary>
 Send pegasus_http_server packets.
 </summary>
@@ -48093,7 +48177,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60812">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830">
 <summary>
 Do not audit attempts to send pegasus_http_server packets.
 </summary>
@@ -48104,7 +48188,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60831">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849">
 <summary>
 Receive pegasus_http_server packets.
 </summary>
@@ -48115,7 +48199,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60850">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868">
 <summary>
 Do not audit attempts to receive pegasus_http_server packets.
 </summary>
@@ -48126,7 +48210,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60869">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887">
 <summary>
 Send and receive pegasus_http_server packets.
 </summary>
@@ -48137,7 +48221,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60885">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903">
 <summary>
 Do not audit attempts to send and receive pegasus_http_server packets.
 </summary>
@@ -48148,7 +48232,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60900">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918">
 <summary>
 Relabel packets to pegasus_http_server the packet type.
 </summary>
@@ -48158,7 +48242,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60922">
+<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940">
 <summary>
 Send and receive TCP traffic on the pegasus_https port.
 </summary>
@@ -48169,7 +48253,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60937">
+<interface name="corenet_udp_send_pegasus_https_port" lineno="60955">
 <summary>
 Send UDP traffic on the pegasus_https port.
 </summary>
@@ -48180,7 +48264,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60952">
+<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970">
 <summary>
 Do not audit attempts to send UDP traffic on the pegasus_https port.
 </summary>
@@ -48191,7 +48275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60967">
+<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985">
 <summary>
 Receive UDP traffic on the pegasus_https port.
 </summary>
@@ -48202,7 +48286,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60982">
+<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000">
 <summary>
 Do not audit attempts to receive UDP traffic on the pegasus_https port.
 </summary>
@@ -48213,7 +48297,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60997">
+<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015">
 <summary>
 Send and receive UDP traffic on the pegasus_https port.
 </summary>
@@ -48224,7 +48308,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61013">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pegasus_https port.
@@ -48236,7 +48320,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61028">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046">
 <summary>
 Bind TCP sockets to the pegasus_https port.
 </summary>
@@ -48247,7 +48331,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="61048">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066">
 <summary>
 Bind UDP sockets to the pegasus_https port.
 </summary>
@@ -48258,7 +48342,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61067">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085">
 <summary>
 Make a TCP connection to the pegasus_https port.
 </summary>
@@ -48268,7 +48352,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="61087">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="61105">
 <summary>
 Send pegasus_https_client packets.
 </summary>
@@ -48279,7 +48363,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61106">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124">
 <summary>
 Do not audit attempts to send pegasus_https_client packets.
 </summary>
@@ -48290,7 +48374,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="61125">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143">
 <summary>
 Receive pegasus_https_client packets.
 </summary>
@@ -48301,7 +48385,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61144">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162">
 <summary>
 Do not audit attempts to receive pegasus_https_client packets.
 </summary>
@@ -48312,7 +48396,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61163">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181">
 <summary>
 Send and receive pegasus_https_client packets.
 </summary>
@@ -48323,7 +48407,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61179">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197">
 <summary>
 Do not audit attempts to send and receive pegasus_https_client packets.
 </summary>
@@ -48334,7 +48418,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61194">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212">
 <summary>
 Relabel packets to pegasus_https_client the packet type.
 </summary>
@@ -48344,7 +48428,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="61214">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="61232">
 <summary>
 Send pegasus_https_server packets.
 </summary>
@@ -48355,7 +48439,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61233">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251">
 <summary>
 Do not audit attempts to send pegasus_https_server packets.
 </summary>
@@ -48366,7 +48450,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="61252">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270">
 <summary>
 Receive pegasus_https_server packets.
 </summary>
@@ -48377,7 +48461,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61271">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289">
 <summary>
 Do not audit attempts to receive pegasus_https_server packets.
 </summary>
@@ -48388,7 +48472,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61290">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308">
 <summary>
 Send and receive pegasus_https_server packets.
 </summary>
@@ -48399,7 +48483,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61306">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324">
 <summary>
 Do not audit attempts to send and receive pegasus_https_server packets.
 </summary>
@@ -48410,7 +48494,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61321">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339">
 <summary>
 Relabel packets to pegasus_https_server the packet type.
 </summary>
@@ -48420,7 +48504,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61343">
+<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361">
 <summary>
 Send and receive TCP traffic on the pgpkeyserver port.
 </summary>
@@ -48431,7 +48515,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61358">
+<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376">
 <summary>
 Send UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48442,7 +48526,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61373">
+<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391">
 <summary>
 Do not audit attempts to send UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48453,7 +48537,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61388">
+<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406">
 <summary>
 Receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48464,7 +48548,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61403">
+<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421">
 <summary>
 Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48475,7 +48559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61418">
+<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436">
 <summary>
 Send and receive UDP traffic on the pgpkeyserver port.
 </summary>
@@ -48486,7 +48570,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61434">
+<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pgpkeyserver port.
@@ -48498,7 +48582,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61449">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467">
 <summary>
 Bind TCP sockets to the pgpkeyserver port.
 </summary>
@@ -48509,7 +48593,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61469">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487">
 <summary>
 Bind UDP sockets to the pgpkeyserver port.
 </summary>
@@ -48520,7 +48604,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61488">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506">
 <summary>
 Make a TCP connection to the pgpkeyserver port.
 </summary>
@@ -48530,7 +48614,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61508">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526">
 <summary>
 Send pgpkeyserver_client packets.
 </summary>
@@ -48541,7 +48625,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61527">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545">
 <summary>
 Do not audit attempts to send pgpkeyserver_client packets.
 </summary>
@@ -48552,7 +48636,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61546">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564">
 <summary>
 Receive pgpkeyserver_client packets.
 </summary>
@@ -48563,7 +48647,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61565">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583">
 <summary>
 Do not audit attempts to receive pgpkeyserver_client packets.
 </summary>
@@ -48574,7 +48658,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61584">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602">
 <summary>
 Send and receive pgpkeyserver_client packets.
 </summary>
@@ -48585,7 +48669,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61600">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_client packets.
 </summary>
@@ -48596,7 +48680,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61615">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633">
 <summary>
 Relabel packets to pgpkeyserver_client the packet type.
 </summary>
@@ -48606,7 +48690,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61635">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653">
 <summary>
 Send pgpkeyserver_server packets.
 </summary>
@@ -48617,7 +48701,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61654">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672">
 <summary>
 Do not audit attempts to send pgpkeyserver_server packets.
 </summary>
@@ -48628,7 +48712,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61673">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691">
 <summary>
 Receive pgpkeyserver_server packets.
 </summary>
@@ -48639,7 +48723,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61692">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710">
 <summary>
 Do not audit attempts to receive pgpkeyserver_server packets.
 </summary>
@@ -48650,7 +48734,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61711">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729">
 <summary>
 Send and receive pgpkeyserver_server packets.
 </summary>
@@ -48661,7 +48745,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61727">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_server packets.
 </summary>
@@ -48672,7 +48756,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61742">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760">
 <summary>
 Relabel packets to pgpkeyserver_server the packet type.
 </summary>
@@ -48682,7 +48766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61764">
+<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782">
 <summary>
 Send and receive TCP traffic on the pingd port.
 </summary>
@@ -48693,7 +48777,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61779">
+<interface name="corenet_udp_send_pingd_port" lineno="61797">
 <summary>
 Send UDP traffic on the pingd port.
 </summary>
@@ -48704,7 +48788,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61794">
+<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812">
 <summary>
 Do not audit attempts to send UDP traffic on the pingd port.
 </summary>
@@ -48715,7 +48799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61809">
+<interface name="corenet_udp_receive_pingd_port" lineno="61827">
 <summary>
 Receive UDP traffic on the pingd port.
 </summary>
@@ -48726,7 +48810,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61824">
+<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842">
 <summary>
 Do not audit attempts to receive UDP traffic on the pingd port.
 </summary>
@@ -48737,7 +48821,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61839">
+<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857">
 <summary>
 Send and receive UDP traffic on the pingd port.
 </summary>
@@ -48748,7 +48832,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61855">
+<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pingd port.
@@ -48760,7 +48844,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61870">
+<interface name="corenet_tcp_bind_pingd_port" lineno="61888">
 <summary>
 Bind TCP sockets to the pingd port.
 </summary>
@@ -48771,7 +48855,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61890">
+<interface name="corenet_udp_bind_pingd_port" lineno="61908">
 <summary>
 Bind UDP sockets to the pingd port.
 </summary>
@@ -48782,7 +48866,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61909">
+<interface name="corenet_tcp_connect_pingd_port" lineno="61927">
 <summary>
 Make a TCP connection to the pingd port.
 </summary>
@@ -48792,7 +48876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61929">
+<interface name="corenet_send_pingd_client_packets" lineno="61947">
 <summary>
 Send pingd_client packets.
 </summary>
@@ -48803,7 +48887,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61948">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966">
 <summary>
 Do not audit attempts to send pingd_client packets.
 </summary>
@@ -48814,7 +48898,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61967">
+<interface name="corenet_receive_pingd_client_packets" lineno="61985">
 <summary>
 Receive pingd_client packets.
 </summary>
@@ -48825,7 +48909,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61986">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004">
 <summary>
 Do not audit attempts to receive pingd_client packets.
 </summary>
@@ -48836,7 +48920,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="62005">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023">
 <summary>
 Send and receive pingd_client packets.
 </summary>
@@ -48847,7 +48931,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62021">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039">
 <summary>
 Do not audit attempts to send and receive pingd_client packets.
 </summary>
@@ -48858,7 +48942,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="62036">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="62054">
 <summary>
 Relabel packets to pingd_client the packet type.
 </summary>
@@ -48868,7 +48952,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_server_packets" lineno="62056">
+<interface name="corenet_send_pingd_server_packets" lineno="62074">
 <summary>
 Send pingd_server packets.
 </summary>
@@ -48879,7 +48963,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62075">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093">
 <summary>
 Do not audit attempts to send pingd_server packets.
 </summary>
@@ -48890,7 +48974,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="62094">
+<interface name="corenet_receive_pingd_server_packets" lineno="62112">
 <summary>
 Receive pingd_server packets.
 </summary>
@@ -48901,7 +48985,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62113">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131">
 <summary>
 Do not audit attempts to receive pingd_server packets.
 </summary>
@@ -48912,7 +48996,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="62132">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150">
 <summary>
 Send and receive pingd_server packets.
 </summary>
@@ -48923,7 +49007,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62148">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166">
 <summary>
 Do not audit attempts to send and receive pingd_server packets.
 </summary>
@@ -48934,7 +49018,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="62163">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="62181">
 <summary>
 Relabel packets to pingd_server the packet type.
 </summary>
@@ -48944,7 +49028,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62185">
+<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203">
 <summary>
 Send and receive TCP traffic on the pktcable_cops port.
 </summary>
@@ -48955,7 +49039,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="62200">
+<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218">
 <summary>
 Send UDP traffic on the pktcable_cops port.
 </summary>
@@ -48966,7 +49050,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62215">
+<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233">
 <summary>
 Do not audit attempts to send UDP traffic on the pktcable_cops port.
 </summary>
@@ -48977,7 +49061,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62230">
+<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248">
 <summary>
 Receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -48988,7 +49072,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62245">
+<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263">
 <summary>
 Do not audit attempts to receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -48999,7 +49083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62260">
+<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278">
 <summary>
 Send and receive UDP traffic on the pktcable_cops port.
 </summary>
@@ -49010,7 +49094,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62276">
+<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pktcable_cops port.
@@ -49022,7 +49106,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62291">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309">
 <summary>
 Bind TCP sockets to the pktcable_cops port.
 </summary>
@@ -49033,7 +49117,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62311">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329">
 <summary>
 Bind UDP sockets to the pktcable_cops port.
 </summary>
@@ -49044,7 +49128,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62330">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348">
 <summary>
 Make a TCP connection to the pktcable_cops port.
 </summary>
@@ -49054,7 +49138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="62350">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368">
 <summary>
 Send pktcable_cops_client packets.
 </summary>
@@ -49065,7 +49149,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62369">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387">
 <summary>
 Do not audit attempts to send pktcable_cops_client packets.
 </summary>
@@ -49076,7 +49160,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62388">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406">
 <summary>
 Receive pktcable_cops_client packets.
 </summary>
@@ -49087,7 +49171,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62407">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425">
 <summary>
 Do not audit attempts to receive pktcable_cops_client packets.
 </summary>
@@ -49098,7 +49182,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62426">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444">
 <summary>
 Send and receive pktcable_cops_client packets.
 </summary>
@@ -49109,7 +49193,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62442">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_client packets.
 </summary>
@@ -49120,7 +49204,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62457">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475">
 <summary>
 Relabel packets to pktcable_cops_client the packet type.
 </summary>
@@ -49130,7 +49214,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="62477">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495">
 <summary>
 Send pktcable_cops_server packets.
 </summary>
@@ -49141,7 +49225,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62496">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514">
 <summary>
 Do not audit attempts to send pktcable_cops_server packets.
 </summary>
@@ -49152,7 +49236,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62515">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533">
 <summary>
 Receive pktcable_cops_server packets.
 </summary>
@@ -49163,7 +49247,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62534">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552">
 <summary>
 Do not audit attempts to receive pktcable_cops_server packets.
 </summary>
@@ -49174,7 +49258,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62553">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571">
 <summary>
 Send and receive pktcable_cops_server packets.
 </summary>
@@ -49185,7 +49269,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62569">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_server packets.
 </summary>
@@ -49196,7 +49280,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62584">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602">
 <summary>
 Relabel packets to pktcable_cops_server the packet type.
 </summary>
@@ -49206,7 +49290,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62606">
+<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624">
 <summary>
 Send and receive TCP traffic on the pop port.
 </summary>
@@ -49217,7 +49301,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pop_port" lineno="62621">
+<interface name="corenet_udp_send_pop_port" lineno="62639">
 <summary>
 Send UDP traffic on the pop port.
 </summary>
@@ -49228,7 +49312,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62636">
+<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654">
 <summary>
 Do not audit attempts to send UDP traffic on the pop port.
 </summary>
@@ -49239,7 +49323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62651">
+<interface name="corenet_udp_receive_pop_port" lineno="62669">
 <summary>
 Receive UDP traffic on the pop port.
 </summary>
@@ -49250,7 +49334,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62666">
+<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684">
 <summary>
 Do not audit attempts to receive UDP traffic on the pop port.
 </summary>
@@ -49261,7 +49345,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62681">
+<interface name="corenet_udp_sendrecv_pop_port" lineno="62699">
 <summary>
 Send and receive UDP traffic on the pop port.
 </summary>
@@ -49272,7 +49356,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62697">
+<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pop port.
@@ -49284,7 +49368,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62712">
+<interface name="corenet_tcp_bind_pop_port" lineno="62730">
 <summary>
 Bind TCP sockets to the pop port.
 </summary>
@@ -49295,7 +49379,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62732">
+<interface name="corenet_udp_bind_pop_port" lineno="62750">
 <summary>
 Bind UDP sockets to the pop port.
 </summary>
@@ -49306,7 +49390,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62751">
+<interface name="corenet_tcp_connect_pop_port" lineno="62769">
 <summary>
 Make a TCP connection to the pop port.
 </summary>
@@ -49316,7 +49400,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_client_packets" lineno="62771">
+<interface name="corenet_send_pop_client_packets" lineno="62789">
 <summary>
 Send pop_client packets.
 </summary>
@@ -49327,7 +49411,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62790">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808">
 <summary>
 Do not audit attempts to send pop_client packets.
 </summary>
@@ -49338,7 +49422,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62809">
+<interface name="corenet_receive_pop_client_packets" lineno="62827">
 <summary>
 Receive pop_client packets.
 </summary>
@@ -49349,7 +49433,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62828">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846">
 <summary>
 Do not audit attempts to receive pop_client packets.
 </summary>
@@ -49360,7 +49444,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62847">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="62865">
 <summary>
 Send and receive pop_client packets.
 </summary>
@@ -49371,7 +49455,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62863">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881">
 <summary>
 Do not audit attempts to send and receive pop_client packets.
 </summary>
@@ -49382,7 +49466,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62878">
+<interface name="corenet_relabelto_pop_client_packets" lineno="62896">
 <summary>
 Relabel packets to pop_client the packet type.
 </summary>
@@ -49392,7 +49476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_server_packets" lineno="62898">
+<interface name="corenet_send_pop_server_packets" lineno="62916">
 <summary>
 Send pop_server packets.
 </summary>
@@ -49403,7 +49487,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62917">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935">
 <summary>
 Do not audit attempts to send pop_server packets.
 </summary>
@@ -49414,7 +49498,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62936">
+<interface name="corenet_receive_pop_server_packets" lineno="62954">
 <summary>
 Receive pop_server packets.
 </summary>
@@ -49425,7 +49509,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62955">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973">
 <summary>
 Do not audit attempts to receive pop_server packets.
 </summary>
@@ -49436,7 +49520,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62974">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="62992">
 <summary>
 Send and receive pop_server packets.
 </summary>
@@ -49447,7 +49531,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62990">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008">
 <summary>
 Do not audit attempts to send and receive pop_server packets.
 </summary>
@@ -49458,7 +49542,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="63005">
+<interface name="corenet_relabelto_pop_server_packets" lineno="63023">
 <summary>
 Relabel packets to pop_server the packet type.
 </summary>
@@ -49468,7 +49552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63027">
+<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045">
 <summary>
 Send and receive TCP traffic on the portmap port.
 </summary>
@@ -49479,7 +49563,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_portmap_port" lineno="63042">
+<interface name="corenet_udp_send_portmap_port" lineno="63060">
 <summary>
 Send UDP traffic on the portmap port.
 </summary>
@@ -49490,7 +49574,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63057">
+<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075">
 <summary>
 Do not audit attempts to send UDP traffic on the portmap port.
 </summary>
@@ -49501,7 +49585,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="63072">
+<interface name="corenet_udp_receive_portmap_port" lineno="63090">
 <summary>
 Receive UDP traffic on the portmap port.
 </summary>
@@ -49512,7 +49596,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63087">
+<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105">
 <summary>
 Do not audit attempts to receive UDP traffic on the portmap port.
 </summary>
@@ -49523,7 +49607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="63102">
+<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120">
 <summary>
 Send and receive UDP traffic on the portmap port.
 </summary>
@@ -49534,7 +49618,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63118">
+<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the portmap port.
@@ -49546,7 +49630,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="63133">
+<interface name="corenet_tcp_bind_portmap_port" lineno="63151">
 <summary>
 Bind TCP sockets to the portmap port.
 </summary>
@@ -49557,7 +49641,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="63153">
+<interface name="corenet_udp_bind_portmap_port" lineno="63171">
 <summary>
 Bind UDP sockets to the portmap port.
 </summary>
@@ -49568,7 +49652,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="63172">
+<interface name="corenet_tcp_connect_portmap_port" lineno="63190">
 <summary>
 Make a TCP connection to the portmap port.
 </summary>
@@ -49578,7 +49662,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_client_packets" lineno="63192">
+<interface name="corenet_send_portmap_client_packets" lineno="63210">
 <summary>
 Send portmap_client packets.
 </summary>
@@ -49589,7 +49673,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63211">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229">
 <summary>
 Do not audit attempts to send portmap_client packets.
 </summary>
@@ -49600,7 +49684,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="63230">
+<interface name="corenet_receive_portmap_client_packets" lineno="63248">
 <summary>
 Receive portmap_client packets.
 </summary>
@@ -49611,7 +49695,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63249">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267">
 <summary>
 Do not audit attempts to receive portmap_client packets.
 </summary>
@@ -49622,7 +49706,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="63268">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286">
 <summary>
 Send and receive portmap_client packets.
 </summary>
@@ -49633,7 +49717,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63284">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302">
 <summary>
 Do not audit attempts to send and receive portmap_client packets.
 </summary>
@@ -49644,7 +49728,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="63299">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="63317">
 <summary>
 Relabel packets to portmap_client the packet type.
 </summary>
@@ -49654,7 +49738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_server_packets" lineno="63319">
+<interface name="corenet_send_portmap_server_packets" lineno="63337">
 <summary>
 Send portmap_server packets.
 </summary>
@@ -49665,7 +49749,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63338">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356">
 <summary>
 Do not audit attempts to send portmap_server packets.
 </summary>
@@ -49676,7 +49760,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="63357">
+<interface name="corenet_receive_portmap_server_packets" lineno="63375">
 <summary>
 Receive portmap_server packets.
 </summary>
@@ -49687,7 +49771,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63376">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394">
 <summary>
 Do not audit attempts to receive portmap_server packets.
 </summary>
@@ -49698,7 +49782,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="63395">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413">
 <summary>
 Send and receive portmap_server packets.
 </summary>
@@ -49709,7 +49793,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63411">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429">
 <summary>
 Do not audit attempts to send and receive portmap_server packets.
 </summary>
@@ -49720,7 +49804,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="63426">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="63444">
 <summary>
 Relabel packets to portmap_server the packet type.
 </summary>
@@ -49730,7 +49814,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63448">
+<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466">
 <summary>
 Send and receive TCP traffic on the postfix_policyd port.
 </summary>
@@ -49741,7 +49825,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="63463">
+<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481">
 <summary>
 Send UDP traffic on the postfix_policyd port.
 </summary>
@@ -49752,7 +49836,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63478">
+<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496">
 <summary>
 Do not audit attempts to send UDP traffic on the postfix_policyd port.
 </summary>
@@ -49763,7 +49847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63493">
+<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511">
 <summary>
 Receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49774,7 +49858,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63508">
+<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526">
 <summary>
 Do not audit attempts to receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49785,7 +49869,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63523">
+<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541">
 <summary>
 Send and receive UDP traffic on the postfix_policyd port.
 </summary>
@@ -49796,7 +49880,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63539">
+<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postfix_policyd port.
@@ -49808,7 +49892,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63554">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572">
 <summary>
 Bind TCP sockets to the postfix_policyd port.
 </summary>
@@ -49819,7 +49903,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63574">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592">
 <summary>
 Bind UDP sockets to the postfix_policyd port.
 </summary>
@@ -49830,7 +49914,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63593">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611">
 <summary>
 Make a TCP connection to the postfix_policyd port.
 </summary>
@@ -49840,7 +49924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63613">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631">
 <summary>
 Send postfix_policyd_client packets.
 </summary>
@@ -49851,7 +49935,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63632">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650">
 <summary>
 Do not audit attempts to send postfix_policyd_client packets.
 </summary>
@@ -49862,7 +49946,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63651">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669">
 <summary>
 Receive postfix_policyd_client packets.
 </summary>
@@ -49873,7 +49957,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63670">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688">
 <summary>
 Do not audit attempts to receive postfix_policyd_client packets.
 </summary>
@@ -49884,7 +49968,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63689">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707">
 <summary>
 Send and receive postfix_policyd_client packets.
 </summary>
@@ -49895,7 +49979,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63705">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_client packets.
 </summary>
@@ -49906,7 +49990,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63720">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738">
 <summary>
 Relabel packets to postfix_policyd_client the packet type.
 </summary>
@@ -49916,7 +50000,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63740">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758">
 <summary>
 Send postfix_policyd_server packets.
 </summary>
@@ -49927,7 +50011,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63759">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777">
 <summary>
 Do not audit attempts to send postfix_policyd_server packets.
 </summary>
@@ -49938,7 +50022,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63778">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796">
 <summary>
 Receive postfix_policyd_server packets.
 </summary>
@@ -49949,7 +50033,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63797">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815">
 <summary>
 Do not audit attempts to receive postfix_policyd_server packets.
 </summary>
@@ -49960,7 +50044,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63816">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834">
 <summary>
 Send and receive postfix_policyd_server packets.
 </summary>
@@ -49971,7 +50055,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63832">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_server packets.
 </summary>
@@ -49982,7 +50066,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63847">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865">
 <summary>
 Relabel packets to postfix_policyd_server the packet type.
 </summary>
@@ -49992,7 +50076,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63869">
+<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887">
 <summary>
 Send and receive TCP traffic on the postgresql port.
 </summary>
@@ -50003,7 +50087,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63884">
+<interface name="corenet_udp_send_postgresql_port" lineno="63902">
 <summary>
 Send UDP traffic on the postgresql port.
 </summary>
@@ -50014,7 +50098,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63899">
+<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917">
 <summary>
 Do not audit attempts to send UDP traffic on the postgresql port.
 </summary>
@@ -50025,7 +50109,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63914">
+<interface name="corenet_udp_receive_postgresql_port" lineno="63932">
 <summary>
 Receive UDP traffic on the postgresql port.
 </summary>
@@ -50036,7 +50120,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63929">
+<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947">
 <summary>
 Do not audit attempts to receive UDP traffic on the postgresql port.
 </summary>
@@ -50047,7 +50131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63944">
+<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962">
 <summary>
 Send and receive UDP traffic on the postgresql port.
 </summary>
@@ -50058,7 +50142,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63960">
+<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postgresql port.
@@ -50070,7 +50154,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63975">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="63993">
 <summary>
 Bind TCP sockets to the postgresql port.
 </summary>
@@ -50081,7 +50165,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="63995">
+<interface name="corenet_udp_bind_postgresql_port" lineno="64013">
 <summary>
 Bind UDP sockets to the postgresql port.
 </summary>
@@ -50092,7 +50176,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="64014">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="64032">
 <summary>
 Make a TCP connection to the postgresql port.
 </summary>
@@ -50102,7 +50186,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="64034">
+<interface name="corenet_send_postgresql_client_packets" lineno="64052">
 <summary>
 Send postgresql_client packets.
 </summary>
@@ -50113,7 +50197,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64053">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071">
 <summary>
 Do not audit attempts to send postgresql_client packets.
 </summary>
@@ -50124,7 +50208,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="64072">
+<interface name="corenet_receive_postgresql_client_packets" lineno="64090">
 <summary>
 Receive postgresql_client packets.
 </summary>
@@ -50135,7 +50219,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64091">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109">
 <summary>
 Do not audit attempts to receive postgresql_client packets.
 </summary>
@@ -50146,7 +50230,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64110">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128">
 <summary>
 Send and receive postgresql_client packets.
 </summary>
@@ -50157,7 +50241,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64126">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144">
 <summary>
 Do not audit attempts to send and receive postgresql_client packets.
 </summary>
@@ -50168,7 +50252,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="64141">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159">
 <summary>
 Relabel packets to postgresql_client the packet type.
 </summary>
@@ -50178,7 +50262,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="64161">
+<interface name="corenet_send_postgresql_server_packets" lineno="64179">
 <summary>
 Send postgresql_server packets.
 </summary>
@@ -50189,7 +50273,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64180">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198">
 <summary>
 Do not audit attempts to send postgresql_server packets.
 </summary>
@@ -50200,7 +50284,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="64199">
+<interface name="corenet_receive_postgresql_server_packets" lineno="64217">
 <summary>
 Receive postgresql_server packets.
 </summary>
@@ -50211,7 +50295,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64218">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236">
 <summary>
 Do not audit attempts to receive postgresql_server packets.
 </summary>
@@ -50222,7 +50306,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64237">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255">
 <summary>
 Send and receive postgresql_server packets.
 </summary>
@@ -50233,7 +50317,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64253">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271">
 <summary>
 Do not audit attempts to send and receive postgresql_server packets.
 </summary>
@@ -50244,7 +50328,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="64268">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286">
 <summary>
 Relabel packets to postgresql_server the packet type.
 </summary>
@@ -50254,7 +50338,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64290">
+<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308">
 <summary>
 Send and receive TCP traffic on the postgrey port.
 </summary>
@@ -50265,7 +50349,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="64305">
+<interface name="corenet_udp_send_postgrey_port" lineno="64323">
 <summary>
 Send UDP traffic on the postgrey port.
 </summary>
@@ -50276,7 +50360,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64320">
+<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338">
 <summary>
 Do not audit attempts to send UDP traffic on the postgrey port.
 </summary>
@@ -50287,7 +50371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="64335">
+<interface name="corenet_udp_receive_postgrey_port" lineno="64353">
 <summary>
 Receive UDP traffic on the postgrey port.
 </summary>
@@ -50298,7 +50382,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64350">
+<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368">
 <summary>
 Do not audit attempts to receive UDP traffic on the postgrey port.
 </summary>
@@ -50309,7 +50393,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64365">
+<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383">
 <summary>
 Send and receive UDP traffic on the postgrey port.
 </summary>
@@ -50320,7 +50404,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64381">
+<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the postgrey port.
@@ -50332,7 +50416,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="64396">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="64414">
 <summary>
 Bind TCP sockets to the postgrey port.
 </summary>
@@ -50343,7 +50427,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="64416">
+<interface name="corenet_udp_bind_postgrey_port" lineno="64434">
 <summary>
 Bind UDP sockets to the postgrey port.
 </summary>
@@ -50354,7 +50438,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="64435">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="64453">
 <summary>
 Make a TCP connection to the postgrey port.
 </summary>
@@ -50364,7 +50448,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="64455">
+<interface name="corenet_send_postgrey_client_packets" lineno="64473">
 <summary>
 Send postgrey_client packets.
 </summary>
@@ -50375,7 +50459,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64474">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492">
 <summary>
 Do not audit attempts to send postgrey_client packets.
 </summary>
@@ -50386,7 +50470,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="64493">
+<interface name="corenet_receive_postgrey_client_packets" lineno="64511">
 <summary>
 Receive postgrey_client packets.
 </summary>
@@ -50397,7 +50481,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64512">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530">
 <summary>
 Do not audit attempts to receive postgrey_client packets.
 </summary>
@@ -50408,7 +50492,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64531">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549">
 <summary>
 Send and receive postgrey_client packets.
 </summary>
@@ -50419,7 +50503,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64547">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565">
 <summary>
 Do not audit attempts to send and receive postgrey_client packets.
 </summary>
@@ -50430,7 +50514,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64562">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580">
 <summary>
 Relabel packets to postgrey_client the packet type.
 </summary>
@@ -50440,7 +50524,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64582">
+<interface name="corenet_send_postgrey_server_packets" lineno="64600">
 <summary>
 Send postgrey_server packets.
 </summary>
@@ -50451,7 +50535,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64601">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619">
 <summary>
 Do not audit attempts to send postgrey_server packets.
 </summary>
@@ -50462,7 +50546,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64620">
+<interface name="corenet_receive_postgrey_server_packets" lineno="64638">
 <summary>
 Receive postgrey_server packets.
 </summary>
@@ -50473,7 +50557,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64639">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657">
 <summary>
 Do not audit attempts to receive postgrey_server packets.
 </summary>
@@ -50484,7 +50568,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64658">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676">
 <summary>
 Send and receive postgrey_server packets.
 </summary>
@@ -50495,7 +50579,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64674">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692">
 <summary>
 Do not audit attempts to send and receive postgrey_server packets.
 </summary>
@@ -50506,7 +50590,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64689">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707">
 <summary>
 Relabel packets to postgrey_server the packet type.
 </summary>
@@ -50516,7 +50600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64711">
+<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729">
 <summary>
 Send and receive TCP traffic on the pptp port.
 </summary>
@@ -50527,7 +50611,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64726">
+<interface name="corenet_udp_send_pptp_port" lineno="64744">
 <summary>
 Send UDP traffic on the pptp port.
 </summary>
@@ -50538,7 +50622,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64741">
+<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759">
 <summary>
 Do not audit attempts to send UDP traffic on the pptp port.
 </summary>
@@ -50549,7 +50633,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64756">
+<interface name="corenet_udp_receive_pptp_port" lineno="64774">
 <summary>
 Receive UDP traffic on the pptp port.
 </summary>
@@ -50560,7 +50644,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64771">
+<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789">
 <summary>
 Do not audit attempts to receive UDP traffic on the pptp port.
 </summary>
@@ -50571,7 +50655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64786">
+<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804">
 <summary>
 Send and receive UDP traffic on the pptp port.
 </summary>
@@ -50582,7 +50666,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64802">
+<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pptp port.
@@ -50594,7 +50678,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64817">
+<interface name="corenet_tcp_bind_pptp_port" lineno="64835">
 <summary>
 Bind TCP sockets to the pptp port.
 </summary>
@@ -50605,7 +50689,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64837">
+<interface name="corenet_udp_bind_pptp_port" lineno="64855">
 <summary>
 Bind UDP sockets to the pptp port.
 </summary>
@@ -50616,7 +50700,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64856">
+<interface name="corenet_tcp_connect_pptp_port" lineno="64874">
 <summary>
 Make a TCP connection to the pptp port.
 </summary>
@@ -50626,7 +50710,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64876">
+<interface name="corenet_send_pptp_client_packets" lineno="64894">
 <summary>
 Send pptp_client packets.
 </summary>
@@ -50637,7 +50721,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64895">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913">
 <summary>
 Do not audit attempts to send pptp_client packets.
 </summary>
@@ -50648,7 +50732,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64914">
+<interface name="corenet_receive_pptp_client_packets" lineno="64932">
 <summary>
 Receive pptp_client packets.
 </summary>
@@ -50659,7 +50743,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64933">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951">
 <summary>
 Do not audit attempts to receive pptp_client packets.
 </summary>
@@ -50670,7 +50754,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64952">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970">
 <summary>
 Send and receive pptp_client packets.
 </summary>
@@ -50681,7 +50765,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64968">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986">
 <summary>
 Do not audit attempts to send and receive pptp_client packets.
 </summary>
@@ -50692,7 +50776,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="64983">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="65001">
 <summary>
 Relabel packets to pptp_client the packet type.
 </summary>
@@ -50702,7 +50786,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_server_packets" lineno="65003">
+<interface name="corenet_send_pptp_server_packets" lineno="65021">
 <summary>
 Send pptp_server packets.
 </summary>
@@ -50713,7 +50797,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65022">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040">
 <summary>
 Do not audit attempts to send pptp_server packets.
 </summary>
@@ -50724,7 +50808,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="65041">
+<interface name="corenet_receive_pptp_server_packets" lineno="65059">
 <summary>
 Receive pptp_server packets.
 </summary>
@@ -50735,7 +50819,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65060">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078">
 <summary>
 Do not audit attempts to receive pptp_server packets.
 </summary>
@@ -50746,7 +50830,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="65079">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097">
 <summary>
 Send and receive pptp_server packets.
 </summary>
@@ -50757,7 +50841,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65095">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113">
 <summary>
 Do not audit attempts to send and receive pptp_server packets.
 </summary>
@@ -50768,7 +50852,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="65110">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="65128">
 <summary>
 Relabel packets to pptp_server the packet type.
 </summary>
@@ -50778,7 +50862,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65132">
+<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150">
 <summary>
 Send and receive TCP traffic on the prelude port.
 </summary>
@@ -50789,7 +50873,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_prelude_port" lineno="65147">
+<interface name="corenet_udp_send_prelude_port" lineno="65165">
 <summary>
 Send UDP traffic on the prelude port.
 </summary>
@@ -50800,7 +50884,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65162">
+<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180">
 <summary>
 Do not audit attempts to send UDP traffic on the prelude port.
 </summary>
@@ -50811,7 +50895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="65177">
+<interface name="corenet_udp_receive_prelude_port" lineno="65195">
 <summary>
 Receive UDP traffic on the prelude port.
 </summary>
@@ -50822,7 +50906,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65192">
+<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210">
 <summary>
 Do not audit attempts to receive UDP traffic on the prelude port.
 </summary>
@@ -50833,7 +50917,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="65207">
+<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225">
 <summary>
 Send and receive UDP traffic on the prelude port.
 </summary>
@@ -50844,7 +50928,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65223">
+<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the prelude port.
@@ -50856,7 +50940,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="65238">
+<interface name="corenet_tcp_bind_prelude_port" lineno="65256">
 <summary>
 Bind TCP sockets to the prelude port.
 </summary>
@@ -50867,7 +50951,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="65258">
+<interface name="corenet_udp_bind_prelude_port" lineno="65276">
 <summary>
 Bind UDP sockets to the prelude port.
 </summary>
@@ -50878,7 +50962,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="65277">
+<interface name="corenet_tcp_connect_prelude_port" lineno="65295">
 <summary>
 Make a TCP connection to the prelude port.
 </summary>
@@ -50888,7 +50972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_client_packets" lineno="65297">
+<interface name="corenet_send_prelude_client_packets" lineno="65315">
 <summary>
 Send prelude_client packets.
 </summary>
@@ -50899,7 +50983,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65316">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334">
 <summary>
 Do not audit attempts to send prelude_client packets.
 </summary>
@@ -50910,7 +50994,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="65335">
+<interface name="corenet_receive_prelude_client_packets" lineno="65353">
 <summary>
 Receive prelude_client packets.
 </summary>
@@ -50921,7 +51005,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65354">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372">
 <summary>
 Do not audit attempts to receive prelude_client packets.
 </summary>
@@ -50932,7 +51016,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="65373">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391">
 <summary>
 Send and receive prelude_client packets.
 </summary>
@@ -50943,7 +51027,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65389">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407">
 <summary>
 Do not audit attempts to send and receive prelude_client packets.
 </summary>
@@ -50954,7 +51038,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="65404">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="65422">
 <summary>
 Relabel packets to prelude_client the packet type.
 </summary>
@@ -50964,7 +51048,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_server_packets" lineno="65424">
+<interface name="corenet_send_prelude_server_packets" lineno="65442">
 <summary>
 Send prelude_server packets.
 </summary>
@@ -50975,7 +51059,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65443">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461">
 <summary>
 Do not audit attempts to send prelude_server packets.
 </summary>
@@ -50986,7 +51070,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="65462">
+<interface name="corenet_receive_prelude_server_packets" lineno="65480">
 <summary>
 Receive prelude_server packets.
 </summary>
@@ -50997,7 +51081,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65481">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499">
 <summary>
 Do not audit attempts to receive prelude_server packets.
 </summary>
@@ -51008,7 +51092,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="65500">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518">
 <summary>
 Send and receive prelude_server packets.
 </summary>
@@ -51019,7 +51103,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65516">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534">
 <summary>
 Do not audit attempts to send and receive prelude_server packets.
 </summary>
@@ -51030,7 +51114,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="65531">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="65549">
 <summary>
 Relabel packets to prelude_server the packet type.
 </summary>
@@ -51040,7 +51124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65553">
+<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571">
 <summary>
 Send and receive TCP traffic on the presence port.
 </summary>
@@ -51051,7 +51135,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_presence_port" lineno="65568">
+<interface name="corenet_udp_send_presence_port" lineno="65586">
 <summary>
 Send UDP traffic on the presence port.
 </summary>
@@ -51062,7 +51146,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65583">
+<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601">
 <summary>
 Do not audit attempts to send UDP traffic on the presence port.
 </summary>
@@ -51073,7 +51157,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65598">
+<interface name="corenet_udp_receive_presence_port" lineno="65616">
 <summary>
 Receive UDP traffic on the presence port.
 </summary>
@@ -51084,7 +51168,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65613">
+<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631">
 <summary>
 Do not audit attempts to receive UDP traffic on the presence port.
 </summary>
@@ -51095,7 +51179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65628">
+<interface name="corenet_udp_sendrecv_presence_port" lineno="65646">
 <summary>
 Send and receive UDP traffic on the presence port.
 </summary>
@@ -51106,7 +51190,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65644">
+<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the presence port.
@@ -51118,7 +51202,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65659">
+<interface name="corenet_tcp_bind_presence_port" lineno="65677">
 <summary>
 Bind TCP sockets to the presence port.
 </summary>
@@ -51129,7 +51213,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65679">
+<interface name="corenet_udp_bind_presence_port" lineno="65697">
 <summary>
 Bind UDP sockets to the presence port.
 </summary>
@@ -51140,7 +51224,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65698">
+<interface name="corenet_tcp_connect_presence_port" lineno="65716">
 <summary>
 Make a TCP connection to the presence port.
 </summary>
@@ -51150,7 +51234,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_client_packets" lineno="65718">
+<interface name="corenet_send_presence_client_packets" lineno="65736">
 <summary>
 Send presence_client packets.
 </summary>
@@ -51161,7 +51245,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65737">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755">
 <summary>
 Do not audit attempts to send presence_client packets.
 </summary>
@@ -51172,7 +51256,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65756">
+<interface name="corenet_receive_presence_client_packets" lineno="65774">
 <summary>
 Receive presence_client packets.
 </summary>
@@ -51183,7 +51267,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65775">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793">
 <summary>
 Do not audit attempts to receive presence_client packets.
 </summary>
@@ -51194,7 +51278,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65794">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="65812">
 <summary>
 Send and receive presence_client packets.
 </summary>
@@ -51205,7 +51289,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65810">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828">
 <summary>
 Do not audit attempts to send and receive presence_client packets.
 </summary>
@@ -51216,7 +51300,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65825">
+<interface name="corenet_relabelto_presence_client_packets" lineno="65843">
 <summary>
 Relabel packets to presence_client the packet type.
 </summary>
@@ -51226,7 +51310,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_server_packets" lineno="65845">
+<interface name="corenet_send_presence_server_packets" lineno="65863">
 <summary>
 Send presence_server packets.
 </summary>
@@ -51237,7 +51321,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65864">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882">
 <summary>
 Do not audit attempts to send presence_server packets.
 </summary>
@@ -51248,7 +51332,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65883">
+<interface name="corenet_receive_presence_server_packets" lineno="65901">
 <summary>
 Receive presence_server packets.
 </summary>
@@ -51259,7 +51343,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65902">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920">
 <summary>
 Do not audit attempts to receive presence_server packets.
 </summary>
@@ -51270,7 +51354,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65921">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="65939">
 <summary>
 Send and receive presence_server packets.
 </summary>
@@ -51281,7 +51365,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65937">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955">
 <summary>
 Do not audit attempts to send and receive presence_server packets.
 </summary>
@@ -51292,7 +51376,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65952">
+<interface name="corenet_relabelto_presence_server_packets" lineno="65970">
 <summary>
 Relabel packets to presence_server the packet type.
 </summary>
@@ -51302,7 +51386,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65974">
+<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992">
 <summary>
 Send and receive TCP traffic on the printer port.
 </summary>
@@ -51313,7 +51397,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_printer_port" lineno="65989">
+<interface name="corenet_udp_send_printer_port" lineno="66007">
 <summary>
 Send UDP traffic on the printer port.
 </summary>
@@ -51324,7 +51408,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66004">
+<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022">
 <summary>
 Do not audit attempts to send UDP traffic on the printer port.
 </summary>
@@ -51335,7 +51419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_printer_port" lineno="66019">
+<interface name="corenet_udp_receive_printer_port" lineno="66037">
 <summary>
 Receive UDP traffic on the printer port.
 </summary>
@@ -51346,7 +51430,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66034">
+<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052">
 <summary>
 Do not audit attempts to receive UDP traffic on the printer port.
 </summary>
@@ -51357,7 +51441,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="66049">
+<interface name="corenet_udp_sendrecv_printer_port" lineno="66067">
 <summary>
 Send and receive UDP traffic on the printer port.
 </summary>
@@ -51368,7 +51452,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66065">
+<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the printer port.
@@ -51380,7 +51464,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="66080">
+<interface name="corenet_tcp_bind_printer_port" lineno="66098">
 <summary>
 Bind TCP sockets to the printer port.
 </summary>
@@ -51391,7 +51475,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_printer_port" lineno="66100">
+<interface name="corenet_udp_bind_printer_port" lineno="66118">
 <summary>
 Bind UDP sockets to the printer port.
 </summary>
@@ -51402,7 +51486,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="66119">
+<interface name="corenet_tcp_connect_printer_port" lineno="66137">
 <summary>
 Make a TCP connection to the printer port.
 </summary>
@@ -51412,7 +51496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_client_packets" lineno="66139">
+<interface name="corenet_send_printer_client_packets" lineno="66157">
 <summary>
 Send printer_client packets.
 </summary>
@@ -51423,7 +51507,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66158">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176">
 <summary>
 Do not audit attempts to send printer_client packets.
 </summary>
@@ -51434,7 +51518,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_client_packets" lineno="66177">
+<interface name="corenet_receive_printer_client_packets" lineno="66195">
 <summary>
 Receive printer_client packets.
 </summary>
@@ -51445,7 +51529,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66196">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214">
 <summary>
 Do not audit attempts to receive printer_client packets.
 </summary>
@@ -51456,7 +51540,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="66215">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="66233">
 <summary>
 Send and receive printer_client packets.
 </summary>
@@ -51467,7 +51551,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66231">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249">
 <summary>
 Do not audit attempts to send and receive printer_client packets.
 </summary>
@@ -51478,7 +51562,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="66246">
+<interface name="corenet_relabelto_printer_client_packets" lineno="66264">
 <summary>
 Relabel packets to printer_client the packet type.
 </summary>
@@ -51488,7 +51572,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_server_packets" lineno="66266">
+<interface name="corenet_send_printer_server_packets" lineno="66284">
 <summary>
 Send printer_server packets.
 </summary>
@@ -51499,7 +51583,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66285">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303">
 <summary>
 Do not audit attempts to send printer_server packets.
 </summary>
@@ -51510,7 +51594,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_server_packets" lineno="66304">
+<interface name="corenet_receive_printer_server_packets" lineno="66322">
 <summary>
 Receive printer_server packets.
 </summary>
@@ -51521,7 +51605,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66323">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341">
 <summary>
 Do not audit attempts to receive printer_server packets.
 </summary>
@@ -51532,7 +51616,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="66342">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="66360">
 <summary>
 Send and receive printer_server packets.
 </summary>
@@ -51543,7 +51627,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66358">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376">
 <summary>
 Do not audit attempts to send and receive printer_server packets.
 </summary>
@@ -51554,7 +51638,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="66373">
+<interface name="corenet_relabelto_printer_server_packets" lineno="66391">
 <summary>
 Relabel packets to printer_server the packet type.
 </summary>
@@ -51564,7 +51648,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66395">
+<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413">
 <summary>
 Send and receive TCP traffic on the ptal port.
 </summary>
@@ -51575,7 +51659,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ptal_port" lineno="66410">
+<interface name="corenet_udp_send_ptal_port" lineno="66428">
 <summary>
 Send UDP traffic on the ptal port.
 </summary>
@@ -51586,7 +51670,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66425">
+<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443">
 <summary>
 Do not audit attempts to send UDP traffic on the ptal port.
 </summary>
@@ -51597,7 +51681,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="66440">
+<interface name="corenet_udp_receive_ptal_port" lineno="66458">
 <summary>
 Receive UDP traffic on the ptal port.
 </summary>
@@ -51608,7 +51692,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66455">
+<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473">
 <summary>
 Do not audit attempts to receive UDP traffic on the ptal port.
 </summary>
@@ -51619,7 +51703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="66470">
+<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488">
 <summary>
 Send and receive UDP traffic on the ptal port.
 </summary>
@@ -51630,7 +51714,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66486">
+<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ptal port.
@@ -51642,7 +51726,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="66501">
+<interface name="corenet_tcp_bind_ptal_port" lineno="66519">
 <summary>
 Bind TCP sockets to the ptal port.
 </summary>
@@ -51653,7 +51737,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="66521">
+<interface name="corenet_udp_bind_ptal_port" lineno="66539">
 <summary>
 Bind UDP sockets to the ptal port.
 </summary>
@@ -51664,7 +51748,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="66540">
+<interface name="corenet_tcp_connect_ptal_port" lineno="66558">
 <summary>
 Make a TCP connection to the ptal port.
 </summary>
@@ -51674,7 +51758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66560">
+<interface name="corenet_send_ptal_client_packets" lineno="66578">
 <summary>
 Send ptal_client packets.
 </summary>
@@ -51685,7 +51769,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66579">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597">
 <summary>
 Do not audit attempts to send ptal_client packets.
 </summary>
@@ -51696,7 +51780,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66598">
+<interface name="corenet_receive_ptal_client_packets" lineno="66616">
 <summary>
 Receive ptal_client packets.
 </summary>
@@ -51707,7 +51791,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66617">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635">
 <summary>
 Do not audit attempts to receive ptal_client packets.
 </summary>
@@ -51718,7 +51802,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66636">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654">
 <summary>
 Send and receive ptal_client packets.
 </summary>
@@ -51729,7 +51813,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66652">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670">
 <summary>
 Do not audit attempts to send and receive ptal_client packets.
 </summary>
@@ -51740,7 +51824,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66667">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="66685">
 <summary>
 Relabel packets to ptal_client the packet type.
 </summary>
@@ -51750,7 +51834,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66687">
+<interface name="corenet_send_ptal_server_packets" lineno="66705">
 <summary>
 Send ptal_server packets.
 </summary>
@@ -51761,7 +51845,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66706">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724">
 <summary>
 Do not audit attempts to send ptal_server packets.
 </summary>
@@ -51772,7 +51856,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66725">
+<interface name="corenet_receive_ptal_server_packets" lineno="66743">
 <summary>
 Receive ptal_server packets.
 </summary>
@@ -51783,7 +51867,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66744">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762">
 <summary>
 Do not audit attempts to receive ptal_server packets.
 </summary>
@@ -51794,7 +51878,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66763">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781">
 <summary>
 Send and receive ptal_server packets.
 </summary>
@@ -51805,7 +51889,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66779">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797">
 <summary>
 Do not audit attempts to send and receive ptal_server packets.
 </summary>
@@ -51816,7 +51900,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66794">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="66812">
 <summary>
 Relabel packets to ptal_server the packet type.
 </summary>
@@ -51826,7 +51910,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66816">
+<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834">
 <summary>
 Send and receive TCP traffic on the pulseaudio port.
 </summary>
@@ -51837,7 +51921,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66831">
+<interface name="corenet_udp_send_pulseaudio_port" lineno="66849">
 <summary>
 Send UDP traffic on the pulseaudio port.
 </summary>
@@ -51848,7 +51932,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66846">
+<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864">
 <summary>
 Do not audit attempts to send UDP traffic on the pulseaudio port.
 </summary>
@@ -51859,7 +51943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66861">
+<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879">
 <summary>
 Receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51870,7 +51954,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66876">
+<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894">
 <summary>
 Do not audit attempts to receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51881,7 +51965,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66891">
+<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909">
 <summary>
 Send and receive UDP traffic on the pulseaudio port.
 </summary>
@@ -51892,7 +51976,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66907">
+<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pulseaudio port.
@@ -51904,7 +51988,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66922">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940">
 <summary>
 Bind TCP sockets to the pulseaudio port.
 </summary>
@@ -51915,7 +51999,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66942">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960">
 <summary>
 Bind UDP sockets to the pulseaudio port.
 </summary>
@@ -51926,7 +52010,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66961">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979">
 <summary>
 Make a TCP connection to the pulseaudio port.
 </summary>
@@ -51936,7 +52020,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66981">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="66999">
 <summary>
 Send pulseaudio_client packets.
 </summary>
@@ -51947,7 +52031,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67000">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018">
 <summary>
 Do not audit attempts to send pulseaudio_client packets.
 </summary>
@@ -51958,7 +52042,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="67019">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037">
 <summary>
 Receive pulseaudio_client packets.
 </summary>
@@ -51969,7 +52053,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67038">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056">
 <summary>
 Do not audit attempts to receive pulseaudio_client packets.
 </summary>
@@ -51980,7 +52064,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67057">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075">
 <summary>
 Send and receive pulseaudio_client packets.
 </summary>
@@ -51991,7 +52075,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67073">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091">
 <summary>
 Do not audit attempts to send and receive pulseaudio_client packets.
 </summary>
@@ -52002,7 +52086,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67088">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106">
 <summary>
 Relabel packets to pulseaudio_client the packet type.
 </summary>
@@ -52012,7 +52096,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="67108">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="67126">
 <summary>
 Send pulseaudio_server packets.
 </summary>
@@ -52023,7 +52107,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67127">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145">
 <summary>
 Do not audit attempts to send pulseaudio_server packets.
 </summary>
@@ -52034,7 +52118,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="67146">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164">
 <summary>
 Receive pulseaudio_server packets.
 </summary>
@@ -52045,7 +52129,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67165">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183">
 <summary>
 Do not audit attempts to receive pulseaudio_server packets.
 </summary>
@@ -52056,7 +52140,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67184">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202">
 <summary>
 Send and receive pulseaudio_server packets.
 </summary>
@@ -52067,7 +52151,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67200">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218">
 <summary>
 Do not audit attempts to send and receive pulseaudio_server packets.
 </summary>
@@ -52078,7 +52162,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67215">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233">
 <summary>
 Relabel packets to pulseaudio_server the packet type.
 </summary>
@@ -52088,7 +52172,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67237">
+<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255">
 <summary>
 Send and receive TCP traffic on the puppet port.
 </summary>
@@ -52099,7 +52183,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_puppet_port" lineno="67252">
+<interface name="corenet_udp_send_puppet_port" lineno="67270">
 <summary>
 Send UDP traffic on the puppet port.
 </summary>
@@ -52110,7 +52194,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67267">
+<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285">
 <summary>
 Do not audit attempts to send UDP traffic on the puppet port.
 </summary>
@@ -52121,7 +52205,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="67282">
+<interface name="corenet_udp_receive_puppet_port" lineno="67300">
 <summary>
 Receive UDP traffic on the puppet port.
 </summary>
@@ -52132,7 +52216,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67297">
+<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315">
 <summary>
 Do not audit attempts to receive UDP traffic on the puppet port.
 </summary>
@@ -52143,7 +52227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="67312">
+<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330">
 <summary>
 Send and receive UDP traffic on the puppet port.
 </summary>
@@ -52154,7 +52238,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67328">
+<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the puppet port.
@@ -52166,7 +52250,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="67343">
+<interface name="corenet_tcp_bind_puppet_port" lineno="67361">
 <summary>
 Bind TCP sockets to the puppet port.
 </summary>
@@ -52177,7 +52261,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="67363">
+<interface name="corenet_udp_bind_puppet_port" lineno="67381">
 <summary>
 Bind UDP sockets to the puppet port.
 </summary>
@@ -52188,7 +52272,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="67382">
+<interface name="corenet_tcp_connect_puppet_port" lineno="67400">
 <summary>
 Make a TCP connection to the puppet port.
 </summary>
@@ -52198,7 +52282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_client_packets" lineno="67402">
+<interface name="corenet_send_puppet_client_packets" lineno="67420">
 <summary>
 Send puppet_client packets.
 </summary>
@@ -52209,7 +52293,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67421">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439">
 <summary>
 Do not audit attempts to send puppet_client packets.
 </summary>
@@ -52220,7 +52304,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="67440">
+<interface name="corenet_receive_puppet_client_packets" lineno="67458">
 <summary>
 Receive puppet_client packets.
 </summary>
@@ -52231,7 +52315,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67459">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477">
 <summary>
 Do not audit attempts to receive puppet_client packets.
 </summary>
@@ -52242,7 +52326,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="67478">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496">
 <summary>
 Send and receive puppet_client packets.
 </summary>
@@ -52253,7 +52337,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67494">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512">
 <summary>
 Do not audit attempts to send and receive puppet_client packets.
 </summary>
@@ -52264,7 +52348,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="67509">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="67527">
 <summary>
 Relabel packets to puppet_client the packet type.
 </summary>
@@ -52274,7 +52358,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_server_packets" lineno="67529">
+<interface name="corenet_send_puppet_server_packets" lineno="67547">
 <summary>
 Send puppet_server packets.
 </summary>
@@ -52285,7 +52369,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67548">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566">
 <summary>
 Do not audit attempts to send puppet_server packets.
 </summary>
@@ -52296,7 +52380,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67567">
+<interface name="corenet_receive_puppet_server_packets" lineno="67585">
 <summary>
 Receive puppet_server packets.
 </summary>
@@ -52307,7 +52391,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67586">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604">
 <summary>
 Do not audit attempts to receive puppet_server packets.
 </summary>
@@ -52318,7 +52402,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67605">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623">
 <summary>
 Send and receive puppet_server packets.
 </summary>
@@ -52329,7 +52413,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67621">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639">
 <summary>
 Do not audit attempts to send and receive puppet_server packets.
 </summary>
@@ -52340,7 +52424,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67636">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="67654">
 <summary>
 Relabel packets to puppet_server the packet type.
 </summary>
@@ -52350,7 +52434,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67658">
+<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676">
 <summary>
 Send and receive TCP traffic on the puppetclient port.
 </summary>
@@ -52361,7 +52445,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67673">
+<interface name="corenet_udp_send_puppetclient_port" lineno="67691">
 <summary>
 Send UDP traffic on the puppetclient port.
 </summary>
@@ -52372,7 +52456,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67688">
+<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706">
 <summary>
 Do not audit attempts to send UDP traffic on the puppetclient port.
 </summary>
@@ -52383,7 +52467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67703">
+<interface name="corenet_udp_receive_puppetclient_port" lineno="67721">
 <summary>
 Receive UDP traffic on the puppetclient port.
 </summary>
@@ -52394,7 +52478,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67718">
+<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736">
 <summary>
 Do not audit attempts to receive UDP traffic on the puppetclient port.
 </summary>
@@ -52405,7 +52489,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67733">
+<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751">
 <summary>
 Send and receive UDP traffic on the puppetclient port.
 </summary>
@@ -52416,7 +52500,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67749">
+<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the puppetclient port.
@@ -52428,7 +52512,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67764">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782">
 <summary>
 Bind TCP sockets to the puppetclient port.
 </summary>
@@ -52439,7 +52523,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67784">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="67802">
 <summary>
 Bind UDP sockets to the puppetclient port.
 </summary>
@@ -52450,7 +52534,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67803">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821">
 <summary>
 Make a TCP connection to the puppetclient port.
 </summary>
@@ -52460,7 +52544,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67823">
+<interface name="corenet_send_puppetclient_client_packets" lineno="67841">
 <summary>
 Send puppetclient_client packets.
 </summary>
@@ -52471,7 +52555,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67842">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860">
 <summary>
 Do not audit attempts to send puppetclient_client packets.
 </summary>
@@ -52482,7 +52566,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67861">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="67879">
 <summary>
 Receive puppetclient_client packets.
 </summary>
@@ -52493,7 +52577,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67880">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898">
 <summary>
 Do not audit attempts to receive puppetclient_client packets.
 </summary>
@@ -52504,7 +52588,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67899">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917">
 <summary>
 Send and receive puppetclient_client packets.
 </summary>
@@ -52515,7 +52599,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67915">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933">
 <summary>
 Do not audit attempts to send and receive puppetclient_client packets.
 </summary>
@@ -52526,7 +52610,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67930">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948">
 <summary>
 Relabel packets to puppetclient_client the packet type.
 </summary>
@@ -52536,7 +52620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67950">
+<interface name="corenet_send_puppetclient_server_packets" lineno="67968">
 <summary>
 Send puppetclient_server packets.
 </summary>
@@ -52547,7 +52631,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67969">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987">
 <summary>
 Do not audit attempts to send puppetclient_server packets.
 </summary>
@@ -52558,7 +52642,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="67988">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="68006">
 <summary>
 Receive puppetclient_server packets.
 </summary>
@@ -52569,7 +52653,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68007">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025">
 <summary>
 Do not audit attempts to receive puppetclient_server packets.
 </summary>
@@ -52580,7 +52664,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68026">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044">
 <summary>
 Send and receive puppetclient_server packets.
 </summary>
@@ -52591,7 +52675,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68042">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060">
 <summary>
 Do not audit attempts to send and receive puppetclient_server packets.
 </summary>
@@ -52602,7 +52686,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68057">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075">
 <summary>
 Relabel packets to puppetclient_server the packet type.
 </summary>
@@ -52612,7 +52696,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68079">
+<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097">
 <summary>
 Send and receive TCP traffic on the pxe port.
 </summary>
@@ -52623,7 +52707,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pxe_port" lineno="68094">
+<interface name="corenet_udp_send_pxe_port" lineno="68112">
 <summary>
 Send UDP traffic on the pxe port.
 </summary>
@@ -52634,7 +52718,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68109">
+<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127">
 <summary>
 Do not audit attempts to send UDP traffic on the pxe port.
 </summary>
@@ -52645,7 +52729,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="68124">
+<interface name="corenet_udp_receive_pxe_port" lineno="68142">
 <summary>
 Receive UDP traffic on the pxe port.
 </summary>
@@ -52656,7 +52740,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68139">
+<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157">
 <summary>
 Do not audit attempts to receive UDP traffic on the pxe port.
 </summary>
@@ -52667,7 +52751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="68154">
+<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172">
 <summary>
 Send and receive UDP traffic on the pxe port.
 </summary>
@@ -52678,7 +52762,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68170">
+<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pxe port.
@@ -52690,7 +52774,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="68185">
+<interface name="corenet_tcp_bind_pxe_port" lineno="68203">
 <summary>
 Bind TCP sockets to the pxe port.
 </summary>
@@ -52701,7 +52785,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="68205">
+<interface name="corenet_udp_bind_pxe_port" lineno="68223">
 <summary>
 Bind UDP sockets to the pxe port.
 </summary>
@@ -52712,7 +52796,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="68224">
+<interface name="corenet_tcp_connect_pxe_port" lineno="68242">
 <summary>
 Make a TCP connection to the pxe port.
 </summary>
@@ -52722,7 +52806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_client_packets" lineno="68244">
+<interface name="corenet_send_pxe_client_packets" lineno="68262">
 <summary>
 Send pxe_client packets.
 </summary>
@@ -52733,7 +52817,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68263">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281">
 <summary>
 Do not audit attempts to send pxe_client packets.
 </summary>
@@ -52744,7 +52828,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="68282">
+<interface name="corenet_receive_pxe_client_packets" lineno="68300">
 <summary>
 Receive pxe_client packets.
 </summary>
@@ -52755,7 +52839,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68301">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319">
 <summary>
 Do not audit attempts to receive pxe_client packets.
 </summary>
@@ -52766,7 +52850,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="68320">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338">
 <summary>
 Send and receive pxe_client packets.
 </summary>
@@ -52777,7 +52861,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68336">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354">
 <summary>
 Do not audit attempts to send and receive pxe_client packets.
 </summary>
@@ -52788,7 +52872,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="68351">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="68369">
 <summary>
 Relabel packets to pxe_client the packet type.
 </summary>
@@ -52798,7 +52882,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_server_packets" lineno="68371">
+<interface name="corenet_send_pxe_server_packets" lineno="68389">
 <summary>
 Send pxe_server packets.
 </summary>
@@ -52809,7 +52893,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68390">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408">
 <summary>
 Do not audit attempts to send pxe_server packets.
 </summary>
@@ -52820,7 +52904,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="68409">
+<interface name="corenet_receive_pxe_server_packets" lineno="68427">
 <summary>
 Receive pxe_server packets.
 </summary>
@@ -52831,7 +52915,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68428">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446">
 <summary>
 Do not audit attempts to receive pxe_server packets.
 </summary>
@@ -52842,7 +52926,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="68447">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465">
 <summary>
 Send and receive pxe_server packets.
 </summary>
@@ -52853,7 +52937,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68463">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481">
 <summary>
 Do not audit attempts to send and receive pxe_server packets.
 </summary>
@@ -52864,7 +52948,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="68478">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="68496">
 <summary>
 Relabel packets to pxe_server the packet type.
 </summary>
@@ -52874,7 +52958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68500">
+<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518">
 <summary>
 Send and receive TCP traffic on the pyzor port.
 </summary>
@@ -52885,7 +52969,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="68515">
+<interface name="corenet_udp_send_pyzor_port" lineno="68533">
 <summary>
 Send UDP traffic on the pyzor port.
 </summary>
@@ -52896,7 +52980,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68530">
+<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548">
 <summary>
 Do not audit attempts to send UDP traffic on the pyzor port.
 </summary>
@@ -52907,7 +52991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68545">
+<interface name="corenet_udp_receive_pyzor_port" lineno="68563">
 <summary>
 Receive UDP traffic on the pyzor port.
 </summary>
@@ -52918,7 +53002,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68560">
+<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578">
 <summary>
 Do not audit attempts to receive UDP traffic on the pyzor port.
 </summary>
@@ -52929,7 +53013,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68575">
+<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593">
 <summary>
 Send and receive UDP traffic on the pyzor port.
 </summary>
@@ -52940,7 +53024,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68591">
+<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the pyzor port.
@@ -52952,7 +53036,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68606">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="68624">
 <summary>
 Bind TCP sockets to the pyzor port.
 </summary>
@@ -52963,7 +53047,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68626">
+<interface name="corenet_udp_bind_pyzor_port" lineno="68644">
 <summary>
 Bind UDP sockets to the pyzor port.
 </summary>
@@ -52974,7 +53058,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68645">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="68663">
 <summary>
 Make a TCP connection to the pyzor port.
 </summary>
@@ -52984,7 +53068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68665">
+<interface name="corenet_send_pyzor_client_packets" lineno="68683">
 <summary>
 Send pyzor_client packets.
 </summary>
@@ -52995,7 +53079,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68684">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702">
 <summary>
 Do not audit attempts to send pyzor_client packets.
 </summary>
@@ -53006,7 +53090,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68703">
+<interface name="corenet_receive_pyzor_client_packets" lineno="68721">
 <summary>
 Receive pyzor_client packets.
 </summary>
@@ -53017,7 +53101,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68722">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740">
 <summary>
 Do not audit attempts to receive pyzor_client packets.
 </summary>
@@ -53028,7 +53112,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68741">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759">
 <summary>
 Send and receive pyzor_client packets.
 </summary>
@@ -53039,7 +53123,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68757">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775">
 <summary>
 Do not audit attempts to send and receive pyzor_client packets.
 </summary>
@@ -53050,7 +53134,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68772">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790">
 <summary>
 Relabel packets to pyzor_client the packet type.
 </summary>
@@ -53060,7 +53144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68792">
+<interface name="corenet_send_pyzor_server_packets" lineno="68810">
 <summary>
 Send pyzor_server packets.
 </summary>
@@ -53071,7 +53155,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68811">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829">
 <summary>
 Do not audit attempts to send pyzor_server packets.
 </summary>
@@ -53082,7 +53166,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68830">
+<interface name="corenet_receive_pyzor_server_packets" lineno="68848">
 <summary>
 Receive pyzor_server packets.
 </summary>
@@ -53093,7 +53177,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68849">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867">
 <summary>
 Do not audit attempts to receive pyzor_server packets.
 </summary>
@@ -53104,7 +53188,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68868">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886">
 <summary>
 Send and receive pyzor_server packets.
 </summary>
@@ -53115,7 +53199,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68884">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902">
 <summary>
 Do not audit attempts to send and receive pyzor_server packets.
 </summary>
@@ -53126,7 +53210,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68899">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917">
 <summary>
 Relabel packets to pyzor_server the packet type.
 </summary>
@@ -53136,7 +53220,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68921">
+<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939">
 <summary>
 Send and receive TCP traffic on the radacct port.
 </summary>
@@ -53147,7 +53231,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68936">
+<interface name="corenet_udp_send_radacct_port" lineno="68954">
 <summary>
 Send UDP traffic on the radacct port.
 </summary>
@@ -53158,7 +53242,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68951">
+<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969">
 <summary>
 Do not audit attempts to send UDP traffic on the radacct port.
 </summary>
@@ -53169,7 +53253,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68966">
+<interface name="corenet_udp_receive_radacct_port" lineno="68984">
 <summary>
 Receive UDP traffic on the radacct port.
 </summary>
@@ -53180,7 +53264,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68981">
+<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999">
 <summary>
 Do not audit attempts to receive UDP traffic on the radacct port.
 </summary>
@@ -53191,7 +53275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="68996">
+<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014">
 <summary>
 Send and receive UDP traffic on the radacct port.
 </summary>
@@ -53202,7 +53286,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69012">
+<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radacct port.
@@ -53214,7 +53298,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="69027">
+<interface name="corenet_tcp_bind_radacct_port" lineno="69045">
 <summary>
 Bind TCP sockets to the radacct port.
 </summary>
@@ -53225,7 +53309,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="69047">
+<interface name="corenet_udp_bind_radacct_port" lineno="69065">
 <summary>
 Bind UDP sockets to the radacct port.
 </summary>
@@ -53236,7 +53320,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="69066">
+<interface name="corenet_tcp_connect_radacct_port" lineno="69084">
 <summary>
 Make a TCP connection to the radacct port.
 </summary>
@@ -53246,7 +53330,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_client_packets" lineno="69086">
+<interface name="corenet_send_radacct_client_packets" lineno="69104">
 <summary>
 Send radacct_client packets.
 </summary>
@@ -53257,7 +53341,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69105">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123">
 <summary>
 Do not audit attempts to send radacct_client packets.
 </summary>
@@ -53268,7 +53352,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="69124">
+<interface name="corenet_receive_radacct_client_packets" lineno="69142">
 <summary>
 Receive radacct_client packets.
 </summary>
@@ -53279,7 +53363,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69143">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161">
 <summary>
 Do not audit attempts to receive radacct_client packets.
 </summary>
@@ -53290,7 +53374,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="69162">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180">
 <summary>
 Send and receive radacct_client packets.
 </summary>
@@ -53301,7 +53385,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69178">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196">
 <summary>
 Do not audit attempts to send and receive radacct_client packets.
 </summary>
@@ -53312,7 +53396,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="69193">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="69211">
 <summary>
 Relabel packets to radacct_client the packet type.
 </summary>
@@ -53322,7 +53406,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_server_packets" lineno="69213">
+<interface name="corenet_send_radacct_server_packets" lineno="69231">
 <summary>
 Send radacct_server packets.
 </summary>
@@ -53333,7 +53417,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69232">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250">
 <summary>
 Do not audit attempts to send radacct_server packets.
 </summary>
@@ -53344,7 +53428,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="69251">
+<interface name="corenet_receive_radacct_server_packets" lineno="69269">
 <summary>
 Receive radacct_server packets.
 </summary>
@@ -53355,7 +53439,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69270">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288">
 <summary>
 Do not audit attempts to receive radacct_server packets.
 </summary>
@@ -53366,7 +53450,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="69289">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307">
 <summary>
 Send and receive radacct_server packets.
 </summary>
@@ -53377,7 +53461,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69305">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323">
 <summary>
 Do not audit attempts to send and receive radacct_server packets.
 </summary>
@@ -53388,7 +53472,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="69320">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="69338">
 <summary>
 Relabel packets to radacct_server the packet type.
 </summary>
@@ -53398,7 +53482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="69342">
+<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360">
 <summary>
 Send and receive TCP traffic on the radius port.
 </summary>
@@ -53409,7 +53493,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radius_port" lineno="69357">
+<interface name="corenet_udp_send_radius_port" lineno="69375">
 <summary>
 Send UDP traffic on the radius port.
 </summary>
@@ -53420,7 +53504,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69372">
+<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390">
 <summary>
 Do not audit attempts to send UDP traffic on the radius port.
 </summary>
@@ -53431,7 +53515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radius_port" lineno="69387">
+<interface name="corenet_udp_receive_radius_port" lineno="69405">
 <summary>
 Receive UDP traffic on the radius port.
 </summary>
@@ -53442,7 +53526,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69402">
+<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420">
 <summary>
 Do not audit attempts to receive UDP traffic on the radius port.
 </summary>
@@ -53453,7 +53537,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="69417">
+<interface name="corenet_udp_sendrecv_radius_port" lineno="69435">
 <summary>
 Send and receive UDP traffic on the radius port.
 </summary>
@@ -53464,7 +53548,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69433">
+<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radius port.
@@ -53476,7 +53560,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="69448">
+<interface name="corenet_tcp_bind_radius_port" lineno="69466">
 <summary>
 Bind TCP sockets to the radius port.
 </summary>
@@ -53487,7 +53571,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radius_port" lineno="69468">
+<interface name="corenet_udp_bind_radius_port" lineno="69486">
 <summary>
 Bind UDP sockets to the radius port.
 </summary>
@@ -53498,7 +53582,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="69487">
+<interface name="corenet_tcp_connect_radius_port" lineno="69505">
 <summary>
 Make a TCP connection to the radius port.
 </summary>
@@ -53508,7 +53592,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_client_packets" lineno="69507">
+<interface name="corenet_send_radius_client_packets" lineno="69525">
 <summary>
 Send radius_client packets.
 </summary>
@@ -53519,7 +53603,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69526">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544">
 <summary>
 Do not audit attempts to send radius_client packets.
 </summary>
@@ -53530,7 +53614,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69545">
+<interface name="corenet_receive_radius_client_packets" lineno="69563">
 <summary>
 Receive radius_client packets.
 </summary>
@@ -53541,7 +53625,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69564">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582">
 <summary>
 Do not audit attempts to receive radius_client packets.
 </summary>
@@ -53552,7 +53636,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69583">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="69601">
 <summary>
 Send and receive radius_client packets.
 </summary>
@@ -53563,7 +53647,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69599">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617">
 <summary>
 Do not audit attempts to send and receive radius_client packets.
 </summary>
@@ -53574,7 +53658,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69614">
+<interface name="corenet_relabelto_radius_client_packets" lineno="69632">
 <summary>
 Relabel packets to radius_client the packet type.
 </summary>
@@ -53584,7 +53668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_server_packets" lineno="69634">
+<interface name="corenet_send_radius_server_packets" lineno="69652">
 <summary>
 Send radius_server packets.
 </summary>
@@ -53595,7 +53679,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69653">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671">
 <summary>
 Do not audit attempts to send radius_server packets.
 </summary>
@@ -53606,7 +53690,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69672">
+<interface name="corenet_receive_radius_server_packets" lineno="69690">
 <summary>
 Receive radius_server packets.
 </summary>
@@ -53617,7 +53701,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69691">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709">
 <summary>
 Do not audit attempts to receive radius_server packets.
 </summary>
@@ -53628,7 +53712,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69710">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="69728">
 <summary>
 Send and receive radius_server packets.
 </summary>
@@ -53639,7 +53723,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69726">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744">
 <summary>
 Do not audit attempts to send and receive radius_server packets.
 </summary>
@@ -53650,7 +53734,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69741">
+<interface name="corenet_relabelto_radius_server_packets" lineno="69759">
 <summary>
 Relabel packets to radius_server the packet type.
 </summary>
@@ -53660,7 +53744,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69763">
+<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781">
 <summary>
 Send and receive TCP traffic on the radsec port.
 </summary>
@@ -53671,7 +53755,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69778">
+<interface name="corenet_udp_send_radsec_port" lineno="69796">
 <summary>
 Send UDP traffic on the radsec port.
 </summary>
@@ -53682,7 +53766,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69793">
+<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811">
 <summary>
 Do not audit attempts to send UDP traffic on the radsec port.
 </summary>
@@ -53693,7 +53777,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69808">
+<interface name="corenet_udp_receive_radsec_port" lineno="69826">
 <summary>
 Receive UDP traffic on the radsec port.
 </summary>
@@ -53704,7 +53788,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69823">
+<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841">
 <summary>
 Do not audit attempts to receive UDP traffic on the radsec port.
 </summary>
@@ -53715,7 +53799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69838">
+<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856">
 <summary>
 Send and receive UDP traffic on the radsec port.
 </summary>
@@ -53726,7 +53810,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69854">
+<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the radsec port.
@@ -53738,7 +53822,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69869">
+<interface name="corenet_tcp_bind_radsec_port" lineno="69887">
 <summary>
 Bind TCP sockets to the radsec port.
 </summary>
@@ -53749,7 +53833,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69889">
+<interface name="corenet_udp_bind_radsec_port" lineno="69907">
 <summary>
 Bind UDP sockets to the radsec port.
 </summary>
@@ -53760,7 +53844,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69908">
+<interface name="corenet_tcp_connect_radsec_port" lineno="69926">
 <summary>
 Make a TCP connection to the radsec port.
 </summary>
@@ -53770,7 +53854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69928">
+<interface name="corenet_send_radsec_client_packets" lineno="69946">
 <summary>
 Send radsec_client packets.
 </summary>
@@ -53781,7 +53865,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69947">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965">
 <summary>
 Do not audit attempts to send radsec_client packets.
 </summary>
@@ -53792,7 +53876,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69966">
+<interface name="corenet_receive_radsec_client_packets" lineno="69984">
 <summary>
 Receive radsec_client packets.
 </summary>
@@ -53803,7 +53887,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69985">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003">
 <summary>
 Do not audit attempts to receive radsec_client packets.
 </summary>
@@ -53814,7 +53898,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="70004">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022">
 <summary>
 Send and receive radsec_client packets.
 </summary>
@@ -53825,7 +53909,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70020">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038">
 <summary>
 Do not audit attempts to send and receive radsec_client packets.
 </summary>
@@ -53836,7 +53920,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="70035">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="70053">
 <summary>
 Relabel packets to radsec_client the packet type.
 </summary>
@@ -53846,7 +53930,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_server_packets" lineno="70055">
+<interface name="corenet_send_radsec_server_packets" lineno="70073">
 <summary>
 Send radsec_server packets.
 </summary>
@@ -53857,7 +53941,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70074">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092">
 <summary>
 Do not audit attempts to send radsec_server packets.
 </summary>
@@ -53868,7 +53952,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="70093">
+<interface name="corenet_receive_radsec_server_packets" lineno="70111">
 <summary>
 Receive radsec_server packets.
 </summary>
@@ -53879,7 +53963,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70112">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130">
 <summary>
 Do not audit attempts to receive radsec_server packets.
 </summary>
@@ -53890,7 +53974,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="70131">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149">
 <summary>
 Send and receive radsec_server packets.
 </summary>
@@ -53901,7 +53985,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70147">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165">
 <summary>
 Do not audit attempts to send and receive radsec_server packets.
 </summary>
@@ -53912,7 +53996,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="70162">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="70180">
 <summary>
 Relabel packets to radsec_server the packet type.
 </summary>
@@ -53922,7 +54006,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="70184">
+<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202">
 <summary>
 Send and receive TCP traffic on the razor port.
 </summary>
@@ -53933,7 +54017,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_razor_port" lineno="70199">
+<interface name="corenet_udp_send_razor_port" lineno="70217">
 <summary>
 Send UDP traffic on the razor port.
 </summary>
@@ -53944,7 +54028,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70214">
+<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232">
 <summary>
 Do not audit attempts to send UDP traffic on the razor port.
 </summary>
@@ -53955,7 +54039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_razor_port" lineno="70229">
+<interface name="corenet_udp_receive_razor_port" lineno="70247">
 <summary>
 Receive UDP traffic on the razor port.
 </summary>
@@ -53966,7 +54050,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70244">
+<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262">
 <summary>
 Do not audit attempts to receive UDP traffic on the razor port.
 </summary>
@@ -53977,7 +54061,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="70259">
+<interface name="corenet_udp_sendrecv_razor_port" lineno="70277">
 <summary>
 Send and receive UDP traffic on the razor port.
 </summary>
@@ -53988,7 +54072,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70275">
+<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the razor port.
@@ -54000,7 +54084,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="70290">
+<interface name="corenet_tcp_bind_razor_port" lineno="70308">
 <summary>
 Bind TCP sockets to the razor port.
 </summary>
@@ -54011,7 +54095,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_razor_port" lineno="70310">
+<interface name="corenet_udp_bind_razor_port" lineno="70328">
 <summary>
 Bind UDP sockets to the razor port.
 </summary>
@@ -54022,7 +54106,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="70329">
+<interface name="corenet_tcp_connect_razor_port" lineno="70347">
 <summary>
 Make a TCP connection to the razor port.
 </summary>
@@ -54032,7 +54116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_client_packets" lineno="70349">
+<interface name="corenet_send_razor_client_packets" lineno="70367">
 <summary>
 Send razor_client packets.
 </summary>
@@ -54043,7 +54127,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70368">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386">
 <summary>
 Do not audit attempts to send razor_client packets.
 </summary>
@@ -54054,7 +54138,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_client_packets" lineno="70387">
+<interface name="corenet_receive_razor_client_packets" lineno="70405">
 <summary>
 Receive razor_client packets.
 </summary>
@@ -54065,7 +54149,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70406">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424">
 <summary>
 Do not audit attempts to receive razor_client packets.
 </summary>
@@ -54076,7 +54160,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="70425">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="70443">
 <summary>
 Send and receive razor_client packets.
 </summary>
@@ -54087,7 +54171,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70441">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459">
 <summary>
 Do not audit attempts to send and receive razor_client packets.
 </summary>
@@ -54098,7 +54182,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="70456">
+<interface name="corenet_relabelto_razor_client_packets" lineno="70474">
 <summary>
 Relabel packets to razor_client the packet type.
 </summary>
@@ -54108,7 +54192,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_server_packets" lineno="70476">
+<interface name="corenet_send_razor_server_packets" lineno="70494">
 <summary>
 Send razor_server packets.
 </summary>
@@ -54119,7 +54203,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70495">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513">
 <summary>
 Do not audit attempts to send razor_server packets.
 </summary>
@@ -54130,7 +54214,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_server_packets" lineno="70514">
+<interface name="corenet_receive_razor_server_packets" lineno="70532">
 <summary>
 Receive razor_server packets.
 </summary>
@@ -54141,7 +54225,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70533">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551">
 <summary>
 Do not audit attempts to receive razor_server packets.
 </summary>
@@ -54152,7 +54236,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70552">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="70570">
 <summary>
 Send and receive razor_server packets.
 </summary>
@@ -54163,7 +54247,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70568">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586">
 <summary>
 Do not audit attempts to send and receive razor_server packets.
 </summary>
@@ -54174,7 +54258,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70583">
+<interface name="corenet_relabelto_razor_server_packets" lineno="70601">
 <summary>
 Relabel packets to razor_server the packet type.
 </summary>
@@ -54184,7 +54268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70605">
+<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623">
 <summary>
 Send and receive TCP traffic on the redis port.
 </summary>
@@ -54195,7 +54279,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_redis_port" lineno="70620">
+<interface name="corenet_udp_send_redis_port" lineno="70638">
 <summary>
 Send UDP traffic on the redis port.
 </summary>
@@ -54206,7 +54290,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70635">
+<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653">
 <summary>
 Do not audit attempts to send UDP traffic on the redis port.
 </summary>
@@ -54217,7 +54301,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70650">
+<interface name="corenet_udp_receive_redis_port" lineno="70668">
 <summary>
 Receive UDP traffic on the redis port.
 </summary>
@@ -54228,7 +54312,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70665">
+<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683">
 <summary>
 Do not audit attempts to receive UDP traffic on the redis port.
 </summary>
@@ -54239,7 +54323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70680">
+<interface name="corenet_udp_sendrecv_redis_port" lineno="70698">
 <summary>
 Send and receive UDP traffic on the redis port.
 </summary>
@@ -54250,7 +54334,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70696">
+<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the redis port.
@@ -54262,7 +54346,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70711">
+<interface name="corenet_tcp_bind_redis_port" lineno="70729">
 <summary>
 Bind TCP sockets to the redis port.
 </summary>
@@ -54273,7 +54357,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70731">
+<interface name="corenet_udp_bind_redis_port" lineno="70749">
 <summary>
 Bind UDP sockets to the redis port.
 </summary>
@@ -54284,7 +54368,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70750">
+<interface name="corenet_tcp_connect_redis_port" lineno="70768">
 <summary>
 Make a TCP connection to the redis port.
 </summary>
@@ -54294,7 +54378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_client_packets" lineno="70770">
+<interface name="corenet_send_redis_client_packets" lineno="70788">
 <summary>
 Send redis_client packets.
 </summary>
@@ -54305,7 +54389,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70789">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807">
 <summary>
 Do not audit attempts to send redis_client packets.
 </summary>
@@ -54316,7 +54400,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70808">
+<interface name="corenet_receive_redis_client_packets" lineno="70826">
 <summary>
 Receive redis_client packets.
 </summary>
@@ -54327,7 +54411,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70827">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845">
 <summary>
 Do not audit attempts to receive redis_client packets.
 </summary>
@@ -54338,7 +54422,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70846">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="70864">
 <summary>
 Send and receive redis_client packets.
 </summary>
@@ -54349,7 +54433,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70862">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880">
 <summary>
 Do not audit attempts to send and receive redis_client packets.
 </summary>
@@ -54360,7 +54444,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70877">
+<interface name="corenet_relabelto_redis_client_packets" lineno="70895">
 <summary>
 Relabel packets to redis_client the packet type.
 </summary>
@@ -54370,7 +54454,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_server_packets" lineno="70897">
+<interface name="corenet_send_redis_server_packets" lineno="70915">
 <summary>
 Send redis_server packets.
 </summary>
@@ -54381,7 +54465,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70916">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934">
 <summary>
 Do not audit attempts to send redis_server packets.
 </summary>
@@ -54392,7 +54476,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70935">
+<interface name="corenet_receive_redis_server_packets" lineno="70953">
 <summary>
 Receive redis_server packets.
 </summary>
@@ -54403,7 +54487,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70954">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972">
 <summary>
 Do not audit attempts to receive redis_server packets.
 </summary>
@@ -54414,7 +54498,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70973">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="70991">
 <summary>
 Send and receive redis_server packets.
 </summary>
@@ -54425,7 +54509,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70989">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007">
 <summary>
 Do not audit attempts to send and receive redis_server packets.
 </summary>
@@ -54436,7 +54520,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="71004">
+<interface name="corenet_relabelto_redis_server_packets" lineno="71022">
 <summary>
 Relabel packets to redis_server the packet type.
 </summary>
@@ -54446,7 +54530,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="71026">
+<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044">
 <summary>
 Send and receive TCP traffic on the repository port.
 </summary>
@@ -54457,7 +54541,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_repository_port" lineno="71041">
+<interface name="corenet_udp_send_repository_port" lineno="71059">
 <summary>
 Send UDP traffic on the repository port.
 </summary>
@@ -54468,7 +54552,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71056">
+<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074">
 <summary>
 Do not audit attempts to send UDP traffic on the repository port.
 </summary>
@@ -54479,7 +54563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_repository_port" lineno="71071">
+<interface name="corenet_udp_receive_repository_port" lineno="71089">
 <summary>
 Receive UDP traffic on the repository port.
 </summary>
@@ -54490,7 +54574,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71086">
+<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104">
 <summary>
 Do not audit attempts to receive UDP traffic on the repository port.
 </summary>
@@ -54501,7 +54585,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="71101">
+<interface name="corenet_udp_sendrecv_repository_port" lineno="71119">
 <summary>
 Send and receive UDP traffic on the repository port.
 </summary>
@@ -54512,7 +54596,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71117">
+<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the repository port.
@@ -54524,7 +54608,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="71132">
+<interface name="corenet_tcp_bind_repository_port" lineno="71150">
 <summary>
 Bind TCP sockets to the repository port.
 </summary>
@@ -54535,7 +54619,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_repository_port" lineno="71152">
+<interface name="corenet_udp_bind_repository_port" lineno="71170">
 <summary>
 Bind UDP sockets to the repository port.
 </summary>
@@ -54546,7 +54630,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="71171">
+<interface name="corenet_tcp_connect_repository_port" lineno="71189">
 <summary>
 Make a TCP connection to the repository port.
 </summary>
@@ -54556,7 +54640,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_client_packets" lineno="71191">
+<interface name="corenet_send_repository_client_packets" lineno="71209">
 <summary>
 Send repository_client packets.
 </summary>
@@ -54567,7 +54651,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71210">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228">
 <summary>
 Do not audit attempts to send repository_client packets.
 </summary>
@@ -54578,7 +54662,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_client_packets" lineno="71229">
+<interface name="corenet_receive_repository_client_packets" lineno="71247">
 <summary>
 Receive repository_client packets.
 </summary>
@@ -54589,7 +54673,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71248">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266">
 <summary>
 Do not audit attempts to receive repository_client packets.
 </summary>
@@ -54600,7 +54684,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="71267">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="71285">
 <summary>
 Send and receive repository_client packets.
 </summary>
@@ -54611,7 +54695,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71283">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301">
 <summary>
 Do not audit attempts to send and receive repository_client packets.
 </summary>
@@ -54622,7 +54706,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="71298">
+<interface name="corenet_relabelto_repository_client_packets" lineno="71316">
 <summary>
 Relabel packets to repository_client the packet type.
 </summary>
@@ -54632,7 +54716,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_server_packets" lineno="71318">
+<interface name="corenet_send_repository_server_packets" lineno="71336">
 <summary>
 Send repository_server packets.
 </summary>
@@ -54643,7 +54727,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71337">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355">
 <summary>
 Do not audit attempts to send repository_server packets.
 </summary>
@@ -54654,7 +54738,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_server_packets" lineno="71356">
+<interface name="corenet_receive_repository_server_packets" lineno="71374">
 <summary>
 Receive repository_server packets.
 </summary>
@@ -54665,7 +54749,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71375">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393">
 <summary>
 Do not audit attempts to receive repository_server packets.
 </summary>
@@ -54676,7 +54760,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="71394">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="71412">
 <summary>
 Send and receive repository_server packets.
 </summary>
@@ -54687,7 +54771,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71410">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428">
 <summary>
 Do not audit attempts to send and receive repository_server packets.
 </summary>
@@ -54698,7 +54782,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="71425">
+<interface name="corenet_relabelto_repository_server_packets" lineno="71443">
 <summary>
 Relabel packets to repository_server the packet type.
 </summary>
@@ -54708,7 +54792,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71447">
+<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465">
 <summary>
 Send and receive TCP traffic on the ricci port.
 </summary>
@@ -54719,7 +54803,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ricci_port" lineno="71462">
+<interface name="corenet_udp_send_ricci_port" lineno="71480">
 <summary>
 Send UDP traffic on the ricci port.
 </summary>
@@ -54730,7 +54814,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71477">
+<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495">
 <summary>
 Do not audit attempts to send UDP traffic on the ricci port.
 </summary>
@@ -54741,7 +54825,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="71492">
+<interface name="corenet_udp_receive_ricci_port" lineno="71510">
 <summary>
 Receive UDP traffic on the ricci port.
 </summary>
@@ -54752,7 +54836,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71507">
+<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525">
 <summary>
 Do not audit attempts to receive UDP traffic on the ricci port.
 </summary>
@@ -54763,7 +54847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="71522">
+<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540">
 <summary>
 Send and receive UDP traffic on the ricci port.
 </summary>
@@ -54774,7 +54858,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71538">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ricci port.
@@ -54786,7 +54870,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71553">
+<interface name="corenet_tcp_bind_ricci_port" lineno="71571">
 <summary>
 Bind TCP sockets to the ricci port.
 </summary>
@@ -54797,7 +54881,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71573">
+<interface name="corenet_udp_bind_ricci_port" lineno="71591">
 <summary>
 Bind UDP sockets to the ricci port.
 </summary>
@@ -54808,7 +54892,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71592">
+<interface name="corenet_tcp_connect_ricci_port" lineno="71610">
 <summary>
 Make a TCP connection to the ricci port.
 </summary>
@@ -54818,7 +54902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71612">
+<interface name="corenet_send_ricci_client_packets" lineno="71630">
 <summary>
 Send ricci_client packets.
 </summary>
@@ -54829,7 +54913,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71631">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649">
 <summary>
 Do not audit attempts to send ricci_client packets.
 </summary>
@@ -54840,7 +54924,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71650">
+<interface name="corenet_receive_ricci_client_packets" lineno="71668">
 <summary>
 Receive ricci_client packets.
 </summary>
@@ -54851,7 +54935,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71669">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687">
 <summary>
 Do not audit attempts to receive ricci_client packets.
 </summary>
@@ -54862,7 +54946,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71688">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706">
 <summary>
 Send and receive ricci_client packets.
 </summary>
@@ -54873,7 +54957,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71704">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722">
 <summary>
 Do not audit attempts to send and receive ricci_client packets.
 </summary>
@@ -54884,7 +54968,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71719">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="71737">
 <summary>
 Relabel packets to ricci_client the packet type.
 </summary>
@@ -54894,7 +54978,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71739">
+<interface name="corenet_send_ricci_server_packets" lineno="71757">
 <summary>
 Send ricci_server packets.
 </summary>
@@ -54905,7 +54989,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71758">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776">
 <summary>
 Do not audit attempts to send ricci_server packets.
 </summary>
@@ -54916,7 +55000,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71777">
+<interface name="corenet_receive_ricci_server_packets" lineno="71795">
 <summary>
 Receive ricci_server packets.
 </summary>
@@ -54927,7 +55011,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71796">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814">
 <summary>
 Do not audit attempts to receive ricci_server packets.
 </summary>
@@ -54938,7 +55022,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71815">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833">
 <summary>
 Send and receive ricci_server packets.
 </summary>
@@ -54949,7 +55033,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71831">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849">
 <summary>
 Do not audit attempts to send and receive ricci_server packets.
 </summary>
@@ -54960,7 +55044,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71846">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="71864">
 <summary>
 Relabel packets to ricci_server the packet type.
 </summary>
@@ -54970,7 +55054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71868">
+<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886">
 <summary>
 Send and receive TCP traffic on the ricci_modcluster port.
 </summary>
@@ -54981,7 +55065,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71883">
+<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901">
 <summary>
 Send UDP traffic on the ricci_modcluster port.
 </summary>
@@ -54992,7 +55076,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71898">
+<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916">
 <summary>
 Do not audit attempts to send UDP traffic on the ricci_modcluster port.
 </summary>
@@ -55003,7 +55087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71913">
+<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931">
 <summary>
 Receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -55014,7 +55098,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71928">
+<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946">
 <summary>
 Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -55025,7 +55109,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71943">
+<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961">
 <summary>
 Send and receive UDP traffic on the ricci_modcluster port.
 </summary>
@@ -55036,7 +55120,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71959">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ricci_modcluster port.
@@ -55048,7 +55132,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71974">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992">
 <summary>
 Bind TCP sockets to the ricci_modcluster port.
 </summary>
@@ -55059,7 +55143,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71994">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012">
 <summary>
 Bind UDP sockets to the ricci_modcluster port.
 </summary>
@@ -55070,7 +55154,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72013">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031">
 <summary>
 Make a TCP connection to the ricci_modcluster port.
 </summary>
@@ -55080,7 +55164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72033">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051">
 <summary>
 Send ricci_modcluster_client packets.
 </summary>
@@ -55091,7 +55175,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72052">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070">
 <summary>
 Do not audit attempts to send ricci_modcluster_client packets.
 </summary>
@@ -55102,7 +55186,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72071">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089">
 <summary>
 Receive ricci_modcluster_client packets.
 </summary>
@@ -55113,7 +55197,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72090">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108">
 <summary>
 Do not audit attempts to receive ricci_modcluster_client packets.
 </summary>
@@ -55124,7 +55208,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72109">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127">
 <summary>
 Send and receive ricci_modcluster_client packets.
 </summary>
@@ -55135,7 +55219,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72125">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_client packets.
 </summary>
@@ -55146,7 +55230,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72140">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158">
 <summary>
 Relabel packets to ricci_modcluster_client the packet type.
 </summary>
@@ -55156,7 +55240,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72160">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178">
 <summary>
 Send ricci_modcluster_server packets.
 </summary>
@@ -55167,7 +55251,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72179">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197">
 <summary>
 Do not audit attempts to send ricci_modcluster_server packets.
 </summary>
@@ -55178,7 +55262,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72198">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216">
 <summary>
 Receive ricci_modcluster_server packets.
 </summary>
@@ -55189,7 +55273,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72217">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235">
 <summary>
 Do not audit attempts to receive ricci_modcluster_server packets.
 </summary>
@@ -55200,7 +55284,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72236">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254">
 <summary>
 Send and receive ricci_modcluster_server packets.
 </summary>
@@ -55211,7 +55295,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72252">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_server packets.
 </summary>
@@ -55222,7 +55306,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72267">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285">
 <summary>
 Relabel packets to ricci_modcluster_server the packet type.
 </summary>
@@ -55232,7 +55316,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72289">
+<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307">
 <summary>
 Send and receive TCP traffic on the rlogind port.
 </summary>
@@ -55243,7 +55327,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="72304">
+<interface name="corenet_udp_send_rlogind_port" lineno="72322">
 <summary>
 Send UDP traffic on the rlogind port.
 </summary>
@@ -55254,7 +55338,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72319">
+<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337">
 <summary>
 Do not audit attempts to send UDP traffic on the rlogind port.
 </summary>
@@ -55265,7 +55349,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="72334">
+<interface name="corenet_udp_receive_rlogind_port" lineno="72352">
 <summary>
 Receive UDP traffic on the rlogind port.
 </summary>
@@ -55276,7 +55360,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72349">
+<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367">
 <summary>
 Do not audit attempts to receive UDP traffic on the rlogind port.
 </summary>
@@ -55287,7 +55371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72364">
+<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382">
 <summary>
 Send and receive UDP traffic on the rlogind port.
 </summary>
@@ -55298,7 +55382,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72380">
+<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rlogind port.
@@ -55310,7 +55394,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="72395">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="72413">
 <summary>
 Bind TCP sockets to the rlogind port.
 </summary>
@@ -55321,7 +55405,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="72415">
+<interface name="corenet_udp_bind_rlogind_port" lineno="72433">
 <summary>
 Bind UDP sockets to the rlogind port.
 </summary>
@@ -55332,7 +55416,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="72434">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="72452">
 <summary>
 Make a TCP connection to the rlogind port.
 </summary>
@@ -55342,7 +55426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="72454">
+<interface name="corenet_send_rlogind_client_packets" lineno="72472">
 <summary>
 Send rlogind_client packets.
 </summary>
@@ -55353,7 +55437,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72473">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491">
 <summary>
 Do not audit attempts to send rlogind_client packets.
 </summary>
@@ -55364,7 +55448,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="72492">
+<interface name="corenet_receive_rlogind_client_packets" lineno="72510">
 <summary>
 Receive rlogind_client packets.
 </summary>
@@ -55375,7 +55459,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72511">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529">
 <summary>
 Do not audit attempts to receive rlogind_client packets.
 </summary>
@@ -55386,7 +55470,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72530">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548">
 <summary>
 Send and receive rlogind_client packets.
 </summary>
@@ -55397,7 +55481,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72546">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564">
 <summary>
 Do not audit attempts to send and receive rlogind_client packets.
 </summary>
@@ -55408,7 +55492,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72561">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579">
 <summary>
 Relabel packets to rlogind_client the packet type.
 </summary>
@@ -55418,7 +55502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72581">
+<interface name="corenet_send_rlogind_server_packets" lineno="72599">
 <summary>
 Send rlogind_server packets.
 </summary>
@@ -55429,7 +55513,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72600">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618">
 <summary>
 Do not audit attempts to send rlogind_server packets.
 </summary>
@@ -55440,7 +55524,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72619">
+<interface name="corenet_receive_rlogind_server_packets" lineno="72637">
 <summary>
 Receive rlogind_server packets.
 </summary>
@@ -55451,7 +55535,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72638">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656">
 <summary>
 Do not audit attempts to receive rlogind_server packets.
 </summary>
@@ -55462,7 +55546,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72657">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675">
 <summary>
 Send and receive rlogind_server packets.
 </summary>
@@ -55473,7 +55557,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72673">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691">
 <summary>
 Do not audit attempts to send and receive rlogind_server packets.
 </summary>
@@ -55484,7 +55568,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72688">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706">
 <summary>
 Relabel packets to rlogind_server the packet type.
 </summary>
@@ -55494,7 +55578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72710">
+<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728">
 <summary>
 Send and receive TCP traffic on the rndc port.
 </summary>
@@ -55505,7 +55589,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72725">
+<interface name="corenet_udp_send_rndc_port" lineno="72743">
 <summary>
 Send UDP traffic on the rndc port.
 </summary>
@@ -55516,7 +55600,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72740">
+<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758">
 <summary>
 Do not audit attempts to send UDP traffic on the rndc port.
 </summary>
@@ -55527,7 +55611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72755">
+<interface name="corenet_udp_receive_rndc_port" lineno="72773">
 <summary>
 Receive UDP traffic on the rndc port.
 </summary>
@@ -55538,7 +55622,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72770">
+<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788">
 <summary>
 Do not audit attempts to receive UDP traffic on the rndc port.
 </summary>
@@ -55549,7 +55633,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72785">
+<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803">
 <summary>
 Send and receive UDP traffic on the rndc port.
 </summary>
@@ -55560,7 +55644,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72801">
+<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rndc port.
@@ -55572,7 +55656,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72816">
+<interface name="corenet_tcp_bind_rndc_port" lineno="72834">
 <summary>
 Bind TCP sockets to the rndc port.
 </summary>
@@ -55583,7 +55667,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72836">
+<interface name="corenet_udp_bind_rndc_port" lineno="72854">
 <summary>
 Bind UDP sockets to the rndc port.
 </summary>
@@ -55594,7 +55678,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72855">
+<interface name="corenet_tcp_connect_rndc_port" lineno="72873">
 <summary>
 Make a TCP connection to the rndc port.
 </summary>
@@ -55604,7 +55688,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72875">
+<interface name="corenet_send_rndc_client_packets" lineno="72893">
 <summary>
 Send rndc_client packets.
 </summary>
@@ -55615,7 +55699,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72894">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912">
 <summary>
 Do not audit attempts to send rndc_client packets.
 </summary>
@@ -55626,7 +55710,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72913">
+<interface name="corenet_receive_rndc_client_packets" lineno="72931">
 <summary>
 Receive rndc_client packets.
 </summary>
@@ -55637,7 +55721,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72932">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950">
 <summary>
 Do not audit attempts to receive rndc_client packets.
 </summary>
@@ -55648,7 +55732,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72951">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969">
 <summary>
 Send and receive rndc_client packets.
 </summary>
@@ -55659,7 +55743,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72967">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985">
 <summary>
 Do not audit attempts to send and receive rndc_client packets.
 </summary>
@@ -55670,7 +55754,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="72982">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="73000">
 <summary>
 Relabel packets to rndc_client the packet type.
 </summary>
@@ -55680,7 +55764,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_server_packets" lineno="73002">
+<interface name="corenet_send_rndc_server_packets" lineno="73020">
 <summary>
 Send rndc_server packets.
 </summary>
@@ -55691,7 +55775,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73021">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039">
 <summary>
 Do not audit attempts to send rndc_server packets.
 </summary>
@@ -55702,7 +55786,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="73040">
+<interface name="corenet_receive_rndc_server_packets" lineno="73058">
 <summary>
 Receive rndc_server packets.
 </summary>
@@ -55713,7 +55797,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73059">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077">
 <summary>
 Do not audit attempts to receive rndc_server packets.
 </summary>
@@ -55724,7 +55808,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="73078">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096">
 <summary>
 Send and receive rndc_server packets.
 </summary>
@@ -55735,7 +55819,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73094">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112">
 <summary>
 Do not audit attempts to send and receive rndc_server packets.
 </summary>
@@ -55746,7 +55830,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="73109">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="73127">
 <summary>
 Relabel packets to rndc_server the packet type.
 </summary>
@@ -55756,7 +55840,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="73131">
+<interface name="corenet_tcp_sendrecv_router_port" lineno="73149">
 <summary>
 Send and receive TCP traffic on the router port.
 </summary>
@@ -55767,7 +55851,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_router_port" lineno="73146">
+<interface name="corenet_udp_send_router_port" lineno="73164">
 <summary>
 Send UDP traffic on the router port.
 </summary>
@@ -55778,7 +55862,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="73161">
+<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179">
 <summary>
 Do not audit attempts to send UDP traffic on the router port.
 </summary>
@@ -55789,7 +55873,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_router_port" lineno="73176">
+<interface name="corenet_udp_receive_router_port" lineno="73194">
 <summary>
 Receive UDP traffic on the router port.
 </summary>
@@ -55800,7 +55884,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73191">
+<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209">
 <summary>
 Do not audit attempts to receive UDP traffic on the router port.
 </summary>
@@ -55811,7 +55895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="73206">
+<interface name="corenet_udp_sendrecv_router_port" lineno="73224">
 <summary>
 Send and receive UDP traffic on the router port.
 </summary>
@@ -55822,7 +55906,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73222">
+<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the router port.
@@ -55834,7 +55918,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_router_port" lineno="73237">
+<interface name="corenet_tcp_bind_router_port" lineno="73255">
 <summary>
 Bind TCP sockets to the router port.
 </summary>
@@ -55845,7 +55929,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_router_port" lineno="73257">
+<interface name="corenet_udp_bind_router_port" lineno="73275">
 <summary>
 Bind UDP sockets to the router port.
 </summary>
@@ -55856,7 +55940,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_router_port" lineno="73276">
+<interface name="corenet_tcp_connect_router_port" lineno="73294">
 <summary>
 Make a TCP connection to the router port.
 </summary>
@@ -55866,7 +55950,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_client_packets" lineno="73296">
+<interface name="corenet_send_router_client_packets" lineno="73314">
 <summary>
 Send router_client packets.
 </summary>
@@ -55877,7 +55961,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="73315">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333">
 <summary>
 Do not audit attempts to send router_client packets.
 </summary>
@@ -55888,7 +55972,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_client_packets" lineno="73334">
+<interface name="corenet_receive_router_client_packets" lineno="73352">
 <summary>
 Receive router_client packets.
 </summary>
@@ -55899,7 +55983,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73353">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371">
 <summary>
 Do not audit attempts to receive router_client packets.
 </summary>
@@ -55910,7 +55994,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="73372">
+<interface name="corenet_sendrecv_router_client_packets" lineno="73390">
 <summary>
 Send and receive router_client packets.
 </summary>
@@ -55921,7 +56005,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73388">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406">
 <summary>
 Do not audit attempts to send and receive router_client packets.
 </summary>
@@ -55932,7 +56016,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="73403">
+<interface name="corenet_relabelto_router_client_packets" lineno="73421">
 <summary>
 Relabel packets to router_client the packet type.
 </summary>
@@ -55942,7 +56026,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_server_packets" lineno="73423">
+<interface name="corenet_send_router_server_packets" lineno="73441">
 <summary>
 Send router_server packets.
 </summary>
@@ -55953,7 +56037,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="73442">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460">
 <summary>
 Do not audit attempts to send router_server packets.
 </summary>
@@ -55964,7 +56048,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_server_packets" lineno="73461">
+<interface name="corenet_receive_router_server_packets" lineno="73479">
 <summary>
 Receive router_server packets.
 </summary>
@@ -55975,7 +56059,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73480">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498">
 <summary>
 Do not audit attempts to receive router_server packets.
 </summary>
@@ -55986,7 +56070,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="73499">
+<interface name="corenet_sendrecv_router_server_packets" lineno="73517">
 <summary>
 Send and receive router_server packets.
 </summary>
@@ -55997,7 +56081,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73515">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533">
 <summary>
 Do not audit attempts to send and receive router_server packets.
 </summary>
@@ -56008,7 +56092,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="73530">
+<interface name="corenet_relabelto_router_server_packets" lineno="73548">
 <summary>
 Relabel packets to router_server the packet type.
 </summary>
@@ -56018,7 +56102,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73552">
+<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570">
 <summary>
 Send and receive TCP traffic on the rsh port.
 </summary>
@@ -56029,7 +56113,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73567">
+<interface name="corenet_udp_send_rsh_port" lineno="73585">
 <summary>
 Send UDP traffic on the rsh port.
 </summary>
@@ -56040,7 +56124,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73582">
+<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600">
 <summary>
 Do not audit attempts to send UDP traffic on the rsh port.
 </summary>
@@ -56051,7 +56135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73597">
+<interface name="corenet_udp_receive_rsh_port" lineno="73615">
 <summary>
 Receive UDP traffic on the rsh port.
 </summary>
@@ -56062,7 +56146,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73612">
+<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630">
 <summary>
 Do not audit attempts to receive UDP traffic on the rsh port.
 </summary>
@@ -56073,7 +56157,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73627">
+<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645">
 <summary>
 Send and receive UDP traffic on the rsh port.
 </summary>
@@ -56084,7 +56168,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73643">
+<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rsh port.
@@ -56096,7 +56180,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73658">
+<interface name="corenet_tcp_bind_rsh_port" lineno="73676">
 <summary>
 Bind TCP sockets to the rsh port.
 </summary>
@@ -56107,7 +56191,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73678">
+<interface name="corenet_udp_bind_rsh_port" lineno="73696">
 <summary>
 Bind UDP sockets to the rsh port.
 </summary>
@@ -56118,7 +56202,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73697">
+<interface name="corenet_tcp_connect_rsh_port" lineno="73715">
 <summary>
 Make a TCP connection to the rsh port.
 </summary>
@@ -56128,7 +56212,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73717">
+<interface name="corenet_send_rsh_client_packets" lineno="73735">
 <summary>
 Send rsh_client packets.
 </summary>
@@ -56139,7 +56223,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73736">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754">
 <summary>
 Do not audit attempts to send rsh_client packets.
 </summary>
@@ -56150,7 +56234,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73755">
+<interface name="corenet_receive_rsh_client_packets" lineno="73773">
 <summary>
 Receive rsh_client packets.
 </summary>
@@ -56161,7 +56245,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73774">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792">
 <summary>
 Do not audit attempts to receive rsh_client packets.
 </summary>
@@ -56172,7 +56256,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73793">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811">
 <summary>
 Send and receive rsh_client packets.
 </summary>
@@ -56183,7 +56267,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73809">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827">
 <summary>
 Do not audit attempts to send and receive rsh_client packets.
 </summary>
@@ -56194,7 +56278,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73824">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="73842">
 <summary>
 Relabel packets to rsh_client the packet type.
 </summary>
@@ -56204,7 +56288,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73844">
+<interface name="corenet_send_rsh_server_packets" lineno="73862">
 <summary>
 Send rsh_server packets.
 </summary>
@@ -56215,7 +56299,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73863">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881">
 <summary>
 Do not audit attempts to send rsh_server packets.
 </summary>
@@ -56226,7 +56310,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73882">
+<interface name="corenet_receive_rsh_server_packets" lineno="73900">
 <summary>
 Receive rsh_server packets.
 </summary>
@@ -56237,7 +56321,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73901">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919">
 <summary>
 Do not audit attempts to receive rsh_server packets.
 </summary>
@@ -56248,7 +56332,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73920">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938">
 <summary>
 Send and receive rsh_server packets.
 </summary>
@@ -56259,7 +56343,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73936">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954">
 <summary>
 Do not audit attempts to send and receive rsh_server packets.
 </summary>
@@ -56270,7 +56354,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73951">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="73969">
 <summary>
 Relabel packets to rsh_server the packet type.
 </summary>
@@ -56280,7 +56364,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73973">
+<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991">
 <summary>
 Send and receive TCP traffic on the rsync port.
 </summary>
@@ -56291,7 +56375,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rsync_port" lineno="73988">
+<interface name="corenet_udp_send_rsync_port" lineno="74006">
 <summary>
 Send UDP traffic on the rsync port.
 </summary>
@@ -56302,7 +56386,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74003">
+<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021">
 <summary>
 Do not audit attempts to send UDP traffic on the rsync port.
 </summary>
@@ -56313,7 +56397,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="74018">
+<interface name="corenet_udp_receive_rsync_port" lineno="74036">
 <summary>
 Receive UDP traffic on the rsync port.
 </summary>
@@ -56324,7 +56408,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74033">
+<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051">
 <summary>
 Do not audit attempts to receive UDP traffic on the rsync port.
 </summary>
@@ -56335,7 +56419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="74048">
+<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066">
 <summary>
 Send and receive UDP traffic on the rsync port.
 </summary>
@@ -56346,7 +56430,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74064">
+<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rsync port.
@@ -56358,7 +56442,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="74079">
+<interface name="corenet_tcp_bind_rsync_port" lineno="74097">
 <summary>
 Bind TCP sockets to the rsync port.
 </summary>
@@ -56369,7 +56453,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="74099">
+<interface name="corenet_udp_bind_rsync_port" lineno="74117">
 <summary>
 Bind UDP sockets to the rsync port.
 </summary>
@@ -56380,7 +56464,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="74118">
+<interface name="corenet_tcp_connect_rsync_port" lineno="74136">
 <summary>
 Make a TCP connection to the rsync port.
 </summary>
@@ -56390,7 +56474,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_client_packets" lineno="74138">
+<interface name="corenet_send_rsync_client_packets" lineno="74156">
 <summary>
 Send rsync_client packets.
 </summary>
@@ -56401,7 +56485,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74157">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175">
 <summary>
 Do not audit attempts to send rsync_client packets.
 </summary>
@@ -56412,7 +56496,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="74176">
+<interface name="corenet_receive_rsync_client_packets" lineno="74194">
 <summary>
 Receive rsync_client packets.
 </summary>
@@ -56423,7 +56507,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74195">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213">
 <summary>
 Do not audit attempts to receive rsync_client packets.
 </summary>
@@ -56434,7 +56518,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="74214">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232">
 <summary>
 Send and receive rsync_client packets.
 </summary>
@@ -56445,7 +56529,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74230">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248">
 <summary>
 Do not audit attempts to send and receive rsync_client packets.
 </summary>
@@ -56456,7 +56540,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="74245">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="74263">
 <summary>
 Relabel packets to rsync_client the packet type.
 </summary>
@@ -56466,7 +56550,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_server_packets" lineno="74265">
+<interface name="corenet_send_rsync_server_packets" lineno="74283">
 <summary>
 Send rsync_server packets.
 </summary>
@@ -56477,7 +56561,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74284">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302">
 <summary>
 Do not audit attempts to send rsync_server packets.
 </summary>
@@ -56488,7 +56572,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="74303">
+<interface name="corenet_receive_rsync_server_packets" lineno="74321">
 <summary>
 Receive rsync_server packets.
 </summary>
@@ -56499,7 +56583,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74322">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340">
 <summary>
 Do not audit attempts to receive rsync_server packets.
 </summary>
@@ -56510,7 +56594,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="74341">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359">
 <summary>
 Send and receive rsync_server packets.
 </summary>
@@ -56521,7 +56605,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74357">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375">
 <summary>
 Do not audit attempts to send and receive rsync_server packets.
 </summary>
@@ -56532,7 +56616,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="74372">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="74390">
 <summary>
 Relabel packets to rsync_server the packet type.
 </summary>
@@ -56542,7 +56626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74394">
+<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412">
 <summary>
 Send and receive TCP traffic on the rtorrent port.
 </summary>
@@ -56553,7 +56637,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="74409">
+<interface name="corenet_udp_send_rtorrent_port" lineno="74427">
 <summary>
 Send UDP traffic on the rtorrent port.
 </summary>
@@ -56564,7 +56648,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74424">
+<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442">
 <summary>
 Do not audit attempts to send UDP traffic on the rtorrent port.
 </summary>
@@ -56575,7 +56659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="74439">
+<interface name="corenet_udp_receive_rtorrent_port" lineno="74457">
 <summary>
 Receive UDP traffic on the rtorrent port.
 </summary>
@@ -56586,7 +56670,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74454">
+<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472">
 <summary>
 Do not audit attempts to receive UDP traffic on the rtorrent port.
 </summary>
@@ -56597,7 +56681,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74469">
+<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487">
 <summary>
 Send and receive UDP traffic on the rtorrent port.
 </summary>
@@ -56608,7 +56692,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74485">
+<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rtorrent port.
@@ -56620,7 +56704,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="74500">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518">
 <summary>
 Bind TCP sockets to the rtorrent port.
 </summary>
@@ -56631,7 +56715,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="74520">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="74538">
 <summary>
 Bind UDP sockets to the rtorrent port.
 </summary>
@@ -56642,7 +56726,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="74539">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557">
 <summary>
 Make a TCP connection to the rtorrent port.
 </summary>
@@ -56652,7 +56736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74559">
+<interface name="corenet_send_rtorrent_client_packets" lineno="74577">
 <summary>
 Send rtorrent_client packets.
 </summary>
@@ -56663,7 +56747,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74578">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596">
 <summary>
 Do not audit attempts to send rtorrent_client packets.
 </summary>
@@ -56674,7 +56758,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74597">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="74615">
 <summary>
 Receive rtorrent_client packets.
 </summary>
@@ -56685,7 +56769,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74616">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634">
 <summary>
 Do not audit attempts to receive rtorrent_client packets.
 </summary>
@@ -56696,7 +56780,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74635">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653">
 <summary>
 Send and receive rtorrent_client packets.
 </summary>
@@ -56707,7 +56791,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74651">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669">
 <summary>
 Do not audit attempts to send and receive rtorrent_client packets.
 </summary>
@@ -56718,7 +56802,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74666">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684">
 <summary>
 Relabel packets to rtorrent_client the packet type.
 </summary>
@@ -56728,7 +56812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74686">
+<interface name="corenet_send_rtorrent_server_packets" lineno="74704">
 <summary>
 Send rtorrent_server packets.
 </summary>
@@ -56739,7 +56823,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74705">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723">
 <summary>
 Do not audit attempts to send rtorrent_server packets.
 </summary>
@@ -56750,7 +56834,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74724">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="74742">
 <summary>
 Receive rtorrent_server packets.
 </summary>
@@ -56761,7 +56845,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74743">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761">
 <summary>
 Do not audit attempts to receive rtorrent_server packets.
 </summary>
@@ -56772,7 +56856,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74762">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780">
 <summary>
 Send and receive rtorrent_server packets.
 </summary>
@@ -56783,7 +56867,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74778">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796">
 <summary>
 Do not audit attempts to send and receive rtorrent_server packets.
 </summary>
@@ -56794,7 +56878,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74793">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811">
 <summary>
 Relabel packets to rtorrent_server the packet type.
 </summary>
@@ -56804,7 +56888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74815">
+<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833">
 <summary>
 Send and receive TCP traffic on the rtsp port.
 </summary>
@@ -56815,7 +56899,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74830">
+<interface name="corenet_udp_send_rtsp_port" lineno="74848">
 <summary>
 Send UDP traffic on the rtsp port.
 </summary>
@@ -56826,7 +56910,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74845">
+<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863">
 <summary>
 Do not audit attempts to send UDP traffic on the rtsp port.
 </summary>
@@ -56837,7 +56921,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74860">
+<interface name="corenet_udp_receive_rtsp_port" lineno="74878">
 <summary>
 Receive UDP traffic on the rtsp port.
 </summary>
@@ -56848,7 +56932,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74875">
+<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893">
 <summary>
 Do not audit attempts to receive UDP traffic on the rtsp port.
 </summary>
@@ -56859,7 +56943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74890">
+<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908">
 <summary>
 Send and receive UDP traffic on the rtsp port.
 </summary>
@@ -56870,7 +56954,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74906">
+<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rtsp port.
@@ -56882,7 +56966,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74921">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="74939">
 <summary>
 Bind TCP sockets to the rtsp port.
 </summary>
@@ -56893,7 +56977,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74941">
+<interface name="corenet_udp_bind_rtsp_port" lineno="74959">
 <summary>
 Bind UDP sockets to the rtsp port.
 </summary>
@@ -56904,7 +56988,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74960">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="74978">
 <summary>
 Make a TCP connection to the rtsp port.
 </summary>
@@ -56914,7 +56998,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74980">
+<interface name="corenet_send_rtsp_client_packets" lineno="74998">
 <summary>
 Send rtsp_client packets.
 </summary>
@@ -56925,7 +57009,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74999">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017">
 <summary>
 Do not audit attempts to send rtsp_client packets.
 </summary>
@@ -56936,7 +57020,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="75018">
+<interface name="corenet_receive_rtsp_client_packets" lineno="75036">
 <summary>
 Receive rtsp_client packets.
 </summary>
@@ -56947,7 +57031,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75037">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055">
 <summary>
 Do not audit attempts to receive rtsp_client packets.
 </summary>
@@ -56958,7 +57042,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75056">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074">
 <summary>
 Send and receive rtsp_client packets.
 </summary>
@@ -56969,7 +57053,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75072">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090">
 <summary>
 Do not audit attempts to send and receive rtsp_client packets.
 </summary>
@@ -56980,7 +57064,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="75087">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105">
 <summary>
 Relabel packets to rtsp_client the packet type.
 </summary>
@@ -56990,7 +57074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="75107">
+<interface name="corenet_send_rtsp_server_packets" lineno="75125">
 <summary>
 Send rtsp_server packets.
 </summary>
@@ -57001,7 +57085,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75126">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144">
 <summary>
 Do not audit attempts to send rtsp_server packets.
 </summary>
@@ -57012,7 +57096,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="75145">
+<interface name="corenet_receive_rtsp_server_packets" lineno="75163">
 <summary>
 Receive rtsp_server packets.
 </summary>
@@ -57023,7 +57107,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75164">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182">
 <summary>
 Do not audit attempts to receive rtsp_server packets.
 </summary>
@@ -57034,7 +57118,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75183">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201">
 <summary>
 Send and receive rtsp_server packets.
 </summary>
@@ -57045,7 +57129,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75199">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217">
 <summary>
 Do not audit attempts to send and receive rtsp_server packets.
 </summary>
@@ -57056,7 +57140,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="75214">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232">
 <summary>
 Relabel packets to rtsp_server the packet type.
 </summary>
@@ -57066,7 +57150,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75236">
+<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254">
 <summary>
 Send and receive TCP traffic on the rwho port.
 </summary>
@@ -57077,7 +57161,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_rwho_port" lineno="75251">
+<interface name="corenet_udp_send_rwho_port" lineno="75269">
 <summary>
 Send UDP traffic on the rwho port.
 </summary>
@@ -57088,7 +57172,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75266">
+<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284">
 <summary>
 Do not audit attempts to send UDP traffic on the rwho port.
 </summary>
@@ -57099,7 +57183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="75281">
+<interface name="corenet_udp_receive_rwho_port" lineno="75299">
 <summary>
 Receive UDP traffic on the rwho port.
 </summary>
@@ -57110,7 +57194,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75296">
+<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314">
 <summary>
 Do not audit attempts to receive UDP traffic on the rwho port.
 </summary>
@@ -57121,7 +57205,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="75311">
+<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329">
 <summary>
 Send and receive UDP traffic on the rwho port.
 </summary>
@@ -57132,7 +57216,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75327">
+<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the rwho port.
@@ -57144,7 +57228,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="75342">
+<interface name="corenet_tcp_bind_rwho_port" lineno="75360">
 <summary>
 Bind TCP sockets to the rwho port.
 </summary>
@@ -57155,7 +57239,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="75362">
+<interface name="corenet_udp_bind_rwho_port" lineno="75380">
 <summary>
 Bind UDP sockets to the rwho port.
 </summary>
@@ -57166,7 +57250,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="75381">
+<interface name="corenet_tcp_connect_rwho_port" lineno="75399">
 <summary>
 Make a TCP connection to the rwho port.
 </summary>
@@ -57176,7 +57260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_client_packets" lineno="75401">
+<interface name="corenet_send_rwho_client_packets" lineno="75419">
 <summary>
 Send rwho_client packets.
 </summary>
@@ -57187,7 +57271,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75420">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438">
 <summary>
 Do not audit attempts to send rwho_client packets.
 </summary>
@@ -57198,7 +57282,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="75439">
+<interface name="corenet_receive_rwho_client_packets" lineno="75457">
 <summary>
 Receive rwho_client packets.
 </summary>
@@ -57209,7 +57293,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75458">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476">
 <summary>
 Do not audit attempts to receive rwho_client packets.
 </summary>
@@ -57220,7 +57304,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="75477">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495">
 <summary>
 Send and receive rwho_client packets.
 </summary>
@@ -57231,7 +57315,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75493">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511">
 <summary>
 Do not audit attempts to send and receive rwho_client packets.
 </summary>
@@ -57242,7 +57326,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="75508">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="75526">
 <summary>
 Relabel packets to rwho_client the packet type.
 </summary>
@@ -57252,7 +57336,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_server_packets" lineno="75528">
+<interface name="corenet_send_rwho_server_packets" lineno="75546">
 <summary>
 Send rwho_server packets.
 </summary>
@@ -57263,7 +57347,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75547">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565">
 <summary>
 Do not audit attempts to send rwho_server packets.
 </summary>
@@ -57274,7 +57358,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75566">
+<interface name="corenet_receive_rwho_server_packets" lineno="75584">
 <summary>
 Receive rwho_server packets.
 </summary>
@@ -57285,7 +57369,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75585">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603">
 <summary>
 Do not audit attempts to receive rwho_server packets.
 </summary>
@@ -57296,7 +57380,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75604">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622">
 <summary>
 Send and receive rwho_server packets.
 </summary>
@@ -57307,7 +57391,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75620">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638">
 <summary>
 Do not audit attempts to send and receive rwho_server packets.
 </summary>
@@ -57318,7 +57402,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75635">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="75653">
 <summary>
 Relabel packets to rwho_server the packet type.
 </summary>
@@ -57328,7 +57412,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75657">
+<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675">
 <summary>
 Send and receive TCP traffic on the salt port.
 </summary>
@@ -57339,7 +57423,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_salt_port" lineno="75672">
+<interface name="corenet_udp_send_salt_port" lineno="75690">
 <summary>
 Send UDP traffic on the salt port.
 </summary>
@@ -57350,7 +57434,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75687">
+<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705">
 <summary>
 Do not audit attempts to send UDP traffic on the salt port.
 </summary>
@@ -57361,7 +57445,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75702">
+<interface name="corenet_udp_receive_salt_port" lineno="75720">
 <summary>
 Receive UDP traffic on the salt port.
 </summary>
@@ -57372,7 +57456,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75717">
+<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735">
 <summary>
 Do not audit attempts to receive UDP traffic on the salt port.
 </summary>
@@ -57383,7 +57467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75732">
+<interface name="corenet_udp_sendrecv_salt_port" lineno="75750">
 <summary>
 Send and receive UDP traffic on the salt port.
 </summary>
@@ -57394,7 +57478,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75748">
+<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the salt port.
@@ -57406,7 +57490,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75763">
+<interface name="corenet_tcp_bind_salt_port" lineno="75781">
 <summary>
 Bind TCP sockets to the salt port.
 </summary>
@@ -57417,7 +57501,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75783">
+<interface name="corenet_udp_bind_salt_port" lineno="75801">
 <summary>
 Bind UDP sockets to the salt port.
 </summary>
@@ -57428,7 +57512,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75802">
+<interface name="corenet_tcp_connect_salt_port" lineno="75820">
 <summary>
 Make a TCP connection to the salt port.
 </summary>
@@ -57438,7 +57522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_client_packets" lineno="75822">
+<interface name="corenet_send_salt_client_packets" lineno="75840">
 <summary>
 Send salt_client packets.
 </summary>
@@ -57449,7 +57533,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75841">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859">
 <summary>
 Do not audit attempts to send salt_client packets.
 </summary>
@@ -57460,7 +57544,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75860">
+<interface name="corenet_receive_salt_client_packets" lineno="75878">
 <summary>
 Receive salt_client packets.
 </summary>
@@ -57471,7 +57555,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75879">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897">
 <summary>
 Do not audit attempts to receive salt_client packets.
 </summary>
@@ -57482,7 +57566,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75898">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="75916">
 <summary>
 Send and receive salt_client packets.
 </summary>
@@ -57493,7 +57577,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75914">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932">
 <summary>
 Do not audit attempts to send and receive salt_client packets.
 </summary>
@@ -57504,7 +57588,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75929">
+<interface name="corenet_relabelto_salt_client_packets" lineno="75947">
 <summary>
 Relabel packets to salt_client the packet type.
 </summary>
@@ -57514,7 +57598,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_server_packets" lineno="75949">
+<interface name="corenet_send_salt_server_packets" lineno="75967">
 <summary>
 Send salt_server packets.
 </summary>
@@ -57525,7 +57609,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75968">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986">
 <summary>
 Do not audit attempts to send salt_server packets.
 </summary>
@@ -57536,7 +57620,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_server_packets" lineno="75987">
+<interface name="corenet_receive_salt_server_packets" lineno="76005">
 <summary>
 Receive salt_server packets.
 </summary>
@@ -57547,7 +57631,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76006">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024">
 <summary>
 Do not audit attempts to receive salt_server packets.
 </summary>
@@ -57558,7 +57642,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="76025">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="76043">
 <summary>
 Send and receive salt_server packets.
 </summary>
@@ -57569,7 +57653,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76041">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059">
 <summary>
 Do not audit attempts to send and receive salt_server packets.
 </summary>
@@ -57580,7 +57664,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="76056">
+<interface name="corenet_relabelto_salt_server_packets" lineno="76074">
 <summary>
 Relabel packets to salt_server the packet type.
 </summary>
@@ -57590,7 +57674,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="76078">
+<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096">
 <summary>
 Send and receive TCP traffic on the sap port.
 </summary>
@@ -57601,7 +57685,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sap_port" lineno="76093">
+<interface name="corenet_udp_send_sap_port" lineno="76111">
 <summary>
 Send UDP traffic on the sap port.
 </summary>
@@ -57612,7 +57696,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76108">
+<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126">
 <summary>
 Do not audit attempts to send UDP traffic on the sap port.
 </summary>
@@ -57623,7 +57707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sap_port" lineno="76123">
+<interface name="corenet_udp_receive_sap_port" lineno="76141">
 <summary>
 Receive UDP traffic on the sap port.
 </summary>
@@ -57634,7 +57718,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76138">
+<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156">
 <summary>
 Do not audit attempts to receive UDP traffic on the sap port.
 </summary>
@@ -57645,7 +57729,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="76153">
+<interface name="corenet_udp_sendrecv_sap_port" lineno="76171">
 <summary>
 Send and receive UDP traffic on the sap port.
 </summary>
@@ -57656,7 +57740,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76169">
+<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sap port.
@@ -57668,7 +57752,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="76184">
+<interface name="corenet_tcp_bind_sap_port" lineno="76202">
 <summary>
 Bind TCP sockets to the sap port.
 </summary>
@@ -57679,7 +57763,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sap_port" lineno="76204">
+<interface name="corenet_udp_bind_sap_port" lineno="76222">
 <summary>
 Bind UDP sockets to the sap port.
 </summary>
@@ -57690,7 +57774,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="76223">
+<interface name="corenet_tcp_connect_sap_port" lineno="76241">
 <summary>
 Make a TCP connection to the sap port.
 </summary>
@@ -57700,7 +57784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_client_packets" lineno="76243">
+<interface name="corenet_send_sap_client_packets" lineno="76261">
 <summary>
 Send sap_client packets.
 </summary>
@@ -57711,7 +57795,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76262">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280">
 <summary>
 Do not audit attempts to send sap_client packets.
 </summary>
@@ -57722,7 +57806,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_client_packets" lineno="76281">
+<interface name="corenet_receive_sap_client_packets" lineno="76299">
 <summary>
 Receive sap_client packets.
 </summary>
@@ -57733,7 +57817,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76300">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318">
 <summary>
 Do not audit attempts to receive sap_client packets.
 </summary>
@@ -57744,7 +57828,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="76319">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="76337">
 <summary>
 Send and receive sap_client packets.
 </summary>
@@ -57755,7 +57839,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76335">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353">
 <summary>
 Do not audit attempts to send and receive sap_client packets.
 </summary>
@@ -57766,7 +57850,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="76350">
+<interface name="corenet_relabelto_sap_client_packets" lineno="76368">
 <summary>
 Relabel packets to sap_client the packet type.
 </summary>
@@ -57776,7 +57860,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_server_packets" lineno="76370">
+<interface name="corenet_send_sap_server_packets" lineno="76388">
 <summary>
 Send sap_server packets.
 </summary>
@@ -57787,7 +57871,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76389">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407">
 <summary>
 Do not audit attempts to send sap_server packets.
 </summary>
@@ -57798,7 +57882,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_server_packets" lineno="76408">
+<interface name="corenet_receive_sap_server_packets" lineno="76426">
 <summary>
 Receive sap_server packets.
 </summary>
@@ -57809,7 +57893,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76427">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445">
 <summary>
 Do not audit attempts to receive sap_server packets.
 </summary>
@@ -57820,7 +57904,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="76446">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="76464">
 <summary>
 Send and receive sap_server packets.
 </summary>
@@ -57831,7 +57915,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76462">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480">
 <summary>
 Do not audit attempts to send and receive sap_server packets.
 </summary>
@@ -57842,7 +57926,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="76477">
+<interface name="corenet_relabelto_sap_server_packets" lineno="76495">
 <summary>
 Relabel packets to sap_server the packet type.
 </summary>
@@ -57852,7 +57936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76499">
+<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517">
 <summary>
 Send and receive TCP traffic on the servistaitsm port.
 </summary>
@@ -57863,7 +57947,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="76514">
+<interface name="corenet_udp_send_servistaitsm_port" lineno="76532">
 <summary>
 Send UDP traffic on the servistaitsm port.
 </summary>
@@ -57874,7 +57958,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76529">
+<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547">
 <summary>
 Do not audit attempts to send UDP traffic on the servistaitsm port.
 </summary>
@@ -57885,7 +57969,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76544">
+<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562">
 <summary>
 Receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57896,7 +57980,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76559">
+<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577">
 <summary>
 Do not audit attempts to receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57907,7 +57991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76574">
+<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592">
 <summary>
 Send and receive UDP traffic on the servistaitsm port.
 </summary>
@@ -57918,7 +58002,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76590">
+<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the servistaitsm port.
@@ -57930,7 +58014,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76605">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623">
 <summary>
 Bind TCP sockets to the servistaitsm port.
 </summary>
@@ -57941,7 +58025,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76625">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643">
 <summary>
 Bind UDP sockets to the servistaitsm port.
 </summary>
@@ -57952,7 +58036,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76644">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662">
 <summary>
 Make a TCP connection to the servistaitsm port.
 </summary>
@@ -57962,7 +58046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76664">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="76682">
 <summary>
 Send servistaitsm_client packets.
 </summary>
@@ -57973,7 +58057,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76683">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701">
 <summary>
 Do not audit attempts to send servistaitsm_client packets.
 </summary>
@@ -57984,7 +58068,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76702">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720">
 <summary>
 Receive servistaitsm_client packets.
 </summary>
@@ -57995,7 +58079,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76721">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739">
 <summary>
 Do not audit attempts to receive servistaitsm_client packets.
 </summary>
@@ -58006,7 +58090,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76740">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758">
 <summary>
 Send and receive servistaitsm_client packets.
 </summary>
@@ -58017,7 +58101,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76756">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774">
 <summary>
 Do not audit attempts to send and receive servistaitsm_client packets.
 </summary>
@@ -58028,7 +58112,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76771">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789">
 <summary>
 Relabel packets to servistaitsm_client the packet type.
 </summary>
@@ -58038,7 +58122,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76791">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="76809">
 <summary>
 Send servistaitsm_server packets.
 </summary>
@@ -58049,7 +58133,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76810">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828">
 <summary>
 Do not audit attempts to send servistaitsm_server packets.
 </summary>
@@ -58060,7 +58144,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76829">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847">
 <summary>
 Receive servistaitsm_server packets.
 </summary>
@@ -58071,7 +58155,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76848">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866">
 <summary>
 Do not audit attempts to receive servistaitsm_server packets.
 </summary>
@@ -58082,7 +58166,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76867">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885">
 <summary>
 Send and receive servistaitsm_server packets.
 </summary>
@@ -58093,7 +58177,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76883">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901">
 <summary>
 Do not audit attempts to send and receive servistaitsm_server packets.
 </summary>
@@ -58104,7 +58188,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76898">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916">
 <summary>
 Relabel packets to servistaitsm_server the packet type.
 </summary>
@@ -58114,7 +58198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76920">
+<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938">
 <summary>
 Send and receive TCP traffic on the sieve port.
 </summary>
@@ -58125,7 +58209,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76935">
+<interface name="corenet_udp_send_sieve_port" lineno="76953">
 <summary>
 Send UDP traffic on the sieve port.
 </summary>
@@ -58136,7 +58220,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76950">
+<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968">
 <summary>
 Do not audit attempts to send UDP traffic on the sieve port.
 </summary>
@@ -58147,7 +58231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76965">
+<interface name="corenet_udp_receive_sieve_port" lineno="76983">
 <summary>
 Receive UDP traffic on the sieve port.
 </summary>
@@ -58158,7 +58242,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76980">
+<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998">
 <summary>
 Do not audit attempts to receive UDP traffic on the sieve port.
 </summary>
@@ -58169,7 +58253,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="76995">
+<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013">
 <summary>
 Send and receive UDP traffic on the sieve port.
 </summary>
@@ -58180,7 +58264,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77011">
+<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sieve port.
@@ -58192,7 +58276,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="77026">
+<interface name="corenet_tcp_bind_sieve_port" lineno="77044">
 <summary>
 Bind TCP sockets to the sieve port.
 </summary>
@@ -58203,7 +58287,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="77046">
+<interface name="corenet_udp_bind_sieve_port" lineno="77064">
 <summary>
 Bind UDP sockets to the sieve port.
 </summary>
@@ -58214,7 +58298,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="77065">
+<interface name="corenet_tcp_connect_sieve_port" lineno="77083">
 <summary>
 Make a TCP connection to the sieve port.
 </summary>
@@ -58224,7 +58308,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_client_packets" lineno="77085">
+<interface name="corenet_send_sieve_client_packets" lineno="77103">
 <summary>
 Send sieve_client packets.
 </summary>
@@ -58235,7 +58319,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77104">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122">
 <summary>
 Do not audit attempts to send sieve_client packets.
 </summary>
@@ -58246,7 +58330,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="77123">
+<interface name="corenet_receive_sieve_client_packets" lineno="77141">
 <summary>
 Receive sieve_client packets.
 </summary>
@@ -58257,7 +58341,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77142">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160">
 <summary>
 Do not audit attempts to receive sieve_client packets.
 </summary>
@@ -58268,7 +58352,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="77161">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179">
 <summary>
 Send and receive sieve_client packets.
 </summary>
@@ -58279,7 +58363,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77177">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195">
 <summary>
 Do not audit attempts to send and receive sieve_client packets.
 </summary>
@@ -58290,7 +58374,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="77192">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="77210">
 <summary>
 Relabel packets to sieve_client the packet type.
 </summary>
@@ -58300,7 +58384,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_server_packets" lineno="77212">
+<interface name="corenet_send_sieve_server_packets" lineno="77230">
 <summary>
 Send sieve_server packets.
 </summary>
@@ -58311,7 +58395,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77231">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249">
 <summary>
 Do not audit attempts to send sieve_server packets.
 </summary>
@@ -58322,7 +58406,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="77250">
+<interface name="corenet_receive_sieve_server_packets" lineno="77268">
 <summary>
 Receive sieve_server packets.
 </summary>
@@ -58333,7 +58417,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77269">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287">
 <summary>
 Do not audit attempts to receive sieve_server packets.
 </summary>
@@ -58344,7 +58428,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="77288">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306">
 <summary>
 Send and receive sieve_server packets.
 </summary>
@@ -58355,7 +58439,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77304">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322">
 <summary>
 Do not audit attempts to send and receive sieve_server packets.
 </summary>
@@ -58366,7 +58450,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="77319">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="77337">
 <summary>
 Relabel packets to sieve_server the packet type.
 </summary>
@@ -58376,7 +58460,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="77341">
+<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359">
 <summary>
 Send and receive TCP traffic on the sip port.
 </summary>
@@ -58387,7 +58471,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sip_port" lineno="77356">
+<interface name="corenet_udp_send_sip_port" lineno="77374">
 <summary>
 Send UDP traffic on the sip port.
 </summary>
@@ -58398,7 +58482,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77371">
+<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389">
 <summary>
 Do not audit attempts to send UDP traffic on the sip port.
 </summary>
@@ -58409,7 +58493,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sip_port" lineno="77386">
+<interface name="corenet_udp_receive_sip_port" lineno="77404">
 <summary>
 Receive UDP traffic on the sip port.
 </summary>
@@ -58420,7 +58504,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77401">
+<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419">
 <summary>
 Do not audit attempts to receive UDP traffic on the sip port.
 </summary>
@@ -58431,7 +58515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="77416">
+<interface name="corenet_udp_sendrecv_sip_port" lineno="77434">
 <summary>
 Send and receive UDP traffic on the sip port.
 </summary>
@@ -58442,7 +58526,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77432">
+<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sip port.
@@ -58454,7 +58538,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="77447">
+<interface name="corenet_tcp_bind_sip_port" lineno="77465">
 <summary>
 Bind TCP sockets to the sip port.
 </summary>
@@ -58465,7 +58549,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sip_port" lineno="77467">
+<interface name="corenet_udp_bind_sip_port" lineno="77485">
 <summary>
 Bind UDP sockets to the sip port.
 </summary>
@@ -58476,7 +58560,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="77486">
+<interface name="corenet_tcp_connect_sip_port" lineno="77504">
 <summary>
 Make a TCP connection to the sip port.
 </summary>
@@ -58486,7 +58570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_client_packets" lineno="77506">
+<interface name="corenet_send_sip_client_packets" lineno="77524">
 <summary>
 Send sip_client packets.
 </summary>
@@ -58497,7 +58581,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77525">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543">
 <summary>
 Do not audit attempts to send sip_client packets.
 </summary>
@@ -58508,7 +58592,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77544">
+<interface name="corenet_receive_sip_client_packets" lineno="77562">
 <summary>
 Receive sip_client packets.
 </summary>
@@ -58519,7 +58603,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77563">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581">
 <summary>
 Do not audit attempts to receive sip_client packets.
 </summary>
@@ -58530,7 +58614,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77582">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="77600">
 <summary>
 Send and receive sip_client packets.
 </summary>
@@ -58541,7 +58625,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77598">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616">
 <summary>
 Do not audit attempts to send and receive sip_client packets.
 </summary>
@@ -58552,7 +58636,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77613">
+<interface name="corenet_relabelto_sip_client_packets" lineno="77631">
 <summary>
 Relabel packets to sip_client the packet type.
 </summary>
@@ -58562,7 +58646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_server_packets" lineno="77633">
+<interface name="corenet_send_sip_server_packets" lineno="77651">
 <summary>
 Send sip_server packets.
 </summary>
@@ -58573,7 +58657,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77652">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670">
 <summary>
 Do not audit attempts to send sip_server packets.
 </summary>
@@ -58584,7 +58668,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77671">
+<interface name="corenet_receive_sip_server_packets" lineno="77689">
 <summary>
 Receive sip_server packets.
 </summary>
@@ -58595,7 +58679,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77690">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708">
 <summary>
 Do not audit attempts to receive sip_server packets.
 </summary>
@@ -58606,7 +58690,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77709">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="77727">
 <summary>
 Send and receive sip_server packets.
 </summary>
@@ -58617,7 +58701,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77725">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743">
 <summary>
 Do not audit attempts to send and receive sip_server packets.
 </summary>
@@ -58628,7 +58712,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77740">
+<interface name="corenet_relabelto_sip_server_packets" lineno="77758">
 <summary>
 Relabel packets to sip_server the packet type.
 </summary>
@@ -58638,7 +58722,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77762">
+<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780">
 <summary>
 Send and receive TCP traffic on the sixxsconfig port.
 </summary>
@@ -58649,7 +58733,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77777">
+<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795">
 <summary>
 Send UDP traffic on the sixxsconfig port.
 </summary>
@@ -58660,7 +58744,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77792">
+<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810">
 <summary>
 Do not audit attempts to send UDP traffic on the sixxsconfig port.
 </summary>
@@ -58671,7 +58755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77807">
+<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825">
 <summary>
 Receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58682,7 +58766,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77822">
+<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840">
 <summary>
 Do not audit attempts to receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58693,7 +58777,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77837">
+<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855">
 <summary>
 Send and receive UDP traffic on the sixxsconfig port.
 </summary>
@@ -58704,7 +58788,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77853">
+<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sixxsconfig port.
@@ -58716,7 +58800,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77868">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886">
 <summary>
 Bind TCP sockets to the sixxsconfig port.
 </summary>
@@ -58727,7 +58811,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77888">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906">
 <summary>
 Bind UDP sockets to the sixxsconfig port.
 </summary>
@@ -58738,7 +58822,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77907">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925">
 <summary>
 Make a TCP connection to the sixxsconfig port.
 </summary>
@@ -58748,7 +58832,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77927">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945">
 <summary>
 Send sixxsconfig_client packets.
 </summary>
@@ -58759,7 +58843,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77946">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964">
 <summary>
 Do not audit attempts to send sixxsconfig_client packets.
 </summary>
@@ -58770,7 +58854,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77965">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983">
 <summary>
 Receive sixxsconfig_client packets.
 </summary>
@@ -58781,7 +58865,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77984">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002">
 <summary>
 Do not audit attempts to receive sixxsconfig_client packets.
 </summary>
@@ -58792,7 +58876,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78003">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021">
 <summary>
 Send and receive sixxsconfig_client packets.
 </summary>
@@ -58803,7 +58887,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78019">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_client packets.
 </summary>
@@ -58814,7 +58898,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78034">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052">
 <summary>
 Relabel packets to sixxsconfig_client the packet type.
 </summary>
@@ -58824,7 +58908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="78054">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072">
 <summary>
 Send sixxsconfig_server packets.
 </summary>
@@ -58835,7 +58919,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78073">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091">
 <summary>
 Do not audit attempts to send sixxsconfig_server packets.
 </summary>
@@ -58846,7 +58930,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78092">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110">
 <summary>
 Receive sixxsconfig_server packets.
 </summary>
@@ -58857,7 +58941,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78111">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129">
 <summary>
 Do not audit attempts to receive sixxsconfig_server packets.
 </summary>
@@ -58868,7 +58952,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78130">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148">
 <summary>
 Send and receive sixxsconfig_server packets.
 </summary>
@@ -58879,7 +58963,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78146">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_server packets.
 </summary>
@@ -58890,7 +58974,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78161">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179">
 <summary>
 Relabel packets to sixxsconfig_server the packet type.
 </summary>
@@ -58900,7 +58984,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78183">
+<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201">
 <summary>
 Send and receive TCP traffic on the smbd port.
 </summary>
@@ -58911,7 +58995,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_smbd_port" lineno="78198">
+<interface name="corenet_udp_send_smbd_port" lineno="78216">
 <summary>
 Send UDP traffic on the smbd port.
 </summary>
@@ -58922,7 +59006,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78213">
+<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231">
 <summary>
 Do not audit attempts to send UDP traffic on the smbd port.
 </summary>
@@ -58933,7 +59017,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="78228">
+<interface name="corenet_udp_receive_smbd_port" lineno="78246">
 <summary>
 Receive UDP traffic on the smbd port.
 </summary>
@@ -58944,7 +59028,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78243">
+<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261">
 <summary>
 Do not audit attempts to receive UDP traffic on the smbd port.
 </summary>
@@ -58955,7 +59039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="78258">
+<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276">
 <summary>
 Send and receive UDP traffic on the smbd port.
 </summary>
@@ -58966,7 +59050,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78274">
+<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the smbd port.
@@ -58978,7 +59062,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="78289">
+<interface name="corenet_tcp_bind_smbd_port" lineno="78307">
 <summary>
 Bind TCP sockets to the smbd port.
 </summary>
@@ -58989,7 +59073,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="78309">
+<interface name="corenet_udp_bind_smbd_port" lineno="78327">
 <summary>
 Bind UDP sockets to the smbd port.
 </summary>
@@ -59000,7 +59084,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="78328">
+<interface name="corenet_tcp_connect_smbd_port" lineno="78346">
 <summary>
 Make a TCP connection to the smbd port.
 </summary>
@@ -59010,7 +59094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_client_packets" lineno="78348">
+<interface name="corenet_send_smbd_client_packets" lineno="78366">
 <summary>
 Send smbd_client packets.
 </summary>
@@ -59021,7 +59105,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78367">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385">
 <summary>
 Do not audit attempts to send smbd_client packets.
 </summary>
@@ -59032,7 +59116,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="78386">
+<interface name="corenet_receive_smbd_client_packets" lineno="78404">
 <summary>
 Receive smbd_client packets.
 </summary>
@@ -59043,7 +59127,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78405">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423">
 <summary>
 Do not audit attempts to receive smbd_client packets.
 </summary>
@@ -59054,7 +59138,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="78424">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442">
 <summary>
 Send and receive smbd_client packets.
 </summary>
@@ -59065,7 +59149,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78440">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458">
 <summary>
 Do not audit attempts to send and receive smbd_client packets.
 </summary>
@@ -59076,7 +59160,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="78455">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="78473">
 <summary>
 Relabel packets to smbd_client the packet type.
 </summary>
@@ -59086,7 +59170,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_server_packets" lineno="78475">
+<interface name="corenet_send_smbd_server_packets" lineno="78493">
 <summary>
 Send smbd_server packets.
 </summary>
@@ -59097,7 +59181,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78494">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512">
 <summary>
 Do not audit attempts to send smbd_server packets.
 </summary>
@@ -59108,7 +59192,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="78513">
+<interface name="corenet_receive_smbd_server_packets" lineno="78531">
 <summary>
 Receive smbd_server packets.
 </summary>
@@ -59119,7 +59203,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78532">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550">
 <summary>
 Do not audit attempts to receive smbd_server packets.
 </summary>
@@ -59130,7 +59214,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78551">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569">
 <summary>
 Send and receive smbd_server packets.
 </summary>
@@ -59141,7 +59225,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78567">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585">
 <summary>
 Do not audit attempts to send and receive smbd_server packets.
 </summary>
@@ -59152,7 +59236,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78582">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="78600">
 <summary>
 Relabel packets to smbd_server the packet type.
 </summary>
@@ -59162,7 +59246,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78604">
+<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622">
 <summary>
 Send and receive TCP traffic on the smtp port.
 </summary>
@@ -59173,7 +59257,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78619">
+<interface name="corenet_udp_send_smtp_port" lineno="78637">
 <summary>
 Send UDP traffic on the smtp port.
 </summary>
@@ -59184,7 +59268,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78634">
+<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652">
 <summary>
 Do not audit attempts to send UDP traffic on the smtp port.
 </summary>
@@ -59195,7 +59279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78649">
+<interface name="corenet_udp_receive_smtp_port" lineno="78667">
 <summary>
 Receive UDP traffic on the smtp port.
 </summary>
@@ -59206,7 +59290,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78664">
+<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682">
 <summary>
 Do not audit attempts to receive UDP traffic on the smtp port.
 </summary>
@@ -59217,7 +59301,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78679">
+<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697">
 <summary>
 Send and receive UDP traffic on the smtp port.
 </summary>
@@ -59228,7 +59312,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78695">
+<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the smtp port.
@@ -59240,7 +59324,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78710">
+<interface name="corenet_tcp_bind_smtp_port" lineno="78728">
 <summary>
 Bind TCP sockets to the smtp port.
 </summary>
@@ -59251,7 +59335,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78730">
+<interface name="corenet_udp_bind_smtp_port" lineno="78748">
 <summary>
 Bind UDP sockets to the smtp port.
 </summary>
@@ -59262,7 +59346,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78749">
+<interface name="corenet_tcp_connect_smtp_port" lineno="78767">
 <summary>
 Make a TCP connection to the smtp port.
 </summary>
@@ -59272,7 +59356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78769">
+<interface name="corenet_send_smtp_client_packets" lineno="78787">
 <summary>
 Send smtp_client packets.
 </summary>
@@ -59283,7 +59367,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78788">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806">
 <summary>
 Do not audit attempts to send smtp_client packets.
 </summary>
@@ -59294,7 +59378,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78807">
+<interface name="corenet_receive_smtp_client_packets" lineno="78825">
 <summary>
 Receive smtp_client packets.
 </summary>
@@ -59305,7 +59389,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78826">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844">
 <summary>
 Do not audit attempts to receive smtp_client packets.
 </summary>
@@ -59316,7 +59400,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78845">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863">
 <summary>
 Send and receive smtp_client packets.
 </summary>
@@ -59327,7 +59411,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78861">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879">
 <summary>
 Do not audit attempts to send and receive smtp_client packets.
 </summary>
@@ -59338,7 +59422,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78876">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="78894">
 <summary>
 Relabel packets to smtp_client the packet type.
 </summary>
@@ -59348,7 +59432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78896">
+<interface name="corenet_send_smtp_server_packets" lineno="78914">
 <summary>
 Send smtp_server packets.
 </summary>
@@ -59359,7 +59443,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78915">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933">
 <summary>
 Do not audit attempts to send smtp_server packets.
 </summary>
@@ -59370,7 +59454,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78934">
+<interface name="corenet_receive_smtp_server_packets" lineno="78952">
 <summary>
 Receive smtp_server packets.
 </summary>
@@ -59381,7 +59465,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78953">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971">
 <summary>
 Do not audit attempts to receive smtp_server packets.
 </summary>
@@ -59392,7 +59476,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78972">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990">
 <summary>
 Send and receive smtp_server packets.
 </summary>
@@ -59403,7 +59487,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78988">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006">
 <summary>
 Do not audit attempts to send and receive smtp_server packets.
 </summary>
@@ -59414,7 +59498,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="79003">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="79021">
 <summary>
 Relabel packets to smtp_server the packet type.
 </summary>
@@ -59424,7 +59508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79025">
+<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043">
 <summary>
 Send and receive TCP traffic on the snmp port.
 </summary>
@@ -59435,7 +59519,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_snmp_port" lineno="79040">
+<interface name="corenet_udp_send_snmp_port" lineno="79058">
 <summary>
 Send UDP traffic on the snmp port.
 </summary>
@@ -59446,7 +59530,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79055">
+<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073">
 <summary>
 Do not audit attempts to send UDP traffic on the snmp port.
 </summary>
@@ -59457,7 +59541,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="79070">
+<interface name="corenet_udp_receive_snmp_port" lineno="79088">
 <summary>
 Receive UDP traffic on the snmp port.
 </summary>
@@ -59468,7 +59552,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79085">
+<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103">
 <summary>
 Do not audit attempts to receive UDP traffic on the snmp port.
 </summary>
@@ -59479,7 +59563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="79100">
+<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118">
 <summary>
 Send and receive UDP traffic on the snmp port.
 </summary>
@@ -59490,7 +59574,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79116">
+<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the snmp port.
@@ -59502,7 +59586,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="79131">
+<interface name="corenet_tcp_bind_snmp_port" lineno="79149">
 <summary>
 Bind TCP sockets to the snmp port.
 </summary>
@@ -59513,7 +59597,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="79151">
+<interface name="corenet_udp_bind_snmp_port" lineno="79169">
 <summary>
 Bind UDP sockets to the snmp port.
 </summary>
@@ -59524,7 +59608,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="79170">
+<interface name="corenet_tcp_connect_snmp_port" lineno="79188">
 <summary>
 Make a TCP connection to the snmp port.
 </summary>
@@ -59534,7 +59618,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_client_packets" lineno="79190">
+<interface name="corenet_send_snmp_client_packets" lineno="79208">
 <summary>
 Send snmp_client packets.
 </summary>
@@ -59545,7 +59629,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79209">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227">
 <summary>
 Do not audit attempts to send snmp_client packets.
 </summary>
@@ -59556,7 +59640,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="79228">
+<interface name="corenet_receive_snmp_client_packets" lineno="79246">
 <summary>
 Receive snmp_client packets.
 </summary>
@@ -59567,7 +59651,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79247">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265">
 <summary>
 Do not audit attempts to receive snmp_client packets.
 </summary>
@@ -59578,7 +59662,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="79266">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284">
 <summary>
 Send and receive snmp_client packets.
 </summary>
@@ -59589,7 +59673,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79282">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300">
 <summary>
 Do not audit attempts to send and receive snmp_client packets.
 </summary>
@@ -59600,7 +59684,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="79297">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="79315">
 <summary>
 Relabel packets to snmp_client the packet type.
 </summary>
@@ -59610,7 +59694,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_server_packets" lineno="79317">
+<interface name="corenet_send_snmp_server_packets" lineno="79335">
 <summary>
 Send snmp_server packets.
 </summary>
@@ -59621,7 +59705,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79336">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354">
 <summary>
 Do not audit attempts to send snmp_server packets.
 </summary>
@@ -59632,7 +59716,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="79355">
+<interface name="corenet_receive_snmp_server_packets" lineno="79373">
 <summary>
 Receive snmp_server packets.
 </summary>
@@ -59643,7 +59727,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79374">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392">
 <summary>
 Do not audit attempts to receive snmp_server packets.
 </summary>
@@ -59654,7 +59738,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="79393">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411">
 <summary>
 Send and receive snmp_server packets.
 </summary>
@@ -59665,7 +59749,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79409">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427">
 <summary>
 Do not audit attempts to send and receive snmp_server packets.
 </summary>
@@ -59676,7 +59760,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="79424">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="79442">
 <summary>
 Relabel packets to snmp_server the packet type.
 </summary>
@@ -59686,7 +59770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="79446">
+<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464">
 <summary>
 Send and receive TCP traffic on the socks port.
 </summary>
@@ -59697,7 +59781,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_socks_port" lineno="79461">
+<interface name="corenet_udp_send_socks_port" lineno="79479">
 <summary>
 Send UDP traffic on the socks port.
 </summary>
@@ -59708,7 +59792,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79476">
+<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494">
 <summary>
 Do not audit attempts to send UDP traffic on the socks port.
 </summary>
@@ -59719,7 +59803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_socks_port" lineno="79491">
+<interface name="corenet_udp_receive_socks_port" lineno="79509">
 <summary>
 Receive UDP traffic on the socks port.
 </summary>
@@ -59730,7 +59814,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79506">
+<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524">
 <summary>
 Do not audit attempts to receive UDP traffic on the socks port.
 </summary>
@@ -59741,7 +59825,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="79521">
+<interface name="corenet_udp_sendrecv_socks_port" lineno="79539">
 <summary>
 Send and receive UDP traffic on the socks port.
 </summary>
@@ -59752,7 +59836,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79537">
+<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the socks port.
@@ -59764,7 +59848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79552">
+<interface name="corenet_tcp_bind_socks_port" lineno="79570">
 <summary>
 Bind TCP sockets to the socks port.
 </summary>
@@ -59775,7 +59859,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79572">
+<interface name="corenet_udp_bind_socks_port" lineno="79590">
 <summary>
 Bind UDP sockets to the socks port.
 </summary>
@@ -59786,7 +59870,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79591">
+<interface name="corenet_tcp_connect_socks_port" lineno="79609">
 <summary>
 Make a TCP connection to the socks port.
 </summary>
@@ -59796,7 +59880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_client_packets" lineno="79611">
+<interface name="corenet_send_socks_client_packets" lineno="79629">
 <summary>
 Send socks_client packets.
 </summary>
@@ -59807,7 +59891,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79630">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648">
 <summary>
 Do not audit attempts to send socks_client packets.
 </summary>
@@ -59818,7 +59902,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79649">
+<interface name="corenet_receive_socks_client_packets" lineno="79667">
 <summary>
 Receive socks_client packets.
 </summary>
@@ -59829,7 +59913,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79668">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686">
 <summary>
 Do not audit attempts to receive socks_client packets.
 </summary>
@@ -59840,7 +59924,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79687">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="79705">
 <summary>
 Send and receive socks_client packets.
 </summary>
@@ -59851,7 +59935,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79703">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721">
 <summary>
 Do not audit attempts to send and receive socks_client packets.
 </summary>
@@ -59862,7 +59946,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79718">
+<interface name="corenet_relabelto_socks_client_packets" lineno="79736">
 <summary>
 Relabel packets to socks_client the packet type.
 </summary>
@@ -59872,7 +59956,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_server_packets" lineno="79738">
+<interface name="corenet_send_socks_server_packets" lineno="79756">
 <summary>
 Send socks_server packets.
 </summary>
@@ -59883,7 +59967,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79757">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775">
 <summary>
 Do not audit attempts to send socks_server packets.
 </summary>
@@ -59894,7 +59978,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79776">
+<interface name="corenet_receive_socks_server_packets" lineno="79794">
 <summary>
 Receive socks_server packets.
 </summary>
@@ -59905,7 +59989,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79795">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813">
 <summary>
 Do not audit attempts to receive socks_server packets.
 </summary>
@@ -59916,7 +60000,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79814">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="79832">
 <summary>
 Send and receive socks_server packets.
 </summary>
@@ -59927,7 +60011,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79830">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848">
 <summary>
 Do not audit attempts to send and receive socks_server packets.
 </summary>
@@ -59938,7 +60022,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79845">
+<interface name="corenet_relabelto_socks_server_packets" lineno="79863">
 <summary>
 Relabel packets to socks_server the packet type.
 </summary>
@@ -59948,7 +60032,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79867">
+<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885">
 <summary>
 Send and receive TCP traffic on the soundd port.
 </summary>
@@ -59959,7 +60043,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79882">
+<interface name="corenet_udp_send_soundd_port" lineno="79900">
 <summary>
 Send UDP traffic on the soundd port.
 </summary>
@@ -59970,7 +60054,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79897">
+<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915">
 <summary>
 Do not audit attempts to send UDP traffic on the soundd port.
 </summary>
@@ -59981,7 +60065,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79912">
+<interface name="corenet_udp_receive_soundd_port" lineno="79930">
 <summary>
 Receive UDP traffic on the soundd port.
 </summary>
@@ -59992,7 +60076,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79927">
+<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945">
 <summary>
 Do not audit attempts to receive UDP traffic on the soundd port.
 </summary>
@@ -60003,7 +60087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79942">
+<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960">
 <summary>
 Send and receive UDP traffic on the soundd port.
 </summary>
@@ -60014,7 +60098,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79958">
+<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the soundd port.
@@ -60026,7 +60110,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79973">
+<interface name="corenet_tcp_bind_soundd_port" lineno="79991">
 <summary>
 Bind TCP sockets to the soundd port.
 </summary>
@@ -60037,7 +60121,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="79993">
+<interface name="corenet_udp_bind_soundd_port" lineno="80011">
 <summary>
 Bind UDP sockets to the soundd port.
 </summary>
@@ -60048,7 +60132,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="80012">
+<interface name="corenet_tcp_connect_soundd_port" lineno="80030">
 <summary>
 Make a TCP connection to the soundd port.
 </summary>
@@ -60058,7 +60142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_client_packets" lineno="80032">
+<interface name="corenet_send_soundd_client_packets" lineno="80050">
 <summary>
 Send soundd_client packets.
 </summary>
@@ -60069,7 +60153,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80051">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069">
 <summary>
 Do not audit attempts to send soundd_client packets.
 </summary>
@@ -60080,7 +60164,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="80070">
+<interface name="corenet_receive_soundd_client_packets" lineno="80088">
 <summary>
 Receive soundd_client packets.
 </summary>
@@ -60091,7 +60175,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80089">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107">
 <summary>
 Do not audit attempts to receive soundd_client packets.
 </summary>
@@ -60102,7 +60186,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="80108">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126">
 <summary>
 Send and receive soundd_client packets.
 </summary>
@@ -60113,7 +60197,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80124">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142">
 <summary>
 Do not audit attempts to send and receive soundd_client packets.
 </summary>
@@ -60124,7 +60208,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="80139">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="80157">
 <summary>
 Relabel packets to soundd_client the packet type.
 </summary>
@@ -60134,7 +60218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_server_packets" lineno="80159">
+<interface name="corenet_send_soundd_server_packets" lineno="80177">
 <summary>
 Send soundd_server packets.
 </summary>
@@ -60145,7 +60229,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80178">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196">
 <summary>
 Do not audit attempts to send soundd_server packets.
 </summary>
@@ -60156,7 +60240,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="80197">
+<interface name="corenet_receive_soundd_server_packets" lineno="80215">
 <summary>
 Receive soundd_server packets.
 </summary>
@@ -60167,7 +60251,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80216">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234">
 <summary>
 Do not audit attempts to receive soundd_server packets.
 </summary>
@@ -60178,7 +60262,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="80235">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253">
 <summary>
 Send and receive soundd_server packets.
 </summary>
@@ -60189,7 +60273,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80251">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269">
 <summary>
 Do not audit attempts to send and receive soundd_server packets.
 </summary>
@@ -60200,7 +60284,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="80266">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="80284">
 <summary>
 Relabel packets to soundd_server the packet type.
 </summary>
@@ -60210,7 +60294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80288">
+<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306">
 <summary>
 Send and receive TCP traffic on the spamd port.
 </summary>
@@ -60221,7 +60305,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_spamd_port" lineno="80303">
+<interface name="corenet_udp_send_spamd_port" lineno="80321">
 <summary>
 Send UDP traffic on the spamd port.
 </summary>
@@ -60232,7 +60316,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80318">
+<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336">
 <summary>
 Do not audit attempts to send UDP traffic on the spamd port.
 </summary>
@@ -60243,7 +60327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="80333">
+<interface name="corenet_udp_receive_spamd_port" lineno="80351">
 <summary>
 Receive UDP traffic on the spamd port.
 </summary>
@@ -60254,7 +60338,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80348">
+<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366">
 <summary>
 Do not audit attempts to receive UDP traffic on the spamd port.
 </summary>
@@ -60265,7 +60349,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="80363">
+<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381">
 <summary>
 Send and receive UDP traffic on the spamd port.
 </summary>
@@ -60276,7 +60360,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80379">
+<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the spamd port.
@@ -60288,7 +60372,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="80394">
+<interface name="corenet_tcp_bind_spamd_port" lineno="80412">
 <summary>
 Bind TCP sockets to the spamd port.
 </summary>
@@ -60299,7 +60383,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="80414">
+<interface name="corenet_udp_bind_spamd_port" lineno="80432">
 <summary>
 Bind UDP sockets to the spamd port.
 </summary>
@@ -60310,7 +60394,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="80433">
+<interface name="corenet_tcp_connect_spamd_port" lineno="80451">
 <summary>
 Make a TCP connection to the spamd port.
 </summary>
@@ -60320,7 +60404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_client_packets" lineno="80453">
+<interface name="corenet_send_spamd_client_packets" lineno="80471">
 <summary>
 Send spamd_client packets.
 </summary>
@@ -60331,7 +60415,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80472">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490">
 <summary>
 Do not audit attempts to send spamd_client packets.
 </summary>
@@ -60342,7 +60426,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="80491">
+<interface name="corenet_receive_spamd_client_packets" lineno="80509">
 <summary>
 Receive spamd_client packets.
 </summary>
@@ -60353,7 +60437,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80510">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528">
 <summary>
 Do not audit attempts to receive spamd_client packets.
 </summary>
@@ -60364,7 +60448,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="80529">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547">
 <summary>
 Send and receive spamd_client packets.
 </summary>
@@ -60375,7 +60459,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80545">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563">
 <summary>
 Do not audit attempts to send and receive spamd_client packets.
 </summary>
@@ -60386,7 +60470,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80560">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="80578">
 <summary>
 Relabel packets to spamd_client the packet type.
 </summary>
@@ -60396,7 +60480,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80580">
+<interface name="corenet_send_spamd_server_packets" lineno="80598">
 <summary>
 Send spamd_server packets.
 </summary>
@@ -60407,7 +60491,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80599">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617">
 <summary>
 Do not audit attempts to send spamd_server packets.
 </summary>
@@ -60418,7 +60502,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80618">
+<interface name="corenet_receive_spamd_server_packets" lineno="80636">
 <summary>
 Receive spamd_server packets.
 </summary>
@@ -60429,7 +60513,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80637">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655">
 <summary>
 Do not audit attempts to receive spamd_server packets.
 </summary>
@@ -60440,7 +60524,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80656">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674">
 <summary>
 Send and receive spamd_server packets.
 </summary>
@@ -60451,7 +60535,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80672">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690">
 <summary>
 Do not audit attempts to send and receive spamd_server packets.
 </summary>
@@ -60462,7 +60546,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80687">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="80705">
 <summary>
 Relabel packets to spamd_server the packet type.
 </summary>
@@ -60472,7 +60556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80709">
+<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727">
 <summary>
 Send and receive TCP traffic on the speech port.
 </summary>
@@ -60483,7 +60567,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_speech_port" lineno="80724">
+<interface name="corenet_udp_send_speech_port" lineno="80742">
 <summary>
 Send UDP traffic on the speech port.
 </summary>
@@ -60494,7 +60578,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80739">
+<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757">
 <summary>
 Do not audit attempts to send UDP traffic on the speech port.
 </summary>
@@ -60505,7 +60589,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80754">
+<interface name="corenet_udp_receive_speech_port" lineno="80772">
 <summary>
 Receive UDP traffic on the speech port.
 </summary>
@@ -60516,7 +60600,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80769">
+<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787">
 <summary>
 Do not audit attempts to receive UDP traffic on the speech port.
 </summary>
@@ -60527,7 +60611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80784">
+<interface name="corenet_udp_sendrecv_speech_port" lineno="80802">
 <summary>
 Send and receive UDP traffic on the speech port.
 </summary>
@@ -60538,7 +60622,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80800">
+<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the speech port.
@@ -60550,7 +60634,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80815">
+<interface name="corenet_tcp_bind_speech_port" lineno="80833">
 <summary>
 Bind TCP sockets to the speech port.
 </summary>
@@ -60561,7 +60645,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80835">
+<interface name="corenet_udp_bind_speech_port" lineno="80853">
 <summary>
 Bind UDP sockets to the speech port.
 </summary>
@@ -60572,7 +60656,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80854">
+<interface name="corenet_tcp_connect_speech_port" lineno="80872">
 <summary>
 Make a TCP connection to the speech port.
 </summary>
@@ -60582,7 +60666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_client_packets" lineno="80874">
+<interface name="corenet_send_speech_client_packets" lineno="80892">
 <summary>
 Send speech_client packets.
 </summary>
@@ -60593,7 +60677,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80893">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911">
 <summary>
 Do not audit attempts to send speech_client packets.
 </summary>
@@ -60604,7 +60688,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80912">
+<interface name="corenet_receive_speech_client_packets" lineno="80930">
 <summary>
 Receive speech_client packets.
 </summary>
@@ -60615,7 +60699,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80931">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949">
 <summary>
 Do not audit attempts to receive speech_client packets.
 </summary>
@@ -60626,7 +60710,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80950">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="80968">
 <summary>
 Send and receive speech_client packets.
 </summary>
@@ -60637,7 +60721,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80966">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984">
 <summary>
 Do not audit attempts to send and receive speech_client packets.
 </summary>
@@ -60648,7 +60732,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80981">
+<interface name="corenet_relabelto_speech_client_packets" lineno="80999">
 <summary>
 Relabel packets to speech_client the packet type.
 </summary>
@@ -60658,7 +60742,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_server_packets" lineno="81001">
+<interface name="corenet_send_speech_server_packets" lineno="81019">
 <summary>
 Send speech_server packets.
 </summary>
@@ -60669,7 +60753,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81020">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038">
 <summary>
 Do not audit attempts to send speech_server packets.
 </summary>
@@ -60680,7 +60764,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_server_packets" lineno="81039">
+<interface name="corenet_receive_speech_server_packets" lineno="81057">
 <summary>
 Receive speech_server packets.
 </summary>
@@ -60691,7 +60775,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81058">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076">
 <summary>
 Do not audit attempts to receive speech_server packets.
 </summary>
@@ -60702,7 +60786,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="81077">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="81095">
 <summary>
 Send and receive speech_server packets.
 </summary>
@@ -60713,7 +60797,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81093">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111">
 <summary>
 Do not audit attempts to send and receive speech_server packets.
 </summary>
@@ -60724,7 +60808,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="81108">
+<interface name="corenet_relabelto_speech_server_packets" lineno="81126">
 <summary>
 Relabel packets to speech_server the packet type.
 </summary>
@@ -60734,7 +60818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="81130">
+<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148">
 <summary>
 Send and receive TCP traffic on the squid port.
 </summary>
@@ -60745,7 +60829,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_squid_port" lineno="81145">
+<interface name="corenet_udp_send_squid_port" lineno="81163">
 <summary>
 Send UDP traffic on the squid port.
 </summary>
@@ -60756,7 +60840,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81160">
+<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178">
 <summary>
 Do not audit attempts to send UDP traffic on the squid port.
 </summary>
@@ -60767,7 +60851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_squid_port" lineno="81175">
+<interface name="corenet_udp_receive_squid_port" lineno="81193">
 <summary>
 Receive UDP traffic on the squid port.
 </summary>
@@ -60778,7 +60862,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81190">
+<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208">
 <summary>
 Do not audit attempts to receive UDP traffic on the squid port.
 </summary>
@@ -60789,7 +60873,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="81205">
+<interface name="corenet_udp_sendrecv_squid_port" lineno="81223">
 <summary>
 Send and receive UDP traffic on the squid port.
 </summary>
@@ -60800,7 +60884,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81221">
+<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the squid port.
@@ -60812,7 +60896,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="81236">
+<interface name="corenet_tcp_bind_squid_port" lineno="81254">
 <summary>
 Bind TCP sockets to the squid port.
 </summary>
@@ -60823,7 +60907,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_squid_port" lineno="81256">
+<interface name="corenet_udp_bind_squid_port" lineno="81274">
 <summary>
 Bind UDP sockets to the squid port.
 </summary>
@@ -60834,7 +60918,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="81275">
+<interface name="corenet_tcp_connect_squid_port" lineno="81293">
 <summary>
 Make a TCP connection to the squid port.
 </summary>
@@ -60844,7 +60928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_client_packets" lineno="81295">
+<interface name="corenet_send_squid_client_packets" lineno="81313">
 <summary>
 Send squid_client packets.
 </summary>
@@ -60855,7 +60939,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81314">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332">
 <summary>
 Do not audit attempts to send squid_client packets.
 </summary>
@@ -60866,7 +60950,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_client_packets" lineno="81333">
+<interface name="corenet_receive_squid_client_packets" lineno="81351">
 <summary>
 Receive squid_client packets.
 </summary>
@@ -60877,7 +60961,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81352">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370">
 <summary>
 Do not audit attempts to receive squid_client packets.
 </summary>
@@ -60888,7 +60972,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="81371">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="81389">
 <summary>
 Send and receive squid_client packets.
 </summary>
@@ -60899,7 +60983,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81387">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405">
 <summary>
 Do not audit attempts to send and receive squid_client packets.
 </summary>
@@ -60910,7 +60994,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="81402">
+<interface name="corenet_relabelto_squid_client_packets" lineno="81420">
 <summary>
 Relabel packets to squid_client the packet type.
 </summary>
@@ -60920,7 +61004,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_server_packets" lineno="81422">
+<interface name="corenet_send_squid_server_packets" lineno="81440">
 <summary>
 Send squid_server packets.
 </summary>
@@ -60931,7 +61015,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81441">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459">
 <summary>
 Do not audit attempts to send squid_server packets.
 </summary>
@@ -60942,7 +61026,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_server_packets" lineno="81460">
+<interface name="corenet_receive_squid_server_packets" lineno="81478">
 <summary>
 Receive squid_server packets.
 </summary>
@@ -60953,7 +61037,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81479">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497">
 <summary>
 Do not audit attempts to receive squid_server packets.
 </summary>
@@ -60964,7 +61048,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="81498">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="81516">
 <summary>
 Send and receive squid_server packets.
 </summary>
@@ -60975,7 +61059,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81514">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532">
 <summary>
 Do not audit attempts to send and receive squid_server packets.
 </summary>
@@ -60986,7 +61070,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="81529">
+<interface name="corenet_relabelto_squid_server_packets" lineno="81547">
 <summary>
 Relabel packets to squid_server the packet type.
 </summary>
@@ -60996,7 +61080,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81551">
+<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569">
 <summary>
 Send and receive TCP traffic on the ssdp port.
 </summary>
@@ -61007,7 +61091,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81566">
+<interface name="corenet_udp_send_ssdp_port" lineno="81584">
 <summary>
 Send UDP traffic on the ssdp port.
 </summary>
@@ -61018,7 +61102,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81581">
+<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599">
 <summary>
 Do not audit attempts to send UDP traffic on the ssdp port.
 </summary>
@@ -61029,7 +61113,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81596">
+<interface name="corenet_udp_receive_ssdp_port" lineno="81614">
 <summary>
 Receive UDP traffic on the ssdp port.
 </summary>
@@ -61040,7 +61124,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81611">
+<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629">
 <summary>
 Do not audit attempts to receive UDP traffic on the ssdp port.
 </summary>
@@ -61051,7 +61135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81626">
+<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644">
 <summary>
 Send and receive UDP traffic on the ssdp port.
 </summary>
@@ -61062,7 +61146,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81642">
+<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ssdp port.
@@ -61074,7 +61158,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81657">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="81675">
 <summary>
 Bind TCP sockets to the ssdp port.
 </summary>
@@ -61085,7 +61169,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81677">
+<interface name="corenet_udp_bind_ssdp_port" lineno="81695">
 <summary>
 Bind UDP sockets to the ssdp port.
 </summary>
@@ -61096,7 +61180,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81696">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="81714">
 <summary>
 Make a TCP connection to the ssdp port.
 </summary>
@@ -61106,7 +61190,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81716">
+<interface name="corenet_send_ssdp_client_packets" lineno="81734">
 <summary>
 Send ssdp_client packets.
 </summary>
@@ -61117,7 +61201,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81735">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753">
 <summary>
 Do not audit attempts to send ssdp_client packets.
 </summary>
@@ -61128,7 +61212,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81754">
+<interface name="corenet_receive_ssdp_client_packets" lineno="81772">
 <summary>
 Receive ssdp_client packets.
 </summary>
@@ -61139,7 +61223,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81773">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791">
 <summary>
 Do not audit attempts to receive ssdp_client packets.
 </summary>
@@ -61150,7 +61234,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81792">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810">
 <summary>
 Send and receive ssdp_client packets.
 </summary>
@@ -61161,7 +61245,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81808">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826">
 <summary>
 Do not audit attempts to send and receive ssdp_client packets.
 </summary>
@@ -61172,7 +61256,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81823">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841">
 <summary>
 Relabel packets to ssdp_client the packet type.
 </summary>
@@ -61182,7 +61266,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81843">
+<interface name="corenet_send_ssdp_server_packets" lineno="81861">
 <summary>
 Send ssdp_server packets.
 </summary>
@@ -61193,7 +61277,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81862">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880">
 <summary>
 Do not audit attempts to send ssdp_server packets.
 </summary>
@@ -61204,7 +61288,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81881">
+<interface name="corenet_receive_ssdp_server_packets" lineno="81899">
 <summary>
 Receive ssdp_server packets.
 </summary>
@@ -61215,7 +61299,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81900">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918">
 <summary>
 Do not audit attempts to receive ssdp_server packets.
 </summary>
@@ -61226,7 +61310,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81919">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937">
 <summary>
 Send and receive ssdp_server packets.
 </summary>
@@ -61237,7 +61321,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81935">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953">
 <summary>
 Do not audit attempts to send and receive ssdp_server packets.
 </summary>
@@ -61248,7 +61332,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81950">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968">
 <summary>
 Relabel packets to ssdp_server the packet type.
 </summary>
@@ -61258,7 +61342,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81972">
+<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990">
 <summary>
 Send and receive TCP traffic on the ssh port.
 </summary>
@@ -61269,7 +61353,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ssh_port" lineno="81987">
+<interface name="corenet_udp_send_ssh_port" lineno="82005">
 <summary>
 Send UDP traffic on the ssh port.
 </summary>
@@ -61280,7 +61364,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82002">
+<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020">
 <summary>
 Do not audit attempts to send UDP traffic on the ssh port.
 </summary>
@@ -61291,7 +61375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="82017">
+<interface name="corenet_udp_receive_ssh_port" lineno="82035">
 <summary>
 Receive UDP traffic on the ssh port.
 </summary>
@@ -61302,7 +61386,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82032">
+<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050">
 <summary>
 Do not audit attempts to receive UDP traffic on the ssh port.
 </summary>
@@ -61313,7 +61397,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="82047">
+<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065">
 <summary>
 Send and receive UDP traffic on the ssh port.
 </summary>
@@ -61324,7 +61408,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82063">
+<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ssh port.
@@ -61336,7 +61420,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="82078">
+<interface name="corenet_tcp_bind_ssh_port" lineno="82096">
 <summary>
 Bind TCP sockets to the ssh port.
 </summary>
@@ -61347,7 +61431,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="82098">
+<interface name="corenet_udp_bind_ssh_port" lineno="82116">
 <summary>
 Bind UDP sockets to the ssh port.
 </summary>
@@ -61358,7 +61442,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="82117">
+<interface name="corenet_tcp_connect_ssh_port" lineno="82135">
 <summary>
 Make a TCP connection to the ssh port.
 </summary>
@@ -61368,7 +61452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_client_packets" lineno="82137">
+<interface name="corenet_send_ssh_client_packets" lineno="82155">
 <summary>
 Send ssh_client packets.
 </summary>
@@ -61379,7 +61463,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82156">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174">
 <summary>
 Do not audit attempts to send ssh_client packets.
 </summary>
@@ -61390,7 +61474,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="82175">
+<interface name="corenet_receive_ssh_client_packets" lineno="82193">
 <summary>
 Receive ssh_client packets.
 </summary>
@@ -61401,7 +61485,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82194">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212">
 <summary>
 Do not audit attempts to receive ssh_client packets.
 </summary>
@@ -61412,7 +61496,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="82213">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231">
 <summary>
 Send and receive ssh_client packets.
 </summary>
@@ -61423,7 +61507,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82229">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247">
 <summary>
 Do not audit attempts to send and receive ssh_client packets.
 </summary>
@@ -61434,7 +61518,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="82244">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="82262">
 <summary>
 Relabel packets to ssh_client the packet type.
 </summary>
@@ -61444,7 +61528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_server_packets" lineno="82264">
+<interface name="corenet_send_ssh_server_packets" lineno="82282">
 <summary>
 Send ssh_server packets.
 </summary>
@@ -61455,7 +61539,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82283">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301">
 <summary>
 Do not audit attempts to send ssh_server packets.
 </summary>
@@ -61466,7 +61550,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="82302">
+<interface name="corenet_receive_ssh_server_packets" lineno="82320">
 <summary>
 Receive ssh_server packets.
 </summary>
@@ -61477,7 +61561,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82321">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339">
 <summary>
 Do not audit attempts to receive ssh_server packets.
 </summary>
@@ -61488,7 +61572,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="82340">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358">
 <summary>
 Send and receive ssh_server packets.
 </summary>
@@ -61499,7 +61583,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82356">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374">
 <summary>
 Do not audit attempts to send and receive ssh_server packets.
 </summary>
@@ -61510,7 +61594,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="82371">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="82389">
 <summary>
 Relabel packets to ssh_server the packet type.
 </summary>
@@ -61520,7 +61604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82393">
+<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411">
 <summary>
 Send and receive TCP traffic on the stunnel port.
 </summary>
@@ -61531,7 +61615,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="82408">
+<interface name="corenet_udp_send_stunnel_port" lineno="82426">
 <summary>
 Send UDP traffic on the stunnel port.
 </summary>
@@ -61542,7 +61626,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82423">
+<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441">
 <summary>
 Do not audit attempts to send UDP traffic on the stunnel port.
 </summary>
@@ -61553,7 +61637,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="82438">
+<interface name="corenet_udp_receive_stunnel_port" lineno="82456">
 <summary>
 Receive UDP traffic on the stunnel port.
 </summary>
@@ -61564,7 +61648,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82453">
+<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471">
 <summary>
 Do not audit attempts to receive UDP traffic on the stunnel port.
 </summary>
@@ -61575,7 +61659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82468">
+<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486">
 <summary>
 Send and receive UDP traffic on the stunnel port.
 </summary>
@@ -61586,7 +61670,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82484">
+<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the stunnel port.
@@ -61598,7 +61682,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="82499">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="82517">
 <summary>
 Bind TCP sockets to the stunnel port.
 </summary>
@@ -61609,7 +61693,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="82519">
+<interface name="corenet_udp_bind_stunnel_port" lineno="82537">
 <summary>
 Bind UDP sockets to the stunnel port.
 </summary>
@@ -61620,7 +61704,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="82538">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="82556">
 <summary>
 Make a TCP connection to the stunnel port.
 </summary>
@@ -61630,7 +61714,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82558">
+<interface name="corenet_send_stunnel_client_packets" lineno="82576">
 <summary>
 Send stunnel_client packets.
 </summary>
@@ -61641,7 +61725,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82577">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595">
 <summary>
 Do not audit attempts to send stunnel_client packets.
 </summary>
@@ -61652,7 +61736,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82596">
+<interface name="corenet_receive_stunnel_client_packets" lineno="82614">
 <summary>
 Receive stunnel_client packets.
 </summary>
@@ -61663,7 +61747,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82615">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633">
 <summary>
 Do not audit attempts to receive stunnel_client packets.
 </summary>
@@ -61674,7 +61758,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82634">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652">
 <summary>
 Send and receive stunnel_client packets.
 </summary>
@@ -61685,7 +61769,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82650">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668">
 <summary>
 Do not audit attempts to send and receive stunnel_client packets.
 </summary>
@@ -61696,7 +61780,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82665">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683">
 <summary>
 Relabel packets to stunnel_client the packet type.
 </summary>
@@ -61706,7 +61790,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82685">
+<interface name="corenet_send_stunnel_server_packets" lineno="82703">
 <summary>
 Send stunnel_server packets.
 </summary>
@@ -61717,7 +61801,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82704">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722">
 <summary>
 Do not audit attempts to send stunnel_server packets.
 </summary>
@@ -61728,7 +61812,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82723">
+<interface name="corenet_receive_stunnel_server_packets" lineno="82741">
 <summary>
 Receive stunnel_server packets.
 </summary>
@@ -61739,7 +61823,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82742">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760">
 <summary>
 Do not audit attempts to receive stunnel_server packets.
 </summary>
@@ -61750,7 +61834,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82761">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779">
 <summary>
 Send and receive stunnel_server packets.
 </summary>
@@ -61761,7 +61845,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82777">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795">
 <summary>
 Do not audit attempts to send and receive stunnel_server packets.
 </summary>
@@ -61772,7 +61856,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82792">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810">
 <summary>
 Relabel packets to stunnel_server the packet type.
 </summary>
@@ -61782,7 +61866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82814">
+<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832">
 <summary>
 Send and receive TCP traffic on the svn port.
 </summary>
@@ -61793,7 +61877,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_svn_port" lineno="82829">
+<interface name="corenet_udp_send_svn_port" lineno="82847">
 <summary>
 Send UDP traffic on the svn port.
 </summary>
@@ -61804,7 +61888,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82844">
+<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862">
 <summary>
 Do not audit attempts to send UDP traffic on the svn port.
 </summary>
@@ -61815,7 +61899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82859">
+<interface name="corenet_udp_receive_svn_port" lineno="82877">
 <summary>
 Receive UDP traffic on the svn port.
 </summary>
@@ -61826,7 +61910,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82874">
+<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892">
 <summary>
 Do not audit attempts to receive UDP traffic on the svn port.
 </summary>
@@ -61837,7 +61921,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82889">
+<interface name="corenet_udp_sendrecv_svn_port" lineno="82907">
 <summary>
 Send and receive UDP traffic on the svn port.
 </summary>
@@ -61848,7 +61932,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82905">
+<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the svn port.
@@ -61860,7 +61944,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82920">
+<interface name="corenet_tcp_bind_svn_port" lineno="82938">
 <summary>
 Bind TCP sockets to the svn port.
 </summary>
@@ -61871,7 +61955,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82940">
+<interface name="corenet_udp_bind_svn_port" lineno="82958">
 <summary>
 Bind UDP sockets to the svn port.
 </summary>
@@ -61882,7 +61966,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82959">
+<interface name="corenet_tcp_connect_svn_port" lineno="82977">
 <summary>
 Make a TCP connection to the svn port.
 </summary>
@@ -61892,7 +61976,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_client_packets" lineno="82979">
+<interface name="corenet_send_svn_client_packets" lineno="82997">
 <summary>
 Send svn_client packets.
 </summary>
@@ -61903,7 +61987,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82998">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016">
 <summary>
 Do not audit attempts to send svn_client packets.
 </summary>
@@ -61914,7 +61998,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_client_packets" lineno="83017">
+<interface name="corenet_receive_svn_client_packets" lineno="83035">
 <summary>
 Receive svn_client packets.
 </summary>
@@ -61925,7 +62009,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83036">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054">
 <summary>
 Do not audit attempts to receive svn_client packets.
 </summary>
@@ -61936,7 +62020,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="83055">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="83073">
 <summary>
 Send and receive svn_client packets.
 </summary>
@@ -61947,7 +62031,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83071">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089">
 <summary>
 Do not audit attempts to send and receive svn_client packets.
 </summary>
@@ -61958,7 +62042,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="83086">
+<interface name="corenet_relabelto_svn_client_packets" lineno="83104">
 <summary>
 Relabel packets to svn_client the packet type.
 </summary>
@@ -61968,7 +62052,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_server_packets" lineno="83106">
+<interface name="corenet_send_svn_server_packets" lineno="83124">
 <summary>
 Send svn_server packets.
 </summary>
@@ -61979,7 +62063,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83125">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143">
 <summary>
 Do not audit attempts to send svn_server packets.
 </summary>
@@ -61990,7 +62074,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_server_packets" lineno="83144">
+<interface name="corenet_receive_svn_server_packets" lineno="83162">
 <summary>
 Receive svn_server packets.
 </summary>
@@ -62001,7 +62085,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83163">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181">
 <summary>
 Do not audit attempts to receive svn_server packets.
 </summary>
@@ -62012,7 +62096,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="83182">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="83200">
 <summary>
 Send and receive svn_server packets.
 </summary>
@@ -62023,7 +62107,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83198">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216">
 <summary>
 Do not audit attempts to send and receive svn_server packets.
 </summary>
@@ -62034,7 +62118,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="83213">
+<interface name="corenet_relabelto_svn_server_packets" lineno="83231">
 <summary>
 Relabel packets to svn_server the packet type.
 </summary>
@@ -62044,7 +62128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83235">
+<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253">
 <summary>
 Send and receive TCP traffic on the svrloc port.
 </summary>
@@ -62055,7 +62139,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="83250">
+<interface name="corenet_udp_send_svrloc_port" lineno="83268">
 <summary>
 Send UDP traffic on the svrloc port.
 </summary>
@@ -62066,7 +62150,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83265">
+<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283">
 <summary>
 Do not audit attempts to send UDP traffic on the svrloc port.
 </summary>
@@ -62077,7 +62161,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="83280">
+<interface name="corenet_udp_receive_svrloc_port" lineno="83298">
 <summary>
 Receive UDP traffic on the svrloc port.
 </summary>
@@ -62088,7 +62172,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83295">
+<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313">
 <summary>
 Do not audit attempts to receive UDP traffic on the svrloc port.
 </summary>
@@ -62099,7 +62183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83310">
+<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328">
 <summary>
 Send and receive UDP traffic on the svrloc port.
 </summary>
@@ -62110,7 +62194,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83326">
+<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the svrloc port.
@@ -62122,7 +62206,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="83341">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="83359">
 <summary>
 Bind TCP sockets to the svrloc port.
 </summary>
@@ -62133,7 +62217,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="83361">
+<interface name="corenet_udp_bind_svrloc_port" lineno="83379">
 <summary>
 Bind UDP sockets to the svrloc port.
 </summary>
@@ -62144,7 +62228,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="83380">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="83398">
 <summary>
 Make a TCP connection to the svrloc port.
 </summary>
@@ -62154,7 +62238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="83400">
+<interface name="corenet_send_svrloc_client_packets" lineno="83418">
 <summary>
 Send svrloc_client packets.
 </summary>
@@ -62165,7 +62249,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83419">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437">
 <summary>
 Do not audit attempts to send svrloc_client packets.
 </summary>
@@ -62176,7 +62260,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="83438">
+<interface name="corenet_receive_svrloc_client_packets" lineno="83456">
 <summary>
 Receive svrloc_client packets.
 </summary>
@@ -62187,7 +62271,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83457">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475">
 <summary>
 Do not audit attempts to receive svrloc_client packets.
 </summary>
@@ -62198,7 +62282,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83476">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494">
 <summary>
 Send and receive svrloc_client packets.
 </summary>
@@ -62209,7 +62293,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83492">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510">
 <summary>
 Do not audit attempts to send and receive svrloc_client packets.
 </summary>
@@ -62220,7 +62304,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="83507">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525">
 <summary>
 Relabel packets to svrloc_client the packet type.
 </summary>
@@ -62230,7 +62314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="83527">
+<interface name="corenet_send_svrloc_server_packets" lineno="83545">
 <summary>
 Send svrloc_server packets.
 </summary>
@@ -62241,7 +62325,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83546">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564">
 <summary>
 Do not audit attempts to send svrloc_server packets.
 </summary>
@@ -62252,7 +62336,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83565">
+<interface name="corenet_receive_svrloc_server_packets" lineno="83583">
 <summary>
 Receive svrloc_server packets.
 </summary>
@@ -62263,7 +62347,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83584">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602">
 <summary>
 Do not audit attempts to receive svrloc_server packets.
 </summary>
@@ -62274,7 +62358,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83603">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621">
 <summary>
 Send and receive svrloc_server packets.
 </summary>
@@ -62285,7 +62369,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83619">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637">
 <summary>
 Do not audit attempts to send and receive svrloc_server packets.
 </summary>
@@ -62296,7 +62380,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83634">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652">
 <summary>
 Relabel packets to svrloc_server the packet type.
 </summary>
@@ -62306,7 +62390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83656">
+<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674">
 <summary>
 Send and receive TCP traffic on the swat port.
 </summary>
@@ -62317,7 +62401,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_swat_port" lineno="83671">
+<interface name="corenet_udp_send_swat_port" lineno="83689">
 <summary>
 Send UDP traffic on the swat port.
 </summary>
@@ -62328,7 +62412,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83686">
+<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704">
 <summary>
 Do not audit attempts to send UDP traffic on the swat port.
 </summary>
@@ -62339,7 +62423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83701">
+<interface name="corenet_udp_receive_swat_port" lineno="83719">
 <summary>
 Receive UDP traffic on the swat port.
 </summary>
@@ -62350,7 +62434,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83716">
+<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734">
 <summary>
 Do not audit attempts to receive UDP traffic on the swat port.
 </summary>
@@ -62361,7 +62445,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83731">
+<interface name="corenet_udp_sendrecv_swat_port" lineno="83749">
 <summary>
 Send and receive UDP traffic on the swat port.
 </summary>
@@ -62372,7 +62456,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83747">
+<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the swat port.
@@ -62384,7 +62468,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83762">
+<interface name="corenet_tcp_bind_swat_port" lineno="83780">
 <summary>
 Bind TCP sockets to the swat port.
 </summary>
@@ -62395,7 +62479,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83782">
+<interface name="corenet_udp_bind_swat_port" lineno="83800">
 <summary>
 Bind UDP sockets to the swat port.
 </summary>
@@ -62406,7 +62490,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83801">
+<interface name="corenet_tcp_connect_swat_port" lineno="83819">
 <summary>
 Make a TCP connection to the swat port.
 </summary>
@@ -62416,7 +62500,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_client_packets" lineno="83821">
+<interface name="corenet_send_swat_client_packets" lineno="83839">
 <summary>
 Send swat_client packets.
 </summary>
@@ -62427,7 +62511,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83840">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858">
 <summary>
 Do not audit attempts to send swat_client packets.
 </summary>
@@ -62438,7 +62522,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83859">
+<interface name="corenet_receive_swat_client_packets" lineno="83877">
 <summary>
 Receive swat_client packets.
 </summary>
@@ -62449,7 +62533,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83878">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896">
 <summary>
 Do not audit attempts to receive swat_client packets.
 </summary>
@@ -62460,7 +62544,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83897">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="83915">
 <summary>
 Send and receive swat_client packets.
 </summary>
@@ -62471,7 +62555,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83913">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931">
 <summary>
 Do not audit attempts to send and receive swat_client packets.
 </summary>
@@ -62482,7 +62566,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83928">
+<interface name="corenet_relabelto_swat_client_packets" lineno="83946">
 <summary>
 Relabel packets to swat_client the packet type.
 </summary>
@@ -62492,7 +62576,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_server_packets" lineno="83948">
+<interface name="corenet_send_swat_server_packets" lineno="83966">
 <summary>
 Send swat_server packets.
 </summary>
@@ -62503,7 +62587,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83967">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985">
 <summary>
 Do not audit attempts to send swat_server packets.
 </summary>
@@ -62514,7 +62598,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_server_packets" lineno="83986">
+<interface name="corenet_receive_swat_server_packets" lineno="84004">
 <summary>
 Receive swat_server packets.
 </summary>
@@ -62525,7 +62609,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84005">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023">
 <summary>
 Do not audit attempts to receive swat_server packets.
 </summary>
@@ -62536,7 +62620,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="84024">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="84042">
 <summary>
 Send and receive swat_server packets.
 </summary>
@@ -62547,7 +62631,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84040">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058">
 <summary>
 Do not audit attempts to send and receive swat_server packets.
 </summary>
@@ -62558,7 +62642,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="84055">
+<interface name="corenet_relabelto_swat_server_packets" lineno="84073">
 <summary>
 Relabel packets to swat_server the packet type.
 </summary>
@@ -62568,7 +62652,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84077">
+<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095">
 <summary>
 Send and receive TCP traffic on the syncthing port.
 </summary>
@@ -62579,7 +62663,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="84092">
+<interface name="corenet_udp_send_syncthing_port" lineno="84110">
 <summary>
 Send UDP traffic on the syncthing port.
 </summary>
@@ -62590,7 +62674,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84107">
+<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing port.
 </summary>
@@ -62601,7 +62685,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="84122">
+<interface name="corenet_udp_receive_syncthing_port" lineno="84140">
 <summary>
 Receive UDP traffic on the syncthing port.
 </summary>
@@ -62612,7 +62696,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84137">
+<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing port.
 </summary>
@@ -62623,7 +62707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84152">
+<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170">
 <summary>
 Send and receive UDP traffic on the syncthing port.
 </summary>
@@ -62634,7 +62718,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84168">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing port.
@@ -62646,7 +62730,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="84183">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="84201">
 <summary>
 Bind TCP sockets to the syncthing port.
 </summary>
@@ -62657,7 +62741,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="84203">
+<interface name="corenet_udp_bind_syncthing_port" lineno="84221">
 <summary>
 Bind UDP sockets to the syncthing port.
 </summary>
@@ -62668,7 +62752,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="84222">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="84240">
 <summary>
 Make a TCP connection to the syncthing port.
 </summary>
@@ -62678,7 +62762,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="84242">
+<interface name="corenet_send_syncthing_client_packets" lineno="84260">
 <summary>
 Send syncthing_client packets.
 </summary>
@@ -62689,7 +62773,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84261">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279">
 <summary>
 Do not audit attempts to send syncthing_client packets.
 </summary>
@@ -62700,7 +62784,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="84280">
+<interface name="corenet_receive_syncthing_client_packets" lineno="84298">
 <summary>
 Receive syncthing_client packets.
 </summary>
@@ -62711,7 +62795,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84299">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317">
 <summary>
 Do not audit attempts to receive syncthing_client packets.
 </summary>
@@ -62722,7 +62806,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84318">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336">
 <summary>
 Send and receive syncthing_client packets.
 </summary>
@@ -62733,7 +62817,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84334">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352">
 <summary>
 Do not audit attempts to send and receive syncthing_client packets.
 </summary>
@@ -62744,7 +62828,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="84349">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367">
 <summary>
 Relabel packets to syncthing_client the packet type.
 </summary>
@@ -62754,7 +62838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="84369">
+<interface name="corenet_send_syncthing_server_packets" lineno="84387">
 <summary>
 Send syncthing_server packets.
 </summary>
@@ -62765,7 +62849,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84388">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406">
 <summary>
 Do not audit attempts to send syncthing_server packets.
 </summary>
@@ -62776,7 +62860,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="84407">
+<interface name="corenet_receive_syncthing_server_packets" lineno="84425">
 <summary>
 Receive syncthing_server packets.
 </summary>
@@ -62787,7 +62871,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84426">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444">
 <summary>
 Do not audit attempts to receive syncthing_server packets.
 </summary>
@@ -62798,7 +62882,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84445">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463">
 <summary>
 Send and receive syncthing_server packets.
 </summary>
@@ -62809,7 +62893,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84461">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479">
 <summary>
 Do not audit attempts to send and receive syncthing_server packets.
 </summary>
@@ -62820,7 +62904,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="84476">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494">
 <summary>
 Relabel packets to syncthing_server the packet type.
 </summary>
@@ -62830,7 +62914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84498">
+<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516">
 <summary>
 Send and receive TCP traffic on the syncthing_admin port.
 </summary>
@@ -62841,7 +62925,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="84513">
+<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531">
 <summary>
 Send UDP traffic on the syncthing_admin port.
 </summary>
@@ -62852,7 +62936,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84528">
+<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing_admin port.
 </summary>
@@ -62863,7 +62947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84543">
+<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561">
 <summary>
 Receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62874,7 +62958,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84558">
+<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62885,7 +62969,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84573">
+<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591">
 <summary>
 Send and receive UDP traffic on the syncthing_admin port.
 </summary>
@@ -62896,7 +62980,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84589">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing_admin port.
@@ -62908,7 +62992,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84604">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622">
 <summary>
 Bind TCP sockets to the syncthing_admin port.
 </summary>
@@ -62919,7 +63003,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84624">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642">
 <summary>
 Bind UDP sockets to the syncthing_admin port.
 </summary>
@@ -62930,7 +63014,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84643">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661">
 <summary>
 Make a TCP connection to the syncthing_admin port.
 </summary>
@@ -62940,7 +63024,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84663">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681">
 <summary>
 Send syncthing_admin_client packets.
 </summary>
@@ -62951,7 +63035,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84682">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700">
 <summary>
 Do not audit attempts to send syncthing_admin_client packets.
 </summary>
@@ -62962,7 +63046,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84701">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719">
 <summary>
 Receive syncthing_admin_client packets.
 </summary>
@@ -62973,7 +63057,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84720">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738">
 <summary>
 Do not audit attempts to receive syncthing_admin_client packets.
 </summary>
@@ -62984,7 +63068,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84739">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757">
 <summary>
 Send and receive syncthing_admin_client packets.
 </summary>
@@ -62995,7 +63079,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84755">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_client packets.
 </summary>
@@ -63006,7 +63090,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84770">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788">
 <summary>
 Relabel packets to syncthing_admin_client the packet type.
 </summary>
@@ -63016,7 +63100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84790">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808">
 <summary>
 Send syncthing_admin_server packets.
 </summary>
@@ -63027,7 +63111,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84809">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827">
 <summary>
 Do not audit attempts to send syncthing_admin_server packets.
 </summary>
@@ -63038,7 +63122,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84828">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846">
 <summary>
 Receive syncthing_admin_server packets.
 </summary>
@@ -63049,7 +63133,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84847">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865">
 <summary>
 Do not audit attempts to receive syncthing_admin_server packets.
 </summary>
@@ -63060,7 +63144,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84866">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884">
 <summary>
 Send and receive syncthing_admin_server packets.
 </summary>
@@ -63071,7 +63155,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84882">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_server packets.
 </summary>
@@ -63082,7 +63166,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84897">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915">
 <summary>
 Relabel packets to syncthing_admin_server the packet type.
 </summary>
@@ -63092,7 +63176,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84919">
+<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937">
 <summary>
 Send and receive TCP traffic on the syncthing_discovery port.
 </summary>
@@ -63103,7 +63187,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84934">
+<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952">
 <summary>
 Send UDP traffic on the syncthing_discovery port.
 </summary>
@@ -63114,7 +63198,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84949">
+<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967">
 <summary>
 Do not audit attempts to send UDP traffic on the syncthing_discovery port.
 </summary>
@@ -63125,7 +63209,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84964">
+<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982">
 <summary>
 Receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -63136,7 +63220,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84979">
+<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997">
 <summary>
 Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -63147,7 +63231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84994">
+<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012">
 <summary>
 Send and receive UDP traffic on the syncthing_discovery port.
 </summary>
@@ -63158,7 +63242,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85010">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syncthing_discovery port.
@@ -63170,7 +63254,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85025">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043">
 <summary>
 Bind TCP sockets to the syncthing_discovery port.
 </summary>
@@ -63181,7 +63265,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85045">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063">
 <summary>
 Bind UDP sockets to the syncthing_discovery port.
 </summary>
@@ -63192,7 +63276,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85064">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082">
 <summary>
 Make a TCP connection to the syncthing_discovery port.
 </summary>
@@ -63202,7 +63286,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85084">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102">
 <summary>
 Send syncthing_discovery_client packets.
 </summary>
@@ -63213,7 +63297,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85103">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121">
 <summary>
 Do not audit attempts to send syncthing_discovery_client packets.
 </summary>
@@ -63224,7 +63308,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85122">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140">
 <summary>
 Receive syncthing_discovery_client packets.
 </summary>
@@ -63235,7 +63319,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85141">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159">
 <summary>
 Do not audit attempts to receive syncthing_discovery_client packets.
 </summary>
@@ -63246,7 +63330,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85160">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178">
 <summary>
 Send and receive syncthing_discovery_client packets.
 </summary>
@@ -63257,7 +63341,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85176">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_client packets.
 </summary>
@@ -63268,7 +63352,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85191">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209">
 <summary>
 Relabel packets to syncthing_discovery_client the packet type.
 </summary>
@@ -63278,7 +63362,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85211">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229">
 <summary>
 Send syncthing_discovery_server packets.
 </summary>
@@ -63289,7 +63373,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85230">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248">
 <summary>
 Do not audit attempts to send syncthing_discovery_server packets.
 </summary>
@@ -63300,7 +63384,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85249">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267">
 <summary>
 Receive syncthing_discovery_server packets.
 </summary>
@@ -63311,7 +63395,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85268">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286">
 <summary>
 Do not audit attempts to receive syncthing_discovery_server packets.
 </summary>
@@ -63322,7 +63406,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85287">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305">
 <summary>
 Send and receive syncthing_discovery_server packets.
 </summary>
@@ -63333,7 +63417,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85303">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_server packets.
 </summary>
@@ -63344,7 +63428,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85318">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336">
 <summary>
 Relabel packets to syncthing_discovery_server the packet type.
 </summary>
@@ -63354,7 +63438,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85340">
+<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358">
 <summary>
 Send and receive TCP traffic on the sype_transport port.
 </summary>
@@ -63365,7 +63449,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="85355">
+<interface name="corenet_udp_send_sype_transport_port" lineno="85373">
 <summary>
 Send UDP traffic on the sype_transport port.
 </summary>
@@ -63376,7 +63460,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85370">
+<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388">
 <summary>
 Do not audit attempts to send UDP traffic on the sype_transport port.
 </summary>
@@ -63387,7 +63471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="85385">
+<interface name="corenet_udp_receive_sype_transport_port" lineno="85403">
 <summary>
 Receive UDP traffic on the sype_transport port.
 </summary>
@@ -63398,7 +63482,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85400">
+<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418">
 <summary>
 Do not audit attempts to receive UDP traffic on the sype_transport port.
 </summary>
@@ -63409,7 +63493,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85415">
+<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433">
 <summary>
 Send and receive UDP traffic on the sype_transport port.
 </summary>
@@ -63420,7 +63504,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85431">
+<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the sype_transport port.
@@ -63432,7 +63516,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="85446">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464">
 <summary>
 Bind TCP sockets to the sype_transport port.
 </summary>
@@ -63443,7 +63527,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="85466">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="85484">
 <summary>
 Bind UDP sockets to the sype_transport port.
 </summary>
@@ -63454,7 +63538,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="85485">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503">
 <summary>
 Make a TCP connection to the sype_transport port.
 </summary>
@@ -63464,7 +63548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="85505">
+<interface name="corenet_send_sype_transport_client_packets" lineno="85523">
 <summary>
 Send sype_transport_client packets.
 </summary>
@@ -63475,7 +63559,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85524">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542">
 <summary>
 Do not audit attempts to send sype_transport_client packets.
 </summary>
@@ -63486,7 +63570,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="85543">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="85561">
 <summary>
 Receive sype_transport_client packets.
 </summary>
@@ -63497,7 +63581,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85562">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580">
 <summary>
 Do not audit attempts to receive sype_transport_client packets.
 </summary>
@@ -63508,7 +63592,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85581">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599">
 <summary>
 Send and receive sype_transport_client packets.
 </summary>
@@ -63519,7 +63603,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85597">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615">
 <summary>
 Do not audit attempts to send and receive sype_transport_client packets.
 </summary>
@@ -63530,7 +63614,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85612">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630">
 <summary>
 Relabel packets to sype_transport_client the packet type.
 </summary>
@@ -63540,7 +63624,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85632">
+<interface name="corenet_send_sype_transport_server_packets" lineno="85650">
 <summary>
 Send sype_transport_server packets.
 </summary>
@@ -63551,7 +63635,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85651">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669">
 <summary>
 Do not audit attempts to send sype_transport_server packets.
 </summary>
@@ -63562,7 +63646,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85670">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="85688">
 <summary>
 Receive sype_transport_server packets.
 </summary>
@@ -63573,7 +63657,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85689">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707">
 <summary>
 Do not audit attempts to receive sype_transport_server packets.
 </summary>
@@ -63584,7 +63668,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85708">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726">
 <summary>
 Send and receive sype_transport_server packets.
 </summary>
@@ -63595,7 +63679,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85724">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742">
 <summary>
 Do not audit attempts to send and receive sype_transport_server packets.
 </summary>
@@ -63606,7 +63690,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85739">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757">
 <summary>
 Relabel packets to sype_transport_server the packet type.
 </summary>
@@ -63616,7 +63700,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85761">
+<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779">
 <summary>
 Send and receive TCP traffic on the syslogd port.
 </summary>
@@ -63627,7 +63711,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85776">
+<interface name="corenet_udp_send_syslogd_port" lineno="85794">
 <summary>
 Send UDP traffic on the syslogd port.
 </summary>
@@ -63638,7 +63722,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85791">
+<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809">
 <summary>
 Do not audit attempts to send UDP traffic on the syslogd port.
 </summary>
@@ -63649,7 +63733,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85806">
+<interface name="corenet_udp_receive_syslogd_port" lineno="85824">
 <summary>
 Receive UDP traffic on the syslogd port.
 </summary>
@@ -63660,7 +63744,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85821">
+<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839">
 <summary>
 Do not audit attempts to receive UDP traffic on the syslogd port.
 </summary>
@@ -63671,7 +63755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85836">
+<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854">
 <summary>
 Send and receive UDP traffic on the syslogd port.
 </summary>
@@ -63682,7 +63766,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85852">
+<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syslogd port.
@@ -63694,7 +63778,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85867">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="85885">
 <summary>
 Bind TCP sockets to the syslogd port.
 </summary>
@@ -63705,7 +63789,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85887">
+<interface name="corenet_udp_bind_syslogd_port" lineno="85905">
 <summary>
 Bind UDP sockets to the syslogd port.
 </summary>
@@ -63716,7 +63800,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85906">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="85924">
 <summary>
 Make a TCP connection to the syslogd port.
 </summary>
@@ -63726,7 +63810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85926">
+<interface name="corenet_send_syslogd_client_packets" lineno="85944">
 <summary>
 Send syslogd_client packets.
 </summary>
@@ -63737,7 +63821,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85945">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963">
 <summary>
 Do not audit attempts to send syslogd_client packets.
 </summary>
@@ -63748,7 +63832,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85964">
+<interface name="corenet_receive_syslogd_client_packets" lineno="85982">
 <summary>
 Receive syslogd_client packets.
 </summary>
@@ -63759,7 +63843,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85983">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001">
 <summary>
 Do not audit attempts to receive syslogd_client packets.
 </summary>
@@ -63770,7 +63854,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86002">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020">
 <summary>
 Send and receive syslogd_client packets.
 </summary>
@@ -63781,7 +63865,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86018">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036">
 <summary>
 Do not audit attempts to send and receive syslogd_client packets.
 </summary>
@@ -63792,7 +63876,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="86033">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051">
 <summary>
 Relabel packets to syslogd_client the packet type.
 </summary>
@@ -63802,7 +63886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="86053">
+<interface name="corenet_send_syslogd_server_packets" lineno="86071">
 <summary>
 Send syslogd_server packets.
 </summary>
@@ -63813,7 +63897,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86072">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090">
 <summary>
 Do not audit attempts to send syslogd_server packets.
 </summary>
@@ -63824,7 +63908,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="86091">
+<interface name="corenet_receive_syslogd_server_packets" lineno="86109">
 <summary>
 Receive syslogd_server packets.
 </summary>
@@ -63835,7 +63919,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86110">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128">
 <summary>
 Do not audit attempts to receive syslogd_server packets.
 </summary>
@@ -63846,7 +63930,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86129">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147">
 <summary>
 Send and receive syslogd_server packets.
 </summary>
@@ -63857,7 +63941,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86145">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163">
 <summary>
 Do not audit attempts to send and receive syslogd_server packets.
 </summary>
@@ -63868,7 +63952,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="86160">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178">
 <summary>
 Relabel packets to syslogd_server the packet type.
 </summary>
@@ -63878,7 +63962,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86182">
+<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200">
 <summary>
 Send and receive TCP traffic on the syslog_tls port.
 </summary>
@@ -63889,7 +63973,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="86197">
+<interface name="corenet_udp_send_syslog_tls_port" lineno="86215">
 <summary>
 Send UDP traffic on the syslog_tls port.
 </summary>
@@ -63900,7 +63984,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86212">
+<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230">
 <summary>
 Do not audit attempts to send UDP traffic on the syslog_tls port.
 </summary>
@@ -63911,7 +63995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="86227">
+<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245">
 <summary>
 Receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63922,7 +64006,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86242">
+<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260">
 <summary>
 Do not audit attempts to receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63933,7 +64017,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86257">
+<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275">
 <summary>
 Send and receive UDP traffic on the syslog_tls port.
 </summary>
@@ -63944,7 +64028,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86273">
+<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the syslog_tls port.
@@ -63956,7 +64040,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86288">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306">
 <summary>
 Bind TCP sockets to the syslog_tls port.
 </summary>
@@ -63967,7 +64051,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="86308">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326">
 <summary>
 Bind UDP sockets to the syslog_tls port.
 </summary>
@@ -63978,7 +64062,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86327">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345">
 <summary>
 Make a TCP connection to the syslog_tls port.
 </summary>
@@ -63988,7 +64072,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="86347">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="86365">
 <summary>
 Send syslog_tls_client packets.
 </summary>
@@ -63999,7 +64083,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86366">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384">
 <summary>
 Do not audit attempts to send syslog_tls_client packets.
 </summary>
@@ -64010,7 +64094,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="86385">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403">
 <summary>
 Receive syslog_tls_client packets.
 </summary>
@@ -64021,7 +64105,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86404">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422">
 <summary>
 Do not audit attempts to receive syslog_tls_client packets.
 </summary>
@@ -64032,7 +64116,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86423">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441">
 <summary>
 Send and receive syslog_tls_client packets.
 </summary>
@@ -64043,7 +64127,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86439">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457">
 <summary>
 Do not audit attempts to send and receive syslog_tls_client packets.
 </summary>
@@ -64054,7 +64138,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86454">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472">
 <summary>
 Relabel packets to syslog_tls_client the packet type.
 </summary>
@@ -64064,7 +64148,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="86474">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="86492">
 <summary>
 Send syslog_tls_server packets.
 </summary>
@@ -64075,7 +64159,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86493">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511">
 <summary>
 Do not audit attempts to send syslog_tls_server packets.
 </summary>
@@ -64086,7 +64170,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="86512">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530">
 <summary>
 Receive syslog_tls_server packets.
 </summary>
@@ -64097,7 +64181,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86531">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549">
 <summary>
 Do not audit attempts to receive syslog_tls_server packets.
 </summary>
@@ -64108,7 +64192,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86550">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568">
 <summary>
 Send and receive syslog_tls_server packets.
 </summary>
@@ -64119,7 +64203,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86566">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584">
 <summary>
 Do not audit attempts to send and receive syslog_tls_server packets.
 </summary>
@@ -64130,7 +64214,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86581">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599">
 <summary>
 Relabel packets to syslog_tls_server the packet type.
 </summary>
@@ -64140,7 +64224,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86603">
+<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621">
 <summary>
 Send and receive TCP traffic on the tcs port.
 </summary>
@@ -64151,7 +64235,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86618">
+<interface name="corenet_udp_send_tcs_port" lineno="86636">
 <summary>
 Send UDP traffic on the tcs port.
 </summary>
@@ -64162,7 +64246,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86633">
+<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651">
 <summary>
 Do not audit attempts to send UDP traffic on the tcs port.
 </summary>
@@ -64173,7 +64257,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86648">
+<interface name="corenet_udp_receive_tcs_port" lineno="86666">
 <summary>
 Receive UDP traffic on the tcs port.
 </summary>
@@ -64184,7 +64268,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86663">
+<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681">
 <summary>
 Do not audit attempts to receive UDP traffic on the tcs port.
 </summary>
@@ -64195,7 +64279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86678">
+<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696">
 <summary>
 Send and receive UDP traffic on the tcs port.
 </summary>
@@ -64206,7 +64290,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86694">
+<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tcs port.
@@ -64218,7 +64302,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86709">
+<interface name="corenet_tcp_bind_tcs_port" lineno="86727">
 <summary>
 Bind TCP sockets to the tcs port.
 </summary>
@@ -64229,7 +64313,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86729">
+<interface name="corenet_udp_bind_tcs_port" lineno="86747">
 <summary>
 Bind UDP sockets to the tcs port.
 </summary>
@@ -64240,7 +64324,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86748">
+<interface name="corenet_tcp_connect_tcs_port" lineno="86766">
 <summary>
 Make a TCP connection to the tcs port.
 </summary>
@@ -64250,7 +64334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86768">
+<interface name="corenet_send_tcs_client_packets" lineno="86786">
 <summary>
 Send tcs_client packets.
 </summary>
@@ -64261,7 +64345,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86787">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805">
 <summary>
 Do not audit attempts to send tcs_client packets.
 </summary>
@@ -64272,7 +64356,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86806">
+<interface name="corenet_receive_tcs_client_packets" lineno="86824">
 <summary>
 Receive tcs_client packets.
 </summary>
@@ -64283,7 +64367,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86825">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843">
 <summary>
 Do not audit attempts to receive tcs_client packets.
 </summary>
@@ -64294,7 +64378,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86844">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862">
 <summary>
 Send and receive tcs_client packets.
 </summary>
@@ -64305,7 +64389,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86860">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878">
 <summary>
 Do not audit attempts to send and receive tcs_client packets.
 </summary>
@@ -64316,7 +64400,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86875">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="86893">
 <summary>
 Relabel packets to tcs_client the packet type.
 </summary>
@@ -64326,7 +64410,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86895">
+<interface name="corenet_send_tcs_server_packets" lineno="86913">
 <summary>
 Send tcs_server packets.
 </summary>
@@ -64337,7 +64421,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86914">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932">
 <summary>
 Do not audit attempts to send tcs_server packets.
 </summary>
@@ -64348,7 +64432,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86933">
+<interface name="corenet_receive_tcs_server_packets" lineno="86951">
 <summary>
 Receive tcs_server packets.
 </summary>
@@ -64359,7 +64443,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86952">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970">
 <summary>
 Do not audit attempts to receive tcs_server packets.
 </summary>
@@ -64370,7 +64454,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86971">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989">
 <summary>
 Send and receive tcs_server packets.
 </summary>
@@ -64381,7 +64465,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86987">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005">
 <summary>
 Do not audit attempts to send and receive tcs_server packets.
 </summary>
@@ -64392,7 +64476,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="87002">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="87020">
 <summary>
 Relabel packets to tcs_server the packet type.
 </summary>
@@ -64402,7 +64486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87024">
+<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042">
 <summary>
 Send and receive TCP traffic on the telnetd port.
 </summary>
@@ -64413,7 +64497,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="87039">
+<interface name="corenet_udp_send_telnetd_port" lineno="87057">
 <summary>
 Send UDP traffic on the telnetd port.
 </summary>
@@ -64424,7 +64508,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87054">
+<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072">
 <summary>
 Do not audit attempts to send UDP traffic on the telnetd port.
 </summary>
@@ -64435,7 +64519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="87069">
+<interface name="corenet_udp_receive_telnetd_port" lineno="87087">
 <summary>
 Receive UDP traffic on the telnetd port.
 </summary>
@@ -64446,7 +64530,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87084">
+<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102">
 <summary>
 Do not audit attempts to receive UDP traffic on the telnetd port.
 </summary>
@@ -64457,7 +64541,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87099">
+<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117">
 <summary>
 Send and receive UDP traffic on the telnetd port.
 </summary>
@@ -64468,7 +64552,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87115">
+<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the telnetd port.
@@ -64480,7 +64564,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="87130">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="87148">
 <summary>
 Bind TCP sockets to the telnetd port.
 </summary>
@@ -64491,7 +64575,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="87150">
+<interface name="corenet_udp_bind_telnetd_port" lineno="87168">
 <summary>
 Bind UDP sockets to the telnetd port.
 </summary>
@@ -64502,7 +64586,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="87169">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="87187">
 <summary>
 Make a TCP connection to the telnetd port.
 </summary>
@@ -64512,7 +64596,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="87189">
+<interface name="corenet_send_telnetd_client_packets" lineno="87207">
 <summary>
 Send telnetd_client packets.
 </summary>
@@ -64523,7 +64607,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87208">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226">
 <summary>
 Do not audit attempts to send telnetd_client packets.
 </summary>
@@ -64534,7 +64618,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="87227">
+<interface name="corenet_receive_telnetd_client_packets" lineno="87245">
 <summary>
 Receive telnetd_client packets.
 </summary>
@@ -64545,7 +64629,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87246">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264">
 <summary>
 Do not audit attempts to receive telnetd_client packets.
 </summary>
@@ -64556,7 +64640,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87265">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283">
 <summary>
 Send and receive telnetd_client packets.
 </summary>
@@ -64567,7 +64651,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87281">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299">
 <summary>
 Do not audit attempts to send and receive telnetd_client packets.
 </summary>
@@ -64578,7 +64662,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="87296">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314">
 <summary>
 Relabel packets to telnetd_client the packet type.
 </summary>
@@ -64588,7 +64672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="87316">
+<interface name="corenet_send_telnetd_server_packets" lineno="87334">
 <summary>
 Send telnetd_server packets.
 </summary>
@@ -64599,7 +64683,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87335">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353">
 <summary>
 Do not audit attempts to send telnetd_server packets.
 </summary>
@@ -64610,7 +64694,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="87354">
+<interface name="corenet_receive_telnetd_server_packets" lineno="87372">
 <summary>
 Receive telnetd_server packets.
 </summary>
@@ -64621,7 +64705,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87373">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391">
 <summary>
 Do not audit attempts to receive telnetd_server packets.
 </summary>
@@ -64632,7 +64716,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87392">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410">
 <summary>
 Send and receive telnetd_server packets.
 </summary>
@@ -64643,7 +64727,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87408">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426">
 <summary>
 Do not audit attempts to send and receive telnetd_server packets.
 </summary>
@@ -64654,7 +64738,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="87423">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441">
 <summary>
 Relabel packets to telnetd_server the packet type.
 </summary>
@@ -64664,7 +64748,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87445">
+<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463">
 <summary>
 Send and receive TCP traffic on the tftp port.
 </summary>
@@ -64675,7 +64759,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tftp_port" lineno="87460">
+<interface name="corenet_udp_send_tftp_port" lineno="87478">
 <summary>
 Send UDP traffic on the tftp port.
 </summary>
@@ -64686,7 +64770,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87475">
+<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493">
 <summary>
 Do not audit attempts to send UDP traffic on the tftp port.
 </summary>
@@ -64697,7 +64781,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="87490">
+<interface name="corenet_udp_receive_tftp_port" lineno="87508">
 <summary>
 Receive UDP traffic on the tftp port.
 </summary>
@@ -64708,7 +64792,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87505">
+<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523">
 <summary>
 Do not audit attempts to receive UDP traffic on the tftp port.
 </summary>
@@ -64719,7 +64803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="87520">
+<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538">
 <summary>
 Send and receive UDP traffic on the tftp port.
 </summary>
@@ -64730,7 +64814,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87536">
+<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tftp port.
@@ -64742,7 +64826,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87551">
+<interface name="corenet_tcp_bind_tftp_port" lineno="87569">
 <summary>
 Bind TCP sockets to the tftp port.
 </summary>
@@ -64753,7 +64837,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87571">
+<interface name="corenet_udp_bind_tftp_port" lineno="87589">
 <summary>
 Bind UDP sockets to the tftp port.
 </summary>
@@ -64764,7 +64848,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87590">
+<interface name="corenet_tcp_connect_tftp_port" lineno="87608">
 <summary>
 Make a TCP connection to the tftp port.
 </summary>
@@ -64774,7 +64858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87610">
+<interface name="corenet_send_tftp_client_packets" lineno="87628">
 <summary>
 Send tftp_client packets.
 </summary>
@@ -64785,7 +64869,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87629">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647">
 <summary>
 Do not audit attempts to send tftp_client packets.
 </summary>
@@ -64796,7 +64880,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87648">
+<interface name="corenet_receive_tftp_client_packets" lineno="87666">
 <summary>
 Receive tftp_client packets.
 </summary>
@@ -64807,7 +64891,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87667">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685">
 <summary>
 Do not audit attempts to receive tftp_client packets.
 </summary>
@@ -64818,7 +64902,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87686">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704">
 <summary>
 Send and receive tftp_client packets.
 </summary>
@@ -64829,7 +64913,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87702">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720">
 <summary>
 Do not audit attempts to send and receive tftp_client packets.
 </summary>
@@ -64840,7 +64924,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87717">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="87735">
 <summary>
 Relabel packets to tftp_client the packet type.
 </summary>
@@ -64850,7 +64934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87737">
+<interface name="corenet_send_tftp_server_packets" lineno="87755">
 <summary>
 Send tftp_server packets.
 </summary>
@@ -64861,7 +64945,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87756">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774">
 <summary>
 Do not audit attempts to send tftp_server packets.
 </summary>
@@ -64872,7 +64956,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87775">
+<interface name="corenet_receive_tftp_server_packets" lineno="87793">
 <summary>
 Receive tftp_server packets.
 </summary>
@@ -64883,7 +64967,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87794">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812">
 <summary>
 Do not audit attempts to receive tftp_server packets.
 </summary>
@@ -64894,7 +64978,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87813">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831">
 <summary>
 Send and receive tftp_server packets.
 </summary>
@@ -64905,7 +64989,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87829">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847">
 <summary>
 Do not audit attempts to send and receive tftp_server packets.
 </summary>
@@ -64916,7 +65000,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87844">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="87862">
 <summary>
 Relabel packets to tftp_server the packet type.
 </summary>
@@ -64926,7 +65010,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87866">
+<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884">
 <summary>
 Send and receive TCP traffic on the tor port.
 </summary>
@@ -64937,7 +65021,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_tor_port" lineno="87881">
+<interface name="corenet_udp_send_tor_port" lineno="87899">
 <summary>
 Send UDP traffic on the tor port.
 </summary>
@@ -64948,7 +65032,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87896">
+<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914">
 <summary>
 Do not audit attempts to send UDP traffic on the tor port.
 </summary>
@@ -64959,7 +65043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87911">
+<interface name="corenet_udp_receive_tor_port" lineno="87929">
 <summary>
 Receive UDP traffic on the tor port.
 </summary>
@@ -64970,7 +65054,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87926">
+<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944">
 <summary>
 Do not audit attempts to receive UDP traffic on the tor port.
 </summary>
@@ -64981,7 +65065,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87941">
+<interface name="corenet_udp_sendrecv_tor_port" lineno="87959">
 <summary>
 Send and receive UDP traffic on the tor port.
 </summary>
@@ -64992,7 +65076,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87957">
+<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the tor port.
@@ -65004,7 +65088,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87972">
+<interface name="corenet_tcp_bind_tor_port" lineno="87990">
 <summary>
 Bind TCP sockets to the tor port.
 </summary>
@@ -65015,7 +65099,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tor_port" lineno="87992">
+<interface name="corenet_udp_bind_tor_port" lineno="88010">
 <summary>
 Bind UDP sockets to the tor port.
 </summary>
@@ -65026,7 +65110,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="88011">
+<interface name="corenet_tcp_connect_tor_port" lineno="88029">
 <summary>
 Make a TCP connection to the tor port.
 </summary>
@@ -65036,7 +65120,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_client_packets" lineno="88031">
+<interface name="corenet_send_tor_client_packets" lineno="88049">
 <summary>
 Send tor_client packets.
 </summary>
@@ -65047,7 +65131,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88050">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068">
 <summary>
 Do not audit attempts to send tor_client packets.
 </summary>
@@ -65058,7 +65142,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_client_packets" lineno="88069">
+<interface name="corenet_receive_tor_client_packets" lineno="88087">
 <summary>
 Receive tor_client packets.
 </summary>
@@ -65069,7 +65153,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88088">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106">
 <summary>
 Do not audit attempts to receive tor_client packets.
 </summary>
@@ -65080,7 +65164,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="88107">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="88125">
 <summary>
 Send and receive tor_client packets.
 </summary>
@@ -65091,7 +65175,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88123">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141">
 <summary>
 Do not audit attempts to send and receive tor_client packets.
 </summary>
@@ -65102,7 +65186,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="88138">
+<interface name="corenet_relabelto_tor_client_packets" lineno="88156">
 <summary>
 Relabel packets to tor_client the packet type.
 </summary>
@@ -65112,7 +65196,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_server_packets" lineno="88158">
+<interface name="corenet_send_tor_server_packets" lineno="88176">
 <summary>
 Send tor_server packets.
 </summary>
@@ -65123,7 +65207,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88177">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195">
 <summary>
 Do not audit attempts to send tor_server packets.
 </summary>
@@ -65134,7 +65218,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_server_packets" lineno="88196">
+<interface name="corenet_receive_tor_server_packets" lineno="88214">
 <summary>
 Receive tor_server packets.
 </summary>
@@ -65145,7 +65229,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88215">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233">
 <summary>
 Do not audit attempts to receive tor_server packets.
 </summary>
@@ -65156,7 +65240,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="88234">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="88252">
 <summary>
 Send and receive tor_server packets.
 </summary>
@@ -65167,7 +65251,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88250">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268">
 <summary>
 Do not audit attempts to send and receive tor_server packets.
 </summary>
@@ -65178,7 +65262,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="88265">
+<interface name="corenet_relabelto_tor_server_packets" lineno="88283">
 <summary>
 Relabel packets to tor_server the packet type.
 </summary>
@@ -65188,7 +65272,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88287">
+<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305">
 <summary>
 Send and receive TCP traffic on the traceroute port.
 </summary>
@@ -65199,7 +65283,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="88302">
+<interface name="corenet_udp_send_traceroute_port" lineno="88320">
 <summary>
 Send UDP traffic on the traceroute port.
 </summary>
@@ -65210,7 +65294,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88317">
+<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335">
 <summary>
 Do not audit attempts to send UDP traffic on the traceroute port.
 </summary>
@@ -65221,7 +65305,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="88332">
+<interface name="corenet_udp_receive_traceroute_port" lineno="88350">
 <summary>
 Receive UDP traffic on the traceroute port.
 </summary>
@@ -65232,7 +65316,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88347">
+<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365">
 <summary>
 Do not audit attempts to receive UDP traffic on the traceroute port.
 </summary>
@@ -65243,7 +65327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88362">
+<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380">
 <summary>
 Send and receive UDP traffic on the traceroute port.
 </summary>
@@ -65254,7 +65338,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88378">
+<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the traceroute port.
@@ -65266,7 +65350,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="88393">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="88411">
 <summary>
 Bind TCP sockets to the traceroute port.
 </summary>
@@ -65277,7 +65361,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="88413">
+<interface name="corenet_udp_bind_traceroute_port" lineno="88431">
 <summary>
 Bind UDP sockets to the traceroute port.
 </summary>
@@ -65288,7 +65372,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="88432">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="88450">
 <summary>
 Make a TCP connection to the traceroute port.
 </summary>
@@ -65298,7 +65382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="88452">
+<interface name="corenet_send_traceroute_client_packets" lineno="88470">
 <summary>
 Send traceroute_client packets.
 </summary>
@@ -65309,7 +65393,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88471">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489">
 <summary>
 Do not audit attempts to send traceroute_client packets.
 </summary>
@@ -65320,7 +65404,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="88490">
+<interface name="corenet_receive_traceroute_client_packets" lineno="88508">
 <summary>
 Receive traceroute_client packets.
 </summary>
@@ -65331,7 +65415,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88509">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527">
 <summary>
 Do not audit attempts to receive traceroute_client packets.
 </summary>
@@ -65342,7 +65426,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88528">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546">
 <summary>
 Send and receive traceroute_client packets.
 </summary>
@@ -65353,7 +65437,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88544">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562">
 <summary>
 Do not audit attempts to send and receive traceroute_client packets.
 </summary>
@@ -65364,7 +65448,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88559">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577">
 <summary>
 Relabel packets to traceroute_client the packet type.
 </summary>
@@ -65374,7 +65458,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88579">
+<interface name="corenet_send_traceroute_server_packets" lineno="88597">
 <summary>
 Send traceroute_server packets.
 </summary>
@@ -65385,7 +65469,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88598">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616">
 <summary>
 Do not audit attempts to send traceroute_server packets.
 </summary>
@@ -65396,7 +65480,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88617">
+<interface name="corenet_receive_traceroute_server_packets" lineno="88635">
 <summary>
 Receive traceroute_server packets.
 </summary>
@@ -65407,7 +65491,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88636">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654">
 <summary>
 Do not audit attempts to receive traceroute_server packets.
 </summary>
@@ -65418,7 +65502,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88655">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673">
 <summary>
 Send and receive traceroute_server packets.
 </summary>
@@ -65429,7 +65513,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88671">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689">
 <summary>
 Do not audit attempts to send and receive traceroute_server packets.
 </summary>
@@ -65440,7 +65524,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88686">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704">
 <summary>
 Relabel packets to traceroute_server the packet type.
 </summary>
@@ -65450,7 +65534,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88708">
+<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726">
 <summary>
 Send and receive TCP traffic on the transproxy port.
 </summary>
@@ -65461,7 +65545,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88723">
+<interface name="corenet_udp_send_transproxy_port" lineno="88741">
 <summary>
 Send UDP traffic on the transproxy port.
 </summary>
@@ -65472,7 +65556,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88738">
+<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756">
 <summary>
 Do not audit attempts to send UDP traffic on the transproxy port.
 </summary>
@@ -65483,7 +65567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88753">
+<interface name="corenet_udp_receive_transproxy_port" lineno="88771">
 <summary>
 Receive UDP traffic on the transproxy port.
 </summary>
@@ -65494,7 +65578,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88768">
+<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786">
 <summary>
 Do not audit attempts to receive UDP traffic on the transproxy port.
 </summary>
@@ -65505,7 +65589,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88783">
+<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801">
 <summary>
 Send and receive UDP traffic on the transproxy port.
 </summary>
@@ -65516,7 +65600,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88799">
+<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the transproxy port.
@@ -65528,7 +65612,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88814">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="88832">
 <summary>
 Bind TCP sockets to the transproxy port.
 </summary>
@@ -65539,7 +65623,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88834">
+<interface name="corenet_udp_bind_transproxy_port" lineno="88852">
 <summary>
 Bind UDP sockets to the transproxy port.
 </summary>
@@ -65550,7 +65634,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88853">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="88871">
 <summary>
 Make a TCP connection to the transproxy port.
 </summary>
@@ -65560,7 +65644,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88873">
+<interface name="corenet_send_transproxy_client_packets" lineno="88891">
 <summary>
 Send transproxy_client packets.
 </summary>
@@ -65571,7 +65655,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88892">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910">
 <summary>
 Do not audit attempts to send transproxy_client packets.
 </summary>
@@ -65582,7 +65666,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88911">
+<interface name="corenet_receive_transproxy_client_packets" lineno="88929">
 <summary>
 Receive transproxy_client packets.
 </summary>
@@ -65593,7 +65677,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88930">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948">
 <summary>
 Do not audit attempts to receive transproxy_client packets.
 </summary>
@@ -65604,7 +65688,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88949">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967">
 <summary>
 Send and receive transproxy_client packets.
 </summary>
@@ -65615,7 +65699,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88965">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983">
 <summary>
 Do not audit attempts to send and receive transproxy_client packets.
 </summary>
@@ -65626,7 +65710,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88980">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998">
 <summary>
 Relabel packets to transproxy_client the packet type.
 </summary>
@@ -65636,7 +65720,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="89000">
+<interface name="corenet_send_transproxy_server_packets" lineno="89018">
 <summary>
 Send transproxy_server packets.
 </summary>
@@ -65647,7 +65731,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89019">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037">
 <summary>
 Do not audit attempts to send transproxy_server packets.
 </summary>
@@ -65658,7 +65742,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="89038">
+<interface name="corenet_receive_transproxy_server_packets" lineno="89056">
 <summary>
 Receive transproxy_server packets.
 </summary>
@@ -65669,7 +65753,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89057">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075">
 <summary>
 Do not audit attempts to receive transproxy_server packets.
 </summary>
@@ -65680,7 +65764,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89076">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094">
 <summary>
 Send and receive transproxy_server packets.
 </summary>
@@ -65691,7 +65775,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89092">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110">
 <summary>
 Do not audit attempts to send and receive transproxy_server packets.
 </summary>
@@ -65702,7 +65786,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="89107">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125">
 <summary>
 Relabel packets to transproxy_server the packet type.
 </summary>
@@ -65712,7 +65796,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89129">
+<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147">
 <summary>
 Send and receive TCP traffic on the trisoap port.
 </summary>
@@ -65723,7 +65807,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="89144">
+<interface name="corenet_udp_send_trisoap_port" lineno="89162">
 <summary>
 Send UDP traffic on the trisoap port.
 </summary>
@@ -65734,7 +65818,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89159">
+<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177">
 <summary>
 Do not audit attempts to send UDP traffic on the trisoap port.
 </summary>
@@ -65745,7 +65829,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="89174">
+<interface name="corenet_udp_receive_trisoap_port" lineno="89192">
 <summary>
 Receive UDP traffic on the trisoap port.
 </summary>
@@ -65756,7 +65840,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89189">
+<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207">
 <summary>
 Do not audit attempts to receive UDP traffic on the trisoap port.
 </summary>
@@ -65767,7 +65851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89204">
+<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222">
 <summary>
 Send and receive UDP traffic on the trisoap port.
 </summary>
@@ -65778,7 +65862,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89220">
+<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the trisoap port.
@@ -65790,7 +65874,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="89235">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="89253">
 <summary>
 Bind TCP sockets to the trisoap port.
 </summary>
@@ -65801,7 +65885,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="89255">
+<interface name="corenet_udp_bind_trisoap_port" lineno="89273">
 <summary>
 Bind UDP sockets to the trisoap port.
 </summary>
@@ -65812,7 +65896,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="89274">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="89292">
 <summary>
 Make a TCP connection to the trisoap port.
 </summary>
@@ -65822,7 +65906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="89294">
+<interface name="corenet_send_trisoap_client_packets" lineno="89312">
 <summary>
 Send trisoap_client packets.
 </summary>
@@ -65833,7 +65917,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89313">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331">
 <summary>
 Do not audit attempts to send trisoap_client packets.
 </summary>
@@ -65844,7 +65928,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="89332">
+<interface name="corenet_receive_trisoap_client_packets" lineno="89350">
 <summary>
 Receive trisoap_client packets.
 </summary>
@@ -65855,7 +65939,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89351">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369">
 <summary>
 Do not audit attempts to receive trisoap_client packets.
 </summary>
@@ -65866,7 +65950,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89370">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388">
 <summary>
 Send and receive trisoap_client packets.
 </summary>
@@ -65877,7 +65961,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89386">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404">
 <summary>
 Do not audit attempts to send and receive trisoap_client packets.
 </summary>
@@ -65888,7 +65972,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="89401">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419">
 <summary>
 Relabel packets to trisoap_client the packet type.
 </summary>
@@ -65898,7 +65982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="89421">
+<interface name="corenet_send_trisoap_server_packets" lineno="89439">
 <summary>
 Send trisoap_server packets.
 </summary>
@@ -65909,7 +65993,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89440">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458">
 <summary>
 Do not audit attempts to send trisoap_server packets.
 </summary>
@@ -65920,7 +66004,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="89459">
+<interface name="corenet_receive_trisoap_server_packets" lineno="89477">
 <summary>
 Receive trisoap_server packets.
 </summary>
@@ -65931,7 +66015,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89478">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496">
 <summary>
 Do not audit attempts to receive trisoap_server packets.
 </summary>
@@ -65942,7 +66026,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89497">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515">
 <summary>
 Send and receive trisoap_server packets.
 </summary>
@@ -65953,7 +66037,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89513">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531">
 <summary>
 Do not audit attempts to send and receive trisoap_server packets.
 </summary>
@@ -65964,7 +66048,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="89528">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546">
 <summary>
 Relabel packets to trisoap_server the packet type.
 </summary>
@@ -65974,7 +66058,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89550">
+<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568">
 <summary>
 Send and receive TCP traffic on the trivnet1 port.
 </summary>
@@ -65985,7 +66069,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89565">
+<interface name="corenet_udp_send_trivnet1_port" lineno="89583">
 <summary>
 Send UDP traffic on the trivnet1 port.
 </summary>
@@ -65996,7 +66080,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89580">
+<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598">
 <summary>
 Do not audit attempts to send UDP traffic on the trivnet1 port.
 </summary>
@@ -66007,7 +66091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89595">
+<interface name="corenet_udp_receive_trivnet1_port" lineno="89613">
 <summary>
 Receive UDP traffic on the trivnet1 port.
 </summary>
@@ -66018,7 +66102,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89610">
+<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628">
 <summary>
 Do not audit attempts to receive UDP traffic on the trivnet1 port.
 </summary>
@@ -66029,7 +66113,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89625">
+<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643">
 <summary>
 Send and receive UDP traffic on the trivnet1 port.
 </summary>
@@ -66040,7 +66124,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89641">
+<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the trivnet1 port.
@@ -66052,7 +66136,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89656">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674">
 <summary>
 Bind TCP sockets to the trivnet1 port.
 </summary>
@@ -66063,7 +66147,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89676">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="89694">
 <summary>
 Bind UDP sockets to the trivnet1 port.
 </summary>
@@ -66074,7 +66158,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89695">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713">
 <summary>
 Make a TCP connection to the trivnet1 port.
 </summary>
@@ -66084,7 +66168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89715">
+<interface name="corenet_send_trivnet1_client_packets" lineno="89733">
 <summary>
 Send trivnet1_client packets.
 </summary>
@@ -66095,7 +66179,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89734">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752">
 <summary>
 Do not audit attempts to send trivnet1_client packets.
 </summary>
@@ -66106,7 +66190,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89753">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="89771">
 <summary>
 Receive trivnet1_client packets.
 </summary>
@@ -66117,7 +66201,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89772">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790">
 <summary>
 Do not audit attempts to receive trivnet1_client packets.
 </summary>
@@ -66128,7 +66212,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89791">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809">
 <summary>
 Send and receive trivnet1_client packets.
 </summary>
@@ -66139,7 +66223,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89807">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825">
 <summary>
 Do not audit attempts to send and receive trivnet1_client packets.
 </summary>
@@ -66150,7 +66234,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89822">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840">
 <summary>
 Relabel packets to trivnet1_client the packet type.
 </summary>
@@ -66160,7 +66244,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89842">
+<interface name="corenet_send_trivnet1_server_packets" lineno="89860">
 <summary>
 Send trivnet1_server packets.
 </summary>
@@ -66171,7 +66255,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89861">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879">
 <summary>
 Do not audit attempts to send trivnet1_server packets.
 </summary>
@@ -66182,7 +66266,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89880">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="89898">
 <summary>
 Receive trivnet1_server packets.
 </summary>
@@ -66193,7 +66277,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89899">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917">
 <summary>
 Do not audit attempts to receive trivnet1_server packets.
 </summary>
@@ -66204,7 +66288,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89918">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936">
 <summary>
 Send and receive trivnet1_server packets.
 </summary>
@@ -66215,7 +66299,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89934">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952">
 <summary>
 Do not audit attempts to send and receive trivnet1_server packets.
 </summary>
@@ -66226,7 +66310,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89949">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967">
 <summary>
 Relabel packets to trivnet1_server the packet type.
 </summary>
@@ -66236,7 +66320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89971">
+<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989">
 <summary>
 Send and receive TCP traffic on the ups port.
 </summary>
@@ -66247,7 +66331,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_ups_port" lineno="89986">
+<interface name="corenet_udp_send_ups_port" lineno="90004">
 <summary>
 Send UDP traffic on the ups port.
 </summary>
@@ -66258,7 +66342,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90001">
+<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019">
 <summary>
 Do not audit attempts to send UDP traffic on the ups port.
 </summary>
@@ -66269,7 +66353,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ups_port" lineno="90016">
+<interface name="corenet_udp_receive_ups_port" lineno="90034">
 <summary>
 Receive UDP traffic on the ups port.
 </summary>
@@ -66280,7 +66364,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90031">
+<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049">
 <summary>
 Do not audit attempts to receive UDP traffic on the ups port.
 </summary>
@@ -66291,7 +66375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="90046">
+<interface name="corenet_udp_sendrecv_ups_port" lineno="90064">
 <summary>
 Send and receive UDP traffic on the ups port.
 </summary>
@@ -66302,7 +66386,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90062">
+<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the ups port.
@@ -66314,7 +66398,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="90077">
+<interface name="corenet_tcp_bind_ups_port" lineno="90095">
 <summary>
 Bind TCP sockets to the ups port.
 </summary>
@@ -66325,7 +66409,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ups_port" lineno="90097">
+<interface name="corenet_udp_bind_ups_port" lineno="90115">
 <summary>
 Bind UDP sockets to the ups port.
 </summary>
@@ -66336,7 +66420,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="90116">
+<interface name="corenet_tcp_connect_ups_port" lineno="90134">
 <summary>
 Make a TCP connection to the ups port.
 </summary>
@@ -66346,7 +66430,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_client_packets" lineno="90136">
+<interface name="corenet_send_ups_client_packets" lineno="90154">
 <summary>
 Send ups_client packets.
 </summary>
@@ -66357,7 +66441,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90155">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173">
 <summary>
 Do not audit attempts to send ups_client packets.
 </summary>
@@ -66368,7 +66452,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_client_packets" lineno="90174">
+<interface name="corenet_receive_ups_client_packets" lineno="90192">
 <summary>
 Receive ups_client packets.
 </summary>
@@ -66379,7 +66463,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90193">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211">
 <summary>
 Do not audit attempts to receive ups_client packets.
 </summary>
@@ -66390,7 +66474,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="90212">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="90230">
 <summary>
 Send and receive ups_client packets.
 </summary>
@@ -66401,7 +66485,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90228">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246">
 <summary>
 Do not audit attempts to send and receive ups_client packets.
 </summary>
@@ -66412,7 +66496,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="90243">
+<interface name="corenet_relabelto_ups_client_packets" lineno="90261">
 <summary>
 Relabel packets to ups_client the packet type.
 </summary>
@@ -66422,7 +66506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_server_packets" lineno="90263">
+<interface name="corenet_send_ups_server_packets" lineno="90281">
 <summary>
 Send ups_server packets.
 </summary>
@@ -66433,7 +66517,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90282">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300">
 <summary>
 Do not audit attempts to send ups_server packets.
 </summary>
@@ -66444,7 +66528,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_server_packets" lineno="90301">
+<interface name="corenet_receive_ups_server_packets" lineno="90319">
 <summary>
 Receive ups_server packets.
 </summary>
@@ -66455,7 +66539,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90320">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338">
 <summary>
 Do not audit attempts to receive ups_server packets.
 </summary>
@@ -66466,7 +66550,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="90339">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="90357">
 <summary>
 Send and receive ups_server packets.
 </summary>
@@ -66477,7 +66561,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90355">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373">
 <summary>
 Do not audit attempts to send and receive ups_server packets.
 </summary>
@@ -66488,7 +66572,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="90370">
+<interface name="corenet_relabelto_ups_server_packets" lineno="90388">
 <summary>
 Relabel packets to ups_server the packet type.
 </summary>
@@ -66498,7 +66582,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90392">
+<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410">
 <summary>
 Send and receive TCP traffic on the utcpserver port.
 </summary>
@@ -66509,7 +66593,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="90407">
+<interface name="corenet_udp_send_utcpserver_port" lineno="90425">
 <summary>
 Send UDP traffic on the utcpserver port.
 </summary>
@@ -66520,7 +66604,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90422">
+<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440">
 <summary>
 Do not audit attempts to send UDP traffic on the utcpserver port.
 </summary>
@@ -66531,7 +66615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="90437">
+<interface name="corenet_udp_receive_utcpserver_port" lineno="90455">
 <summary>
 Receive UDP traffic on the utcpserver port.
 </summary>
@@ -66542,7 +66626,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90452">
+<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470">
 <summary>
 Do not audit attempts to receive UDP traffic on the utcpserver port.
 </summary>
@@ -66553,7 +66637,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90467">
+<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485">
 <summary>
 Send and receive UDP traffic on the utcpserver port.
 </summary>
@@ -66564,7 +66648,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90483">
+<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the utcpserver port.
@@ -66576,7 +66660,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="90498">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516">
 <summary>
 Bind TCP sockets to the utcpserver port.
 </summary>
@@ -66587,7 +66671,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="90518">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="90536">
 <summary>
 Bind UDP sockets to the utcpserver port.
 </summary>
@@ -66598,7 +66682,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="90537">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555">
 <summary>
 Make a TCP connection to the utcpserver port.
 </summary>
@@ -66608,7 +66692,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90557">
+<interface name="corenet_send_utcpserver_client_packets" lineno="90575">
 <summary>
 Send utcpserver_client packets.
 </summary>
@@ -66619,7 +66703,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90576">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594">
 <summary>
 Do not audit attempts to send utcpserver_client packets.
 </summary>
@@ -66630,7 +66714,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90595">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="90613">
 <summary>
 Receive utcpserver_client packets.
 </summary>
@@ -66641,7 +66725,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90614">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632">
 <summary>
 Do not audit attempts to receive utcpserver_client packets.
 </summary>
@@ -66652,7 +66736,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90633">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651">
 <summary>
 Send and receive utcpserver_client packets.
 </summary>
@@ -66663,7 +66747,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90649">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667">
 <summary>
 Do not audit attempts to send and receive utcpserver_client packets.
 </summary>
@@ -66674,7 +66758,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90664">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682">
 <summary>
 Relabel packets to utcpserver_client the packet type.
 </summary>
@@ -66684,7 +66768,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90684">
+<interface name="corenet_send_utcpserver_server_packets" lineno="90702">
 <summary>
 Send utcpserver_server packets.
 </summary>
@@ -66695,7 +66779,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90703">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721">
 <summary>
 Do not audit attempts to send utcpserver_server packets.
 </summary>
@@ -66706,7 +66790,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90722">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="90740">
 <summary>
 Receive utcpserver_server packets.
 </summary>
@@ -66717,7 +66801,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90741">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759">
 <summary>
 Do not audit attempts to receive utcpserver_server packets.
 </summary>
@@ -66728,7 +66812,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90760">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778">
 <summary>
 Send and receive utcpserver_server packets.
 </summary>
@@ -66739,7 +66823,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90776">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794">
 <summary>
 Do not audit attempts to send and receive utcpserver_server packets.
 </summary>
@@ -66750,7 +66834,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90791">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809">
 <summary>
 Relabel packets to utcpserver_server the packet type.
 </summary>
@@ -66760,7 +66844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90813">
+<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831">
 <summary>
 Send and receive TCP traffic on the uucpd port.
 </summary>
@@ -66771,7 +66855,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90828">
+<interface name="corenet_udp_send_uucpd_port" lineno="90846">
 <summary>
 Send UDP traffic on the uucpd port.
 </summary>
@@ -66782,7 +66866,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90843">
+<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861">
 <summary>
 Do not audit attempts to send UDP traffic on the uucpd port.
 </summary>
@@ -66793,7 +66877,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90858">
+<interface name="corenet_udp_receive_uucpd_port" lineno="90876">
 <summary>
 Receive UDP traffic on the uucpd port.
 </summary>
@@ -66804,7 +66888,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90873">
+<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891">
 <summary>
 Do not audit attempts to receive UDP traffic on the uucpd port.
 </summary>
@@ -66815,7 +66899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90888">
+<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906">
 <summary>
 Send and receive UDP traffic on the uucpd port.
 </summary>
@@ -66826,7 +66910,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90904">
+<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the uucpd port.
@@ -66838,7 +66922,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90919">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="90937">
 <summary>
 Bind TCP sockets to the uucpd port.
 </summary>
@@ -66849,7 +66933,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90939">
+<interface name="corenet_udp_bind_uucpd_port" lineno="90957">
 <summary>
 Bind UDP sockets to the uucpd port.
 </summary>
@@ -66860,7 +66944,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90958">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="90976">
 <summary>
 Make a TCP connection to the uucpd port.
 </summary>
@@ -66870,7 +66954,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90978">
+<interface name="corenet_send_uucpd_client_packets" lineno="90996">
 <summary>
 Send uucpd_client packets.
 </summary>
@@ -66881,7 +66965,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90997">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015">
 <summary>
 Do not audit attempts to send uucpd_client packets.
 </summary>
@@ -66892,7 +66976,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="91016">
+<interface name="corenet_receive_uucpd_client_packets" lineno="91034">
 <summary>
 Receive uucpd_client packets.
 </summary>
@@ -66903,7 +66987,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91035">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053">
 <summary>
 Do not audit attempts to receive uucpd_client packets.
 </summary>
@@ -66914,7 +66998,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91054">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072">
 <summary>
 Send and receive uucpd_client packets.
 </summary>
@@ -66925,7 +67009,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91070">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088">
 <summary>
 Do not audit attempts to send and receive uucpd_client packets.
 </summary>
@@ -66936,7 +67020,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="91085">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103">
 <summary>
 Relabel packets to uucpd_client the packet type.
 </summary>
@@ -66946,7 +67030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="91105">
+<interface name="corenet_send_uucpd_server_packets" lineno="91123">
 <summary>
 Send uucpd_server packets.
 </summary>
@@ -66957,7 +67041,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91124">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142">
 <summary>
 Do not audit attempts to send uucpd_server packets.
 </summary>
@@ -66968,7 +67052,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="91143">
+<interface name="corenet_receive_uucpd_server_packets" lineno="91161">
 <summary>
 Receive uucpd_server packets.
 </summary>
@@ -66979,7 +67063,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91162">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180">
 <summary>
 Do not audit attempts to receive uucpd_server packets.
 </summary>
@@ -66990,7 +67074,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91181">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199">
 <summary>
 Send and receive uucpd_server packets.
 </summary>
@@ -67001,7 +67085,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91197">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215">
 <summary>
 Do not audit attempts to send and receive uucpd_server packets.
 </summary>
@@ -67012,7 +67096,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="91212">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230">
 <summary>
 Relabel packets to uucpd_server the packet type.
 </summary>
@@ -67022,7 +67106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91234">
+<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252">
 <summary>
 Send and receive TCP traffic on the varnishd port.
 </summary>
@@ -67033,7 +67117,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="91249">
+<interface name="corenet_udp_send_varnishd_port" lineno="91267">
 <summary>
 Send UDP traffic on the varnishd port.
 </summary>
@@ -67044,7 +67128,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91264">
+<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282">
 <summary>
 Do not audit attempts to send UDP traffic on the varnishd port.
 </summary>
@@ -67055,7 +67139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="91279">
+<interface name="corenet_udp_receive_varnishd_port" lineno="91297">
 <summary>
 Receive UDP traffic on the varnishd port.
 </summary>
@@ -67066,7 +67150,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91294">
+<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312">
 <summary>
 Do not audit attempts to receive UDP traffic on the varnishd port.
 </summary>
@@ -67077,7 +67161,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91309">
+<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327">
 <summary>
 Send and receive UDP traffic on the varnishd port.
 </summary>
@@ -67088,7 +67172,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91325">
+<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the varnishd port.
@@ -67100,7 +67184,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="91340">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="91358">
 <summary>
 Bind TCP sockets to the varnishd port.
 </summary>
@@ -67111,7 +67195,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="91360">
+<interface name="corenet_udp_bind_varnishd_port" lineno="91378">
 <summary>
 Bind UDP sockets to the varnishd port.
 </summary>
@@ -67122,7 +67206,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="91379">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="91397">
 <summary>
 Make a TCP connection to the varnishd port.
 </summary>
@@ -67132,7 +67216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="91399">
+<interface name="corenet_send_varnishd_client_packets" lineno="91417">
 <summary>
 Send varnishd_client packets.
 </summary>
@@ -67143,7 +67227,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91418">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436">
 <summary>
 Do not audit attempts to send varnishd_client packets.
 </summary>
@@ -67154,7 +67238,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="91437">
+<interface name="corenet_receive_varnishd_client_packets" lineno="91455">
 <summary>
 Receive varnishd_client packets.
 </summary>
@@ -67165,7 +67249,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91456">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474">
 <summary>
 Do not audit attempts to receive varnishd_client packets.
 </summary>
@@ -67176,7 +67260,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91475">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493">
 <summary>
 Send and receive varnishd_client packets.
 </summary>
@@ -67187,7 +67271,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91491">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509">
 <summary>
 Do not audit attempts to send and receive varnishd_client packets.
 </summary>
@@ -67198,7 +67282,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="91506">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524">
 <summary>
 Relabel packets to varnishd_client the packet type.
 </summary>
@@ -67208,7 +67292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="91526">
+<interface name="corenet_send_varnishd_server_packets" lineno="91544">
 <summary>
 Send varnishd_server packets.
 </summary>
@@ -67219,7 +67303,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91545">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563">
 <summary>
 Do not audit attempts to send varnishd_server packets.
 </summary>
@@ -67230,7 +67314,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91564">
+<interface name="corenet_receive_varnishd_server_packets" lineno="91582">
 <summary>
 Receive varnishd_server packets.
 </summary>
@@ -67241,7 +67325,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91583">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601">
 <summary>
 Do not audit attempts to receive varnishd_server packets.
 </summary>
@@ -67252,7 +67336,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91602">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620">
 <summary>
 Send and receive varnishd_server packets.
 </summary>
@@ -67263,7 +67347,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91618">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636">
 <summary>
 Do not audit attempts to send and receive varnishd_server packets.
 </summary>
@@ -67274,7 +67358,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91633">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651">
 <summary>
 Relabel packets to varnishd_server the packet type.
 </summary>
@@ -67284,7 +67368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91655">
+<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673">
 <summary>
 Send and receive TCP traffic on the virt port.
 </summary>
@@ -67295,7 +67379,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virt_port" lineno="91670">
+<interface name="corenet_udp_send_virt_port" lineno="91688">
 <summary>
 Send UDP traffic on the virt port.
 </summary>
@@ -67306,7 +67390,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91685">
+<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703">
 <summary>
 Do not audit attempts to send UDP traffic on the virt port.
 </summary>
@@ -67317,7 +67401,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91700">
+<interface name="corenet_udp_receive_virt_port" lineno="91718">
 <summary>
 Receive UDP traffic on the virt port.
 </summary>
@@ -67328,7 +67412,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91715">
+<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733">
 <summary>
 Do not audit attempts to receive UDP traffic on the virt port.
 </summary>
@@ -67339,7 +67423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91730">
+<interface name="corenet_udp_sendrecv_virt_port" lineno="91748">
 <summary>
 Send and receive UDP traffic on the virt port.
 </summary>
@@ -67350,7 +67434,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91746">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virt port.
@@ -67362,7 +67446,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91761">
+<interface name="corenet_tcp_bind_virt_port" lineno="91779">
 <summary>
 Bind TCP sockets to the virt port.
 </summary>
@@ -67373,7 +67457,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91781">
+<interface name="corenet_udp_bind_virt_port" lineno="91799">
 <summary>
 Bind UDP sockets to the virt port.
 </summary>
@@ -67384,7 +67468,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91800">
+<interface name="corenet_tcp_connect_virt_port" lineno="91818">
 <summary>
 Make a TCP connection to the virt port.
 </summary>
@@ -67394,7 +67478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_client_packets" lineno="91820">
+<interface name="corenet_send_virt_client_packets" lineno="91838">
 <summary>
 Send virt_client packets.
 </summary>
@@ -67405,7 +67489,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91839">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857">
 <summary>
 Do not audit attempts to send virt_client packets.
 </summary>
@@ -67416,7 +67500,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91858">
+<interface name="corenet_receive_virt_client_packets" lineno="91876">
 <summary>
 Receive virt_client packets.
 </summary>
@@ -67427,7 +67511,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91877">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895">
 <summary>
 Do not audit attempts to receive virt_client packets.
 </summary>
@@ -67438,7 +67522,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91896">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="91914">
 <summary>
 Send and receive virt_client packets.
 </summary>
@@ -67449,7 +67533,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91912">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930">
 <summary>
 Do not audit attempts to send and receive virt_client packets.
 </summary>
@@ -67460,7 +67544,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91927">
+<interface name="corenet_relabelto_virt_client_packets" lineno="91945">
 <summary>
 Relabel packets to virt_client the packet type.
 </summary>
@@ -67470,7 +67554,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_server_packets" lineno="91947">
+<interface name="corenet_send_virt_server_packets" lineno="91965">
 <summary>
 Send virt_server packets.
 </summary>
@@ -67481,7 +67565,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91966">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984">
 <summary>
 Do not audit attempts to send virt_server packets.
 </summary>
@@ -67492,7 +67576,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_server_packets" lineno="91985">
+<interface name="corenet_receive_virt_server_packets" lineno="92003">
 <summary>
 Receive virt_server packets.
 </summary>
@@ -67503,7 +67587,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92004">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022">
 <summary>
 Do not audit attempts to receive virt_server packets.
 </summary>
@@ -67514,7 +67598,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="92023">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="92041">
 <summary>
 Send and receive virt_server packets.
 </summary>
@@ -67525,7 +67609,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92039">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057">
 <summary>
 Do not audit attempts to send and receive virt_server packets.
 </summary>
@@ -67536,7 +67620,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="92054">
+<interface name="corenet_relabelto_virt_server_packets" lineno="92072">
 <summary>
 Relabel packets to virt_server the packet type.
 </summary>
@@ -67546,7 +67630,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92076">
+<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094">
 <summary>
 Send and receive TCP traffic on the virtual_places port.
 </summary>
@@ -67557,7 +67641,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="92091">
+<interface name="corenet_udp_send_virtual_places_port" lineno="92109">
 <summary>
 Send UDP traffic on the virtual_places port.
 </summary>
@@ -67568,7 +67652,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92106">
+<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124">
 <summary>
 Do not audit attempts to send UDP traffic on the virtual_places port.
 </summary>
@@ -67579,7 +67663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="92121">
+<interface name="corenet_udp_receive_virtual_places_port" lineno="92139">
 <summary>
 Receive UDP traffic on the virtual_places port.
 </summary>
@@ -67590,7 +67674,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92136">
+<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154">
 <summary>
 Do not audit attempts to receive UDP traffic on the virtual_places port.
 </summary>
@@ -67601,7 +67685,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92151">
+<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169">
 <summary>
 Send and receive UDP traffic on the virtual_places port.
 </summary>
@@ -67612,7 +67696,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92167">
+<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virtual_places port.
@@ -67624,7 +67708,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="92182">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200">
 <summary>
 Bind TCP sockets to the virtual_places port.
 </summary>
@@ -67635,7 +67719,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="92202">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="92220">
 <summary>
 Bind UDP sockets to the virtual_places port.
 </summary>
@@ -67646,7 +67730,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="92221">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239">
 <summary>
 Make a TCP connection to the virtual_places port.
 </summary>
@@ -67656,7 +67740,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="92241">
+<interface name="corenet_send_virtual_places_client_packets" lineno="92259">
 <summary>
 Send virtual_places_client packets.
 </summary>
@@ -67667,7 +67751,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92260">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278">
 <summary>
 Do not audit attempts to send virtual_places_client packets.
 </summary>
@@ -67678,7 +67762,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="92279">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="92297">
 <summary>
 Receive virtual_places_client packets.
 </summary>
@@ -67689,7 +67773,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92298">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316">
 <summary>
 Do not audit attempts to receive virtual_places_client packets.
 </summary>
@@ -67700,7 +67784,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92317">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335">
 <summary>
 Send and receive virtual_places_client packets.
 </summary>
@@ -67711,7 +67795,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92333">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351">
 <summary>
 Do not audit attempts to send and receive virtual_places_client packets.
 </summary>
@@ -67722,7 +67806,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92348">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366">
 <summary>
 Relabel packets to virtual_places_client the packet type.
 </summary>
@@ -67732,7 +67816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="92368">
+<interface name="corenet_send_virtual_places_server_packets" lineno="92386">
 <summary>
 Send virtual_places_server packets.
 </summary>
@@ -67743,7 +67827,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92387">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405">
 <summary>
 Do not audit attempts to send virtual_places_server packets.
 </summary>
@@ -67754,7 +67838,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="92406">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="92424">
 <summary>
 Receive virtual_places_server packets.
 </summary>
@@ -67765,7 +67849,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92425">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443">
 <summary>
 Do not audit attempts to receive virtual_places_server packets.
 </summary>
@@ -67776,7 +67860,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92444">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462">
 <summary>
 Send and receive virtual_places_server packets.
 </summary>
@@ -67787,7 +67871,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92460">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478">
 <summary>
 Do not audit attempts to send and receive virtual_places_server packets.
 </summary>
@@ -67798,7 +67882,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92475">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493">
 <summary>
 Relabel packets to virtual_places_server the packet type.
 </summary>
@@ -67808,7 +67892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92497">
+<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515">
 <summary>
 Send and receive TCP traffic on the virt_migration port.
 </summary>
@@ -67819,7 +67903,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="92512">
+<interface name="corenet_udp_send_virt_migration_port" lineno="92530">
 <summary>
 Send UDP traffic on the virt_migration port.
 </summary>
@@ -67830,7 +67914,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92527">
+<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545">
 <summary>
 Do not audit attempts to send UDP traffic on the virt_migration port.
 </summary>
@@ -67841,7 +67925,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="92542">
+<interface name="corenet_udp_receive_virt_migration_port" lineno="92560">
 <summary>
 Receive UDP traffic on the virt_migration port.
 </summary>
@@ -67852,7 +67936,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92557">
+<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575">
 <summary>
 Do not audit attempts to receive UDP traffic on the virt_migration port.
 </summary>
@@ -67863,7 +67947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92572">
+<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590">
 <summary>
 Send and receive UDP traffic on the virt_migration port.
 </summary>
@@ -67874,7 +67958,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92588">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the virt_migration port.
@@ -67886,7 +67970,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92603">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621">
 <summary>
 Bind TCP sockets to the virt_migration port.
 </summary>
@@ -67897,7 +67981,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92623">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="92641">
 <summary>
 Bind UDP sockets to the virt_migration port.
 </summary>
@@ -67908,7 +67992,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92642">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660">
 <summary>
 Make a TCP connection to the virt_migration port.
 </summary>
@@ -67918,7 +68002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92662">
+<interface name="corenet_send_virt_migration_client_packets" lineno="92680">
 <summary>
 Send virt_migration_client packets.
 </summary>
@@ -67929,7 +68013,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92681">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699">
 <summary>
 Do not audit attempts to send virt_migration_client packets.
 </summary>
@@ -67940,7 +68024,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92700">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="92718">
 <summary>
 Receive virt_migration_client packets.
 </summary>
@@ -67951,7 +68035,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92719">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737">
 <summary>
 Do not audit attempts to receive virt_migration_client packets.
 </summary>
@@ -67962,7 +68046,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92738">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756">
 <summary>
 Send and receive virt_migration_client packets.
 </summary>
@@ -67973,7 +68057,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92754">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772">
 <summary>
 Do not audit attempts to send and receive virt_migration_client packets.
 </summary>
@@ -67984,7 +68068,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92769">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787">
 <summary>
 Relabel packets to virt_migration_client the packet type.
 </summary>
@@ -67994,7 +68078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92789">
+<interface name="corenet_send_virt_migration_server_packets" lineno="92807">
 <summary>
 Send virt_migration_server packets.
 </summary>
@@ -68005,7 +68089,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92808">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826">
 <summary>
 Do not audit attempts to send virt_migration_server packets.
 </summary>
@@ -68016,7 +68100,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92827">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="92845">
 <summary>
 Receive virt_migration_server packets.
 </summary>
@@ -68027,7 +68111,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92846">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864">
 <summary>
 Do not audit attempts to receive virt_migration_server packets.
 </summary>
@@ -68038,7 +68122,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92865">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883">
 <summary>
 Send and receive virt_migration_server packets.
 </summary>
@@ -68049,7 +68133,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92881">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899">
 <summary>
 Do not audit attempts to send and receive virt_migration_server packets.
 </summary>
@@ -68060,7 +68144,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92896">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914">
 <summary>
 Relabel packets to virt_migration_server the packet type.
 </summary>
@@ -68070,7 +68154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92918">
+<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936">
 <summary>
 Send and receive TCP traffic on the vnc port.
 </summary>
@@ -68081,7 +68165,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92933">
+<interface name="corenet_udp_send_vnc_port" lineno="92951">
 <summary>
 Send UDP traffic on the vnc port.
 </summary>
@@ -68092,7 +68176,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92948">
+<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966">
 <summary>
 Do not audit attempts to send UDP traffic on the vnc port.
 </summary>
@@ -68103,7 +68187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92963">
+<interface name="corenet_udp_receive_vnc_port" lineno="92981">
 <summary>
 Receive UDP traffic on the vnc port.
 </summary>
@@ -68114,7 +68198,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92978">
+<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996">
 <summary>
 Do not audit attempts to receive UDP traffic on the vnc port.
 </summary>
@@ -68125,7 +68209,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="92993">
+<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011">
 <summary>
 Send and receive UDP traffic on the vnc port.
 </summary>
@@ -68136,7 +68220,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93009">
+<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the vnc port.
@@ -68148,7 +68232,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="93024">
+<interface name="corenet_tcp_bind_vnc_port" lineno="93042">
 <summary>
 Bind TCP sockets to the vnc port.
 </summary>
@@ -68159,7 +68243,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="93044">
+<interface name="corenet_udp_bind_vnc_port" lineno="93062">
 <summary>
 Bind UDP sockets to the vnc port.
 </summary>
@@ -68170,7 +68254,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="93063">
+<interface name="corenet_tcp_connect_vnc_port" lineno="93081">
 <summary>
 Make a TCP connection to the vnc port.
 </summary>
@@ -68180,7 +68264,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_client_packets" lineno="93083">
+<interface name="corenet_send_vnc_client_packets" lineno="93101">
 <summary>
 Send vnc_client packets.
 </summary>
@@ -68191,7 +68275,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93102">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120">
 <summary>
 Do not audit attempts to send vnc_client packets.
 </summary>
@@ -68202,7 +68286,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="93121">
+<interface name="corenet_receive_vnc_client_packets" lineno="93139">
 <summary>
 Receive vnc_client packets.
 </summary>
@@ -68213,7 +68297,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93140">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158">
 <summary>
 Do not audit attempts to receive vnc_client packets.
 </summary>
@@ -68224,7 +68308,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="93159">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177">
 <summary>
 Send and receive vnc_client packets.
 </summary>
@@ -68235,7 +68319,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93175">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193">
 <summary>
 Do not audit attempts to send and receive vnc_client packets.
 </summary>
@@ -68246,7 +68330,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="93190">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="93208">
 <summary>
 Relabel packets to vnc_client the packet type.
 </summary>
@@ -68256,7 +68340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_server_packets" lineno="93210">
+<interface name="corenet_send_vnc_server_packets" lineno="93228">
 <summary>
 Send vnc_server packets.
 </summary>
@@ -68267,7 +68351,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93229">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247">
 <summary>
 Do not audit attempts to send vnc_server packets.
 </summary>
@@ -68278,7 +68362,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="93248">
+<interface name="corenet_receive_vnc_server_packets" lineno="93266">
 <summary>
 Receive vnc_server packets.
 </summary>
@@ -68289,7 +68373,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93267">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285">
 <summary>
 Do not audit attempts to receive vnc_server packets.
 </summary>
@@ -68300,7 +68384,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="93286">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304">
 <summary>
 Send and receive vnc_server packets.
 </summary>
@@ -68311,7 +68395,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93302">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320">
 <summary>
 Do not audit attempts to send and receive vnc_server packets.
 </summary>
@@ -68322,7 +68406,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="93317">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="93335">
 <summary>
 Relabel packets to vnc_server the packet type.
 </summary>
@@ -68332,7 +68416,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93339">
+<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357">
 <summary>
 Send and receive TCP traffic on the wccp port.
 </summary>
@@ -68343,7 +68427,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wccp_port" lineno="93354">
+<interface name="corenet_udp_send_wccp_port" lineno="93372">
 <summary>
 Send UDP traffic on the wccp port.
 </summary>
@@ -68354,7 +68438,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93369">
+<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387">
 <summary>
 Do not audit attempts to send UDP traffic on the wccp port.
 </summary>
@@ -68365,7 +68449,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="93384">
+<interface name="corenet_udp_receive_wccp_port" lineno="93402">
 <summary>
 Receive UDP traffic on the wccp port.
 </summary>
@@ -68376,7 +68460,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93399">
+<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417">
 <summary>
 Do not audit attempts to receive UDP traffic on the wccp port.
 </summary>
@@ -68387,7 +68471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="93414">
+<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432">
 <summary>
 Send and receive UDP traffic on the wccp port.
 </summary>
@@ -68398,7 +68482,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93430">
+<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wccp port.
@@ -68410,7 +68494,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="93445">
+<interface name="corenet_tcp_bind_wccp_port" lineno="93463">
 <summary>
 Bind TCP sockets to the wccp port.
 </summary>
@@ -68421,7 +68505,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="93465">
+<interface name="corenet_udp_bind_wccp_port" lineno="93483">
 <summary>
 Bind UDP sockets to the wccp port.
 </summary>
@@ -68432,7 +68516,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="93484">
+<interface name="corenet_tcp_connect_wccp_port" lineno="93502">
 <summary>
 Make a TCP connection to the wccp port.
 </summary>
@@ -68442,7 +68526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_client_packets" lineno="93504">
+<interface name="corenet_send_wccp_client_packets" lineno="93522">
 <summary>
 Send wccp_client packets.
 </summary>
@@ -68453,7 +68537,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93523">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541">
 <summary>
 Do not audit attempts to send wccp_client packets.
 </summary>
@@ -68464,7 +68548,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="93542">
+<interface name="corenet_receive_wccp_client_packets" lineno="93560">
 <summary>
 Receive wccp_client packets.
 </summary>
@@ -68475,7 +68559,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93561">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579">
 <summary>
 Do not audit attempts to receive wccp_client packets.
 </summary>
@@ -68486,7 +68570,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93580">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598">
 <summary>
 Send and receive wccp_client packets.
 </summary>
@@ -68497,7 +68581,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93596">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614">
 <summary>
 Do not audit attempts to send and receive wccp_client packets.
 </summary>
@@ -68508,7 +68592,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93611">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="93629">
 <summary>
 Relabel packets to wccp_client the packet type.
 </summary>
@@ -68518,7 +68602,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93631">
+<interface name="corenet_send_wccp_server_packets" lineno="93649">
 <summary>
 Send wccp_server packets.
 </summary>
@@ -68529,7 +68613,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93650">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668">
 <summary>
 Do not audit attempts to send wccp_server packets.
 </summary>
@@ -68540,7 +68624,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93669">
+<interface name="corenet_receive_wccp_server_packets" lineno="93687">
 <summary>
 Receive wccp_server packets.
 </summary>
@@ -68551,7 +68635,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93688">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706">
 <summary>
 Do not audit attempts to receive wccp_server packets.
 </summary>
@@ -68562,7 +68646,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93707">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725">
 <summary>
 Send and receive wccp_server packets.
 </summary>
@@ -68573,7 +68657,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93723">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741">
 <summary>
 Do not audit attempts to send and receive wccp_server packets.
 </summary>
@@ -68584,7 +68668,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93738">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="93756">
 <summary>
 Relabel packets to wccp_server the packet type.
 </summary>
@@ -68594,7 +68678,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93760">
+<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778">
 <summary>
 Send and receive TCP traffic on the websm port.
 </summary>
@@ -68605,7 +68689,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_websm_port" lineno="93775">
+<interface name="corenet_udp_send_websm_port" lineno="93793">
 <summary>
 Send UDP traffic on the websm port.
 </summary>
@@ -68616,7 +68700,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93790">
+<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808">
 <summary>
 Do not audit attempts to send UDP traffic on the websm port.
 </summary>
@@ -68627,7 +68711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93805">
+<interface name="corenet_udp_receive_websm_port" lineno="93823">
 <summary>
 Receive UDP traffic on the websm port.
 </summary>
@@ -68638,7 +68722,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93820">
+<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838">
 <summary>
 Do not audit attempts to receive UDP traffic on the websm port.
 </summary>
@@ -68649,7 +68733,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93835">
+<interface name="corenet_udp_sendrecv_websm_port" lineno="93853">
 <summary>
 Send and receive UDP traffic on the websm port.
 </summary>
@@ -68660,7 +68744,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93851">
+<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the websm port.
@@ -68672,7 +68756,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93866">
+<interface name="corenet_tcp_bind_websm_port" lineno="93884">
 <summary>
 Bind TCP sockets to the websm port.
 </summary>
@@ -68683,7 +68767,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93886">
+<interface name="corenet_udp_bind_websm_port" lineno="93904">
 <summary>
 Bind UDP sockets to the websm port.
 </summary>
@@ -68694,7 +68778,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93905">
+<interface name="corenet_tcp_connect_websm_port" lineno="93923">
 <summary>
 Make a TCP connection to the websm port.
 </summary>
@@ -68704,7 +68788,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_client_packets" lineno="93925">
+<interface name="corenet_send_websm_client_packets" lineno="93943">
 <summary>
 Send websm_client packets.
 </summary>
@@ -68715,7 +68799,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93944">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962">
 <summary>
 Do not audit attempts to send websm_client packets.
 </summary>
@@ -68726,7 +68810,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93963">
+<interface name="corenet_receive_websm_client_packets" lineno="93981">
 <summary>
 Receive websm_client packets.
 </summary>
@@ -68737,7 +68821,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93982">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000">
 <summary>
 Do not audit attempts to receive websm_client packets.
 </summary>
@@ -68748,7 +68832,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="94001">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="94019">
 <summary>
 Send and receive websm_client packets.
 </summary>
@@ -68759,7 +68843,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94017">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035">
 <summary>
 Do not audit attempts to send and receive websm_client packets.
 </summary>
@@ -68770,7 +68854,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="94032">
+<interface name="corenet_relabelto_websm_client_packets" lineno="94050">
 <summary>
 Relabel packets to websm_client the packet type.
 </summary>
@@ -68780,7 +68864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_server_packets" lineno="94052">
+<interface name="corenet_send_websm_server_packets" lineno="94070">
 <summary>
 Send websm_server packets.
 </summary>
@@ -68791,7 +68875,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94071">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089">
 <summary>
 Do not audit attempts to send websm_server packets.
 </summary>
@@ -68802,7 +68886,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_server_packets" lineno="94090">
+<interface name="corenet_receive_websm_server_packets" lineno="94108">
 <summary>
 Receive websm_server packets.
 </summary>
@@ -68813,7 +68897,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94109">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127">
 <summary>
 Do not audit attempts to receive websm_server packets.
 </summary>
@@ -68824,7 +68908,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="94128">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="94146">
 <summary>
 Send and receive websm_server packets.
 </summary>
@@ -68835,7 +68919,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94144">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162">
 <summary>
 Do not audit attempts to send and receive websm_server packets.
 </summary>
@@ -68846,7 +68930,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="94159">
+<interface name="corenet_relabelto_websm_server_packets" lineno="94177">
 <summary>
 Relabel packets to websm_server the packet type.
 </summary>
@@ -68856,7 +68940,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="94181">
+<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199">
 <summary>
 Send and receive TCP traffic on the whois port.
 </summary>
@@ -68867,7 +68951,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_whois_port" lineno="94196">
+<interface name="corenet_udp_send_whois_port" lineno="94214">
 <summary>
 Send UDP traffic on the whois port.
 </summary>
@@ -68878,7 +68962,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94211">
+<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229">
 <summary>
 Do not audit attempts to send UDP traffic on the whois port.
 </summary>
@@ -68889,7 +68973,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_whois_port" lineno="94226">
+<interface name="corenet_udp_receive_whois_port" lineno="94244">
 <summary>
 Receive UDP traffic on the whois port.
 </summary>
@@ -68900,7 +68984,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94241">
+<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259">
 <summary>
 Do not audit attempts to receive UDP traffic on the whois port.
 </summary>
@@ -68911,7 +68995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="94256">
+<interface name="corenet_udp_sendrecv_whois_port" lineno="94274">
 <summary>
 Send and receive UDP traffic on the whois port.
 </summary>
@@ -68922,7 +69006,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94272">
+<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the whois port.
@@ -68934,7 +69018,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="94287">
+<interface name="corenet_tcp_bind_whois_port" lineno="94305">
 <summary>
 Bind TCP sockets to the whois port.
 </summary>
@@ -68945,7 +69029,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_whois_port" lineno="94307">
+<interface name="corenet_udp_bind_whois_port" lineno="94325">
 <summary>
 Bind UDP sockets to the whois port.
 </summary>
@@ -68956,7 +69040,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="94326">
+<interface name="corenet_tcp_connect_whois_port" lineno="94344">
 <summary>
 Make a TCP connection to the whois port.
 </summary>
@@ -68966,7 +69050,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_client_packets" lineno="94346">
+<interface name="corenet_send_whois_client_packets" lineno="94364">
 <summary>
 Send whois_client packets.
 </summary>
@@ -68977,7 +69061,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94365">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383">
 <summary>
 Do not audit attempts to send whois_client packets.
 </summary>
@@ -68988,7 +69072,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_client_packets" lineno="94384">
+<interface name="corenet_receive_whois_client_packets" lineno="94402">
 <summary>
 Receive whois_client packets.
 </summary>
@@ -68999,7 +69083,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94403">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421">
 <summary>
 Do not audit attempts to receive whois_client packets.
 </summary>
@@ -69010,7 +69094,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="94422">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="94440">
 <summary>
 Send and receive whois_client packets.
 </summary>
@@ -69021,7 +69105,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94438">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456">
 <summary>
 Do not audit attempts to send and receive whois_client packets.
 </summary>
@@ -69032,7 +69116,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="94453">
+<interface name="corenet_relabelto_whois_client_packets" lineno="94471">
 <summary>
 Relabel packets to whois_client the packet type.
 </summary>
@@ -69042,7 +69126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_server_packets" lineno="94473">
+<interface name="corenet_send_whois_server_packets" lineno="94491">
 <summary>
 Send whois_server packets.
 </summary>
@@ -69053,7 +69137,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94492">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510">
 <summary>
 Do not audit attempts to send whois_server packets.
 </summary>
@@ -69064,7 +69148,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_server_packets" lineno="94511">
+<interface name="corenet_receive_whois_server_packets" lineno="94529">
 <summary>
 Receive whois_server packets.
 </summary>
@@ -69075,7 +69159,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94530">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548">
 <summary>
 Do not audit attempts to receive whois_server packets.
 </summary>
@@ -69086,7 +69170,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94549">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="94567">
 <summary>
 Send and receive whois_server packets.
 </summary>
@@ -69097,7 +69181,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94565">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583">
 <summary>
 Do not audit attempts to send and receive whois_server packets.
 </summary>
@@ -69108,7 +69192,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94580">
+<interface name="corenet_relabelto_whois_server_packets" lineno="94598">
 <summary>
 Relabel packets to whois_server the packet type.
 </summary>
@@ -69118,7 +69202,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94602">
+<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620">
 <summary>
 Send and receive TCP traffic on the winshadow port.
 </summary>
@@ -69129,7 +69213,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94617">
+<interface name="corenet_udp_send_winshadow_port" lineno="94635">
 <summary>
 Send UDP traffic on the winshadow port.
 </summary>
@@ -69140,7 +69224,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94632">
+<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650">
 <summary>
 Do not audit attempts to send UDP traffic on the winshadow port.
 </summary>
@@ -69151,7 +69235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94647">
+<interface name="corenet_udp_receive_winshadow_port" lineno="94665">
 <summary>
 Receive UDP traffic on the winshadow port.
 </summary>
@@ -69162,7 +69246,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94662">
+<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680">
 <summary>
 Do not audit attempts to receive UDP traffic on the winshadow port.
 </summary>
@@ -69173,7 +69257,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94677">
+<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695">
 <summary>
 Send and receive UDP traffic on the winshadow port.
 </summary>
@@ -69184,7 +69268,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94693">
+<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the winshadow port.
@@ -69196,7 +69280,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94708">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="94726">
 <summary>
 Bind TCP sockets to the winshadow port.
 </summary>
@@ -69207,7 +69291,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94728">
+<interface name="corenet_udp_bind_winshadow_port" lineno="94746">
 <summary>
 Bind UDP sockets to the winshadow port.
 </summary>
@@ -69218,7 +69302,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94747">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="94765">
 <summary>
 Make a TCP connection to the winshadow port.
 </summary>
@@ -69228,7 +69312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94767">
+<interface name="corenet_send_winshadow_client_packets" lineno="94785">
 <summary>
 Send winshadow_client packets.
 </summary>
@@ -69239,7 +69323,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94786">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804">
 <summary>
 Do not audit attempts to send winshadow_client packets.
 </summary>
@@ -69250,7 +69334,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94805">
+<interface name="corenet_receive_winshadow_client_packets" lineno="94823">
 <summary>
 Receive winshadow_client packets.
 </summary>
@@ -69261,7 +69345,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94824">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842">
 <summary>
 Do not audit attempts to receive winshadow_client packets.
 </summary>
@@ -69272,7 +69356,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94843">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861">
 <summary>
 Send and receive winshadow_client packets.
 </summary>
@@ -69283,7 +69367,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94859">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877">
 <summary>
 Do not audit attempts to send and receive winshadow_client packets.
 </summary>
@@ -69294,7 +69378,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94874">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892">
 <summary>
 Relabel packets to winshadow_client the packet type.
 </summary>
@@ -69304,7 +69388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94894">
+<interface name="corenet_send_winshadow_server_packets" lineno="94912">
 <summary>
 Send winshadow_server packets.
 </summary>
@@ -69315,7 +69399,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94913">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931">
 <summary>
 Do not audit attempts to send winshadow_server packets.
 </summary>
@@ -69326,7 +69410,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94932">
+<interface name="corenet_receive_winshadow_server_packets" lineno="94950">
 <summary>
 Receive winshadow_server packets.
 </summary>
@@ -69337,7 +69421,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94951">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969">
 <summary>
 Do not audit attempts to receive winshadow_server packets.
 </summary>
@@ -69348,7 +69432,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94970">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988">
 <summary>
 Send and receive winshadow_server packets.
 </summary>
@@ -69359,7 +69443,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94986">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004">
 <summary>
 Do not audit attempts to send and receive winshadow_server packets.
 </summary>
@@ -69370,7 +69454,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="95001">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019">
 <summary>
 Relabel packets to winshadow_server the packet type.
 </summary>
@@ -69380,7 +69464,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95023">
+<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041">
 <summary>
 Send and receive TCP traffic on the wsdapi port.
 </summary>
@@ -69391,7 +69475,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="95038">
+<interface name="corenet_udp_send_wsdapi_port" lineno="95056">
 <summary>
 Send UDP traffic on the wsdapi port.
 </summary>
@@ -69402,7 +69486,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95053">
+<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071">
 <summary>
 Do not audit attempts to send UDP traffic on the wsdapi port.
 </summary>
@@ -69413,7 +69497,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="95068">
+<interface name="corenet_udp_receive_wsdapi_port" lineno="95086">
 <summary>
 Receive UDP traffic on the wsdapi port.
 </summary>
@@ -69424,7 +69508,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95083">
+<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101">
 <summary>
 Do not audit attempts to receive UDP traffic on the wsdapi port.
 </summary>
@@ -69435,7 +69519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95098">
+<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116">
 <summary>
 Send and receive UDP traffic on the wsdapi port.
 </summary>
@@ -69446,7 +69530,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95114">
+<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wsdapi port.
@@ -69458,7 +69542,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="95129">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147">
 <summary>
 Bind TCP sockets to the wsdapi port.
 </summary>
@@ -69469,7 +69553,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="95149">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="95167">
 <summary>
 Bind UDP sockets to the wsdapi port.
 </summary>
@@ -69480,7 +69564,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="95168">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186">
 <summary>
 Make a TCP connection to the wsdapi port.
 </summary>
@@ -69490,7 +69574,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="95188">
+<interface name="corenet_send_wsdapi_client_packets" lineno="95206">
 <summary>
 Send wsdapi_client packets.
 </summary>
@@ -69501,7 +69585,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95207">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225">
 <summary>
 Do not audit attempts to send wsdapi_client packets.
 </summary>
@@ -69512,7 +69596,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="95226">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="95244">
 <summary>
 Receive wsdapi_client packets.
 </summary>
@@ -69523,7 +69607,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95245">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263">
 <summary>
 Do not audit attempts to receive wsdapi_client packets.
 </summary>
@@ -69534,7 +69618,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95264">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282">
 <summary>
 Send and receive wsdapi_client packets.
 </summary>
@@ -69545,7 +69629,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95280">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298">
 <summary>
 Do not audit attempts to send and receive wsdapi_client packets.
 </summary>
@@ -69556,7 +69640,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95295">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313">
 <summary>
 Relabel packets to wsdapi_client the packet type.
 </summary>
@@ -69566,7 +69650,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="95315">
+<interface name="corenet_send_wsdapi_server_packets" lineno="95333">
 <summary>
 Send wsdapi_server packets.
 </summary>
@@ -69577,7 +69661,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95334">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352">
 <summary>
 Do not audit attempts to send wsdapi_server packets.
 </summary>
@@ -69588,7 +69672,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="95353">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="95371">
 <summary>
 Receive wsdapi_server packets.
 </summary>
@@ -69599,7 +69683,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95372">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390">
 <summary>
 Do not audit attempts to receive wsdapi_server packets.
 </summary>
@@ -69610,7 +69694,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95391">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409">
 <summary>
 Send and receive wsdapi_server packets.
 </summary>
@@ -69621,7 +69705,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95407">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425">
 <summary>
 Do not audit attempts to send and receive wsdapi_server packets.
 </summary>
@@ -69632,7 +69716,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95422">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440">
 <summary>
 Relabel packets to wsdapi_server the packet type.
 </summary>
@@ -69642,7 +69726,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95444">
+<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462">
 <summary>
 Send and receive TCP traffic on the wsicopy port.
 </summary>
@@ -69653,7 +69737,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="95459">
+<interface name="corenet_udp_send_wsicopy_port" lineno="95477">
 <summary>
 Send UDP traffic on the wsicopy port.
 </summary>
@@ -69664,7 +69748,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95474">
+<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492">
 <summary>
 Do not audit attempts to send UDP traffic on the wsicopy port.
 </summary>
@@ -69675,7 +69759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="95489">
+<interface name="corenet_udp_receive_wsicopy_port" lineno="95507">
 <summary>
 Receive UDP traffic on the wsicopy port.
 </summary>
@@ -69686,7 +69770,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95504">
+<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522">
 <summary>
 Do not audit attempts to receive UDP traffic on the wsicopy port.
 </summary>
@@ -69697,7 +69781,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95519">
+<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537">
 <summary>
 Send and receive UDP traffic on the wsicopy port.
 </summary>
@@ -69708,7 +69792,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95535">
+<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the wsicopy port.
@@ -69720,7 +69804,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95550">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568">
 <summary>
 Bind TCP sockets to the wsicopy port.
 </summary>
@@ -69731,7 +69815,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95570">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="95588">
 <summary>
 Bind UDP sockets to the wsicopy port.
 </summary>
@@ -69742,7 +69826,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95589">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607">
 <summary>
 Make a TCP connection to the wsicopy port.
 </summary>
@@ -69752,7 +69836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95609">
+<interface name="corenet_send_wsicopy_client_packets" lineno="95627">
 <summary>
 Send wsicopy_client packets.
 </summary>
@@ -69763,7 +69847,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95628">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646">
 <summary>
 Do not audit attempts to send wsicopy_client packets.
 </summary>
@@ -69774,7 +69858,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95647">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="95665">
 <summary>
 Receive wsicopy_client packets.
 </summary>
@@ -69785,7 +69869,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95666">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684">
 <summary>
 Do not audit attempts to receive wsicopy_client packets.
 </summary>
@@ -69796,7 +69880,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95685">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703">
 <summary>
 Send and receive wsicopy_client packets.
 </summary>
@@ -69807,7 +69891,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95701">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719">
 <summary>
 Do not audit attempts to send and receive wsicopy_client packets.
 </summary>
@@ -69818,7 +69902,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95716">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734">
 <summary>
 Relabel packets to wsicopy_client the packet type.
 </summary>
@@ -69828,7 +69912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95736">
+<interface name="corenet_send_wsicopy_server_packets" lineno="95754">
 <summary>
 Send wsicopy_server packets.
 </summary>
@@ -69839,7 +69923,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95755">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773">
 <summary>
 Do not audit attempts to send wsicopy_server packets.
 </summary>
@@ -69850,7 +69934,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95774">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="95792">
 <summary>
 Receive wsicopy_server packets.
 </summary>
@@ -69861,7 +69945,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95793">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811">
 <summary>
 Do not audit attempts to receive wsicopy_server packets.
 </summary>
@@ -69872,7 +69956,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95812">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830">
 <summary>
 Send and receive wsicopy_server packets.
 </summary>
@@ -69883,7 +69967,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95828">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846">
 <summary>
 Do not audit attempts to send and receive wsicopy_server packets.
 </summary>
@@ -69894,7 +69978,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95843">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861">
 <summary>
 Relabel packets to wsicopy_server the packet type.
 </summary>
@@ -69904,7 +69988,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95865">
+<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883">
 <summary>
 Send and receive TCP traffic on the xdmcp port.
 </summary>
@@ -69915,7 +69999,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95880">
+<interface name="corenet_udp_send_xdmcp_port" lineno="95898">
 <summary>
 Send UDP traffic on the xdmcp port.
 </summary>
@@ -69926,7 +70010,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95895">
+<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913">
 <summary>
 Do not audit attempts to send UDP traffic on the xdmcp port.
 </summary>
@@ -69937,7 +70021,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95910">
+<interface name="corenet_udp_receive_xdmcp_port" lineno="95928">
 <summary>
 Receive UDP traffic on the xdmcp port.
 </summary>
@@ -69948,7 +70032,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95925">
+<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943">
 <summary>
 Do not audit attempts to receive UDP traffic on the xdmcp port.
 </summary>
@@ -69959,7 +70043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95940">
+<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958">
 <summary>
 Send and receive UDP traffic on the xdmcp port.
 </summary>
@@ -69970,7 +70054,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95956">
+<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xdmcp port.
@@ -69982,7 +70066,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95971">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989">
 <summary>
 Bind TCP sockets to the xdmcp port.
 </summary>
@@ -69993,7 +70077,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="95991">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="96009">
 <summary>
 Bind UDP sockets to the xdmcp port.
 </summary>
@@ -70004,7 +70088,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="96010">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028">
 <summary>
 Make a TCP connection to the xdmcp port.
 </summary>
@@ -70014,7 +70098,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="96030">
+<interface name="corenet_send_xdmcp_client_packets" lineno="96048">
 <summary>
 Send xdmcp_client packets.
 </summary>
@@ -70025,7 +70109,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96049">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067">
 <summary>
 Do not audit attempts to send xdmcp_client packets.
 </summary>
@@ -70036,7 +70120,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="96068">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="96086">
 <summary>
 Receive xdmcp_client packets.
 </summary>
@@ -70047,7 +70131,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96087">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105">
 <summary>
 Do not audit attempts to receive xdmcp_client packets.
 </summary>
@@ -70058,7 +70142,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96106">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124">
 <summary>
 Send and receive xdmcp_client packets.
 </summary>
@@ -70069,7 +70153,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96122">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140">
 <summary>
 Do not audit attempts to send and receive xdmcp_client packets.
 </summary>
@@ -70080,7 +70164,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96137">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155">
 <summary>
 Relabel packets to xdmcp_client the packet type.
 </summary>
@@ -70090,7 +70174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="96157">
+<interface name="corenet_send_xdmcp_server_packets" lineno="96175">
 <summary>
 Send xdmcp_server packets.
 </summary>
@@ -70101,7 +70185,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96176">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194">
 <summary>
 Do not audit attempts to send xdmcp_server packets.
 </summary>
@@ -70112,7 +70196,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="96195">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="96213">
 <summary>
 Receive xdmcp_server packets.
 </summary>
@@ -70123,7 +70207,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96214">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232">
 <summary>
 Do not audit attempts to receive xdmcp_server packets.
 </summary>
@@ -70134,7 +70218,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96233">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251">
 <summary>
 Send and receive xdmcp_server packets.
 </summary>
@@ -70145,7 +70229,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96249">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267">
 <summary>
 Do not audit attempts to send and receive xdmcp_server packets.
 </summary>
@@ -70156,7 +70240,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96264">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282">
 <summary>
 Relabel packets to xdmcp_server the packet type.
 </summary>
@@ -70166,7 +70250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="96286">
+<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304">
 <summary>
 Send and receive TCP traffic on the xen port.
 </summary>
@@ -70177,7 +70261,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xen_port" lineno="96301">
+<interface name="corenet_udp_send_xen_port" lineno="96319">
 <summary>
 Send UDP traffic on the xen port.
 </summary>
@@ -70188,7 +70272,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96316">
+<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334">
 <summary>
 Do not audit attempts to send UDP traffic on the xen port.
 </summary>
@@ -70199,7 +70283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xen_port" lineno="96331">
+<interface name="corenet_udp_receive_xen_port" lineno="96349">
 <summary>
 Receive UDP traffic on the xen port.
 </summary>
@@ -70210,7 +70294,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96346">
+<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364">
 <summary>
 Do not audit attempts to receive UDP traffic on the xen port.
 </summary>
@@ -70221,7 +70305,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="96361">
+<interface name="corenet_udp_sendrecv_xen_port" lineno="96379">
 <summary>
 Send and receive UDP traffic on the xen port.
 </summary>
@@ -70232,7 +70316,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96377">
+<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xen port.
@@ -70244,7 +70328,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="96392">
+<interface name="corenet_tcp_bind_xen_port" lineno="96410">
 <summary>
 Bind TCP sockets to the xen port.
 </summary>
@@ -70255,7 +70339,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xen_port" lineno="96412">
+<interface name="corenet_udp_bind_xen_port" lineno="96430">
 <summary>
 Bind UDP sockets to the xen port.
 </summary>
@@ -70266,7 +70350,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="96431">
+<interface name="corenet_tcp_connect_xen_port" lineno="96449">
 <summary>
 Make a TCP connection to the xen port.
 </summary>
@@ -70276,7 +70360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_client_packets" lineno="96451">
+<interface name="corenet_send_xen_client_packets" lineno="96469">
 <summary>
 Send xen_client packets.
 </summary>
@@ -70287,7 +70371,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96470">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488">
 <summary>
 Do not audit attempts to send xen_client packets.
 </summary>
@@ -70298,7 +70382,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_client_packets" lineno="96489">
+<interface name="corenet_receive_xen_client_packets" lineno="96507">
 <summary>
 Receive xen_client packets.
 </summary>
@@ -70309,7 +70393,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96508">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526">
 <summary>
 Do not audit attempts to receive xen_client packets.
 </summary>
@@ -70320,7 +70404,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="96527">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="96545">
 <summary>
 Send and receive xen_client packets.
 </summary>
@@ -70331,7 +70415,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96543">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561">
 <summary>
 Do not audit attempts to send and receive xen_client packets.
 </summary>
@@ -70342,7 +70426,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96558">
+<interface name="corenet_relabelto_xen_client_packets" lineno="96576">
 <summary>
 Relabel packets to xen_client the packet type.
 </summary>
@@ -70352,7 +70436,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_server_packets" lineno="96578">
+<interface name="corenet_send_xen_server_packets" lineno="96596">
 <summary>
 Send xen_server packets.
 </summary>
@@ -70363,7 +70447,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96597">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615">
 <summary>
 Do not audit attempts to send xen_server packets.
 </summary>
@@ -70374,7 +70458,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96616">
+<interface name="corenet_receive_xen_server_packets" lineno="96634">
 <summary>
 Receive xen_server packets.
 </summary>
@@ -70385,7 +70469,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96635">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653">
 <summary>
 Do not audit attempts to receive xen_server packets.
 </summary>
@@ -70396,7 +70480,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96654">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="96672">
 <summary>
 Send and receive xen_server packets.
 </summary>
@@ -70407,7 +70491,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96670">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688">
 <summary>
 Do not audit attempts to send and receive xen_server packets.
 </summary>
@@ -70418,7 +70502,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96685">
+<interface name="corenet_relabelto_xen_server_packets" lineno="96703">
 <summary>
 Relabel packets to xen_server the packet type.
 </summary>
@@ -70428,7 +70512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96707">
+<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725">
 <summary>
 Send and receive TCP traffic on the xfs port.
 </summary>
@@ -70439,7 +70523,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96722">
+<interface name="corenet_udp_send_xfs_port" lineno="96740">
 <summary>
 Send UDP traffic on the xfs port.
 </summary>
@@ -70450,7 +70534,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96737">
+<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755">
 <summary>
 Do not audit attempts to send UDP traffic on the xfs port.
 </summary>
@@ -70461,7 +70545,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96752">
+<interface name="corenet_udp_receive_xfs_port" lineno="96770">
 <summary>
 Receive UDP traffic on the xfs port.
 </summary>
@@ -70472,7 +70556,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96767">
+<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785">
 <summary>
 Do not audit attempts to receive UDP traffic on the xfs port.
 </summary>
@@ -70483,7 +70567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96782">
+<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800">
 <summary>
 Send and receive UDP traffic on the xfs port.
 </summary>
@@ -70494,7 +70578,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96798">
+<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xfs port.
@@ -70506,7 +70590,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96813">
+<interface name="corenet_tcp_bind_xfs_port" lineno="96831">
 <summary>
 Bind TCP sockets to the xfs port.
 </summary>
@@ -70517,7 +70601,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96833">
+<interface name="corenet_udp_bind_xfs_port" lineno="96851">
 <summary>
 Bind UDP sockets to the xfs port.
 </summary>
@@ -70528,7 +70612,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96852">
+<interface name="corenet_tcp_connect_xfs_port" lineno="96870">
 <summary>
 Make a TCP connection to the xfs port.
 </summary>
@@ -70538,7 +70622,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96872">
+<interface name="corenet_send_xfs_client_packets" lineno="96890">
 <summary>
 Send xfs_client packets.
 </summary>
@@ -70549,7 +70633,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96891">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909">
 <summary>
 Do not audit attempts to send xfs_client packets.
 </summary>
@@ -70560,7 +70644,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96910">
+<interface name="corenet_receive_xfs_client_packets" lineno="96928">
 <summary>
 Receive xfs_client packets.
 </summary>
@@ -70571,7 +70655,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96929">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947">
 <summary>
 Do not audit attempts to receive xfs_client packets.
 </summary>
@@ -70582,7 +70666,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96948">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966">
 <summary>
 Send and receive xfs_client packets.
 </summary>
@@ -70593,7 +70677,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96964">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982">
 <summary>
 Do not audit attempts to send and receive xfs_client packets.
 </summary>
@@ -70604,7 +70688,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96979">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="96997">
 <summary>
 Relabel packets to xfs_client the packet type.
 </summary>
@@ -70614,7 +70698,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_server_packets" lineno="96999">
+<interface name="corenet_send_xfs_server_packets" lineno="97017">
 <summary>
 Send xfs_server packets.
 </summary>
@@ -70625,7 +70709,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97018">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036">
 <summary>
 Do not audit attempts to send xfs_server packets.
 </summary>
@@ -70636,7 +70720,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="97037">
+<interface name="corenet_receive_xfs_server_packets" lineno="97055">
 <summary>
 Receive xfs_server packets.
 </summary>
@@ -70647,7 +70731,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97056">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074">
 <summary>
 Do not audit attempts to receive xfs_server packets.
 </summary>
@@ -70658,7 +70742,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="97075">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093">
 <summary>
 Send and receive xfs_server packets.
 </summary>
@@ -70669,7 +70753,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97091">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109">
 <summary>
 Do not audit attempts to send and receive xfs_server packets.
 </summary>
@@ -70680,7 +70764,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="97106">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="97124">
 <summary>
 Relabel packets to xfs_server the packet type.
 </summary>
@@ -70690,7 +70774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97128">
+<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146">
 <summary>
 Send and receive TCP traffic on the xserver port.
 </summary>
@@ -70701,7 +70785,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_xserver_port" lineno="97143">
+<interface name="corenet_udp_send_xserver_port" lineno="97161">
 <summary>
 Send UDP traffic on the xserver port.
 </summary>
@@ -70712,7 +70796,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97158">
+<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176">
 <summary>
 Do not audit attempts to send UDP traffic on the xserver port.
 </summary>
@@ -70723,7 +70807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="97173">
+<interface name="corenet_udp_receive_xserver_port" lineno="97191">
 <summary>
 Receive UDP traffic on the xserver port.
 </summary>
@@ -70734,7 +70818,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97188">
+<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206">
 <summary>
 Do not audit attempts to receive UDP traffic on the xserver port.
 </summary>
@@ -70745,7 +70829,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="97203">
+<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221">
 <summary>
 Send and receive UDP traffic on the xserver port.
 </summary>
@@ -70756,7 +70840,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97219">
+<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the xserver port.
@@ -70768,7 +70852,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="97234">
+<interface name="corenet_tcp_bind_xserver_port" lineno="97252">
 <summary>
 Bind TCP sockets to the xserver port.
 </summary>
@@ -70779,7 +70863,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="97254">
+<interface name="corenet_udp_bind_xserver_port" lineno="97272">
 <summary>
 Bind UDP sockets to the xserver port.
 </summary>
@@ -70790,7 +70874,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="97273">
+<interface name="corenet_tcp_connect_xserver_port" lineno="97291">
 <summary>
 Make a TCP connection to the xserver port.
 </summary>
@@ -70800,7 +70884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_client_packets" lineno="97293">
+<interface name="corenet_send_xserver_client_packets" lineno="97311">
 <summary>
 Send xserver_client packets.
 </summary>
@@ -70811,7 +70895,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97312">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330">
 <summary>
 Do not audit attempts to send xserver_client packets.
 </summary>
@@ -70822,7 +70906,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="97331">
+<interface name="corenet_receive_xserver_client_packets" lineno="97349">
 <summary>
 Receive xserver_client packets.
 </summary>
@@ -70833,7 +70917,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97350">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368">
 <summary>
 Do not audit attempts to receive xserver_client packets.
 </summary>
@@ -70844,7 +70928,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="97369">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387">
 <summary>
 Send and receive xserver_client packets.
 </summary>
@@ -70855,7 +70939,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97385">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403">
 <summary>
 Do not audit attempts to send and receive xserver_client packets.
 </summary>
@@ -70866,7 +70950,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="97400">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="97418">
 <summary>
 Relabel packets to xserver_client the packet type.
 </summary>
@@ -70876,7 +70960,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_server_packets" lineno="97420">
+<interface name="corenet_send_xserver_server_packets" lineno="97438">
 <summary>
 Send xserver_server packets.
 </summary>
@@ -70887,7 +70971,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97439">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457">
 <summary>
 Do not audit attempts to send xserver_server packets.
 </summary>
@@ -70898,7 +70982,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="97458">
+<interface name="corenet_receive_xserver_server_packets" lineno="97476">
 <summary>
 Receive xserver_server packets.
 </summary>
@@ -70909,7 +70993,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97477">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495">
 <summary>
 Do not audit attempts to receive xserver_server packets.
 </summary>
@@ -70920,7 +71004,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="97496">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514">
 <summary>
 Send and receive xserver_server packets.
 </summary>
@@ -70931,7 +71015,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97512">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530">
 <summary>
 Do not audit attempts to send and receive xserver_server packets.
 </summary>
@@ -70942,7 +71026,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="97527">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="97545">
 <summary>
 Relabel packets to xserver_server the packet type.
 </summary>
@@ -70952,7 +71036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97549">
+<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567">
 <summary>
 Send and receive TCP traffic on the zarafa port.
 </summary>
@@ -70963,7 +71047,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97564">
+<interface name="corenet_udp_send_zarafa_port" lineno="97582">
 <summary>
 Send UDP traffic on the zarafa port.
 </summary>
@@ -70974,7 +71058,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97579">
+<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597">
 <summary>
 Do not audit attempts to send UDP traffic on the zarafa port.
 </summary>
@@ -70985,7 +71069,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97594">
+<interface name="corenet_udp_receive_zarafa_port" lineno="97612">
 <summary>
 Receive UDP traffic on the zarafa port.
 </summary>
@@ -70996,7 +71080,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97609">
+<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627">
 <summary>
 Do not audit attempts to receive UDP traffic on the zarafa port.
 </summary>
@@ -71007,7 +71091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97624">
+<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642">
 <summary>
 Send and receive UDP traffic on the zarafa port.
 </summary>
@@ -71018,7 +71102,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97640">
+<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zarafa port.
@@ -71030,7 +71114,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97655">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="97673">
 <summary>
 Bind TCP sockets to the zarafa port.
 </summary>
@@ -71041,7 +71125,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97675">
+<interface name="corenet_udp_bind_zarafa_port" lineno="97693">
 <summary>
 Bind UDP sockets to the zarafa port.
 </summary>
@@ -71052,7 +71136,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97694">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="97712">
 <summary>
 Make a TCP connection to the zarafa port.
 </summary>
@@ -71062,7 +71146,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97714">
+<interface name="corenet_send_zarafa_client_packets" lineno="97732">
 <summary>
 Send zarafa_client packets.
 </summary>
@@ -71073,7 +71157,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97733">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751">
 <summary>
 Do not audit attempts to send zarafa_client packets.
 </summary>
@@ -71084,7 +71168,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97752">
+<interface name="corenet_receive_zarafa_client_packets" lineno="97770">
 <summary>
 Receive zarafa_client packets.
 </summary>
@@ -71095,7 +71179,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97771">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789">
 <summary>
 Do not audit attempts to receive zarafa_client packets.
 </summary>
@@ -71106,7 +71190,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97790">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808">
 <summary>
 Send and receive zarafa_client packets.
 </summary>
@@ -71117,7 +71201,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97806">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824">
 <summary>
 Do not audit attempts to send and receive zarafa_client packets.
 </summary>
@@ -71128,7 +71212,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97821">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839">
 <summary>
 Relabel packets to zarafa_client the packet type.
 </summary>
@@ -71138,7 +71222,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97841">
+<interface name="corenet_send_zarafa_server_packets" lineno="97859">
 <summary>
 Send zarafa_server packets.
 </summary>
@@ -71149,7 +71233,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97860">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878">
 <summary>
 Do not audit attempts to send zarafa_server packets.
 </summary>
@@ -71160,7 +71244,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97879">
+<interface name="corenet_receive_zarafa_server_packets" lineno="97897">
 <summary>
 Receive zarafa_server packets.
 </summary>
@@ -71171,7 +71255,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97898">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916">
 <summary>
 Do not audit attempts to receive zarafa_server packets.
 </summary>
@@ -71182,7 +71266,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97917">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935">
 <summary>
 Send and receive zarafa_server packets.
 </summary>
@@ -71193,7 +71277,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97933">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951">
 <summary>
 Do not audit attempts to send and receive zarafa_server packets.
 </summary>
@@ -71204,7 +71288,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97948">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966">
 <summary>
 Relabel packets to zarafa_server the packet type.
 </summary>
@@ -71214,7 +71298,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97970">
+<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988">
 <summary>
 Send and receive TCP traffic on the zabbix port.
 </summary>
@@ -71225,7 +71309,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="97985">
+<interface name="corenet_udp_send_zabbix_port" lineno="98003">
 <summary>
 Send UDP traffic on the zabbix port.
 </summary>
@@ -71236,7 +71320,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98000">
+<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018">
 <summary>
 Do not audit attempts to send UDP traffic on the zabbix port.
 </summary>
@@ -71247,7 +71331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="98015">
+<interface name="corenet_udp_receive_zabbix_port" lineno="98033">
 <summary>
 Receive UDP traffic on the zabbix port.
 </summary>
@@ -71258,7 +71342,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98030">
+<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048">
 <summary>
 Do not audit attempts to receive UDP traffic on the zabbix port.
 </summary>
@@ -71269,7 +71353,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98045">
+<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063">
 <summary>
 Send and receive UDP traffic on the zabbix port.
 </summary>
@@ -71280,7 +71364,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98061">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zabbix port.
@@ -71292,7 +71376,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="98076">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="98094">
 <summary>
 Bind TCP sockets to the zabbix port.
 </summary>
@@ -71303,7 +71387,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="98096">
+<interface name="corenet_udp_bind_zabbix_port" lineno="98114">
 <summary>
 Bind UDP sockets to the zabbix port.
 </summary>
@@ -71314,7 +71398,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="98115">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="98133">
 <summary>
 Make a TCP connection to the zabbix port.
 </summary>
@@ -71324,7 +71408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="98135">
+<interface name="corenet_send_zabbix_client_packets" lineno="98153">
 <summary>
 Send zabbix_client packets.
 </summary>
@@ -71335,7 +71419,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98154">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172">
 <summary>
 Do not audit attempts to send zabbix_client packets.
 </summary>
@@ -71346,7 +71430,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="98173">
+<interface name="corenet_receive_zabbix_client_packets" lineno="98191">
 <summary>
 Receive zabbix_client packets.
 </summary>
@@ -71357,7 +71441,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98192">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210">
 <summary>
 Do not audit attempts to receive zabbix_client packets.
 </summary>
@@ -71368,7 +71452,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98211">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229">
 <summary>
 Send and receive zabbix_client packets.
 </summary>
@@ -71379,7 +71463,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98227">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245">
 <summary>
 Do not audit attempts to send and receive zabbix_client packets.
 </summary>
@@ -71390,7 +71474,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="98242">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260">
 <summary>
 Relabel packets to zabbix_client the packet type.
 </summary>
@@ -71400,7 +71484,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="98262">
+<interface name="corenet_send_zabbix_server_packets" lineno="98280">
 <summary>
 Send zabbix_server packets.
 </summary>
@@ -71411,7 +71495,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98281">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299">
 <summary>
 Do not audit attempts to send zabbix_server packets.
 </summary>
@@ -71422,7 +71506,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="98300">
+<interface name="corenet_receive_zabbix_server_packets" lineno="98318">
 <summary>
 Receive zabbix_server packets.
 </summary>
@@ -71433,7 +71517,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98319">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337">
 <summary>
 Do not audit attempts to receive zabbix_server packets.
 </summary>
@@ -71444,7 +71528,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98338">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356">
 <summary>
 Send and receive zabbix_server packets.
 </summary>
@@ -71455,7 +71539,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98354">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372">
 <summary>
 Do not audit attempts to send and receive zabbix_server packets.
 </summary>
@@ -71466,7 +71550,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="98369">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387">
 <summary>
 Relabel packets to zabbix_server the packet type.
 </summary>
@@ -71476,7 +71560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98391">
+<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409">
 <summary>
 Send and receive TCP traffic on the zabbix_agent port.
 </summary>
@@ -71487,7 +71571,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="98406">
+<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424">
 <summary>
 Send UDP traffic on the zabbix_agent port.
 </summary>
@@ -71498,7 +71582,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98421">
+<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439">
 <summary>
 Do not audit attempts to send UDP traffic on the zabbix_agent port.
 </summary>
@@ -71509,7 +71593,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98436">
+<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454">
 <summary>
 Receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71520,7 +71604,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98451">
+<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469">
 <summary>
 Do not audit attempts to receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71531,7 +71615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98466">
+<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484">
 <summary>
 Send and receive UDP traffic on the zabbix_agent port.
 </summary>
@@ -71542,7 +71626,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98482">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zabbix_agent port.
@@ -71554,7 +71638,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98497">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515">
 <summary>
 Bind TCP sockets to the zabbix_agent port.
 </summary>
@@ -71565,7 +71649,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98517">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535">
 <summary>
 Bind UDP sockets to the zabbix_agent port.
 </summary>
@@ -71576,7 +71660,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98536">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554">
 <summary>
 Make a TCP connection to the zabbix_agent port.
 </summary>
@@ -71586,7 +71670,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98556">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574">
 <summary>
 Send zabbix_agent_client packets.
 </summary>
@@ -71597,7 +71681,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98575">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593">
 <summary>
 Do not audit attempts to send zabbix_agent_client packets.
 </summary>
@@ -71608,7 +71692,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98594">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612">
 <summary>
 Receive zabbix_agent_client packets.
 </summary>
@@ -71619,7 +71703,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98613">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631">
 <summary>
 Do not audit attempts to receive zabbix_agent_client packets.
 </summary>
@@ -71630,7 +71714,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98632">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650">
 <summary>
 Send and receive zabbix_agent_client packets.
 </summary>
@@ -71641,7 +71725,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98648">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_client packets.
 </summary>
@@ -71652,7 +71736,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98663">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681">
 <summary>
 Relabel packets to zabbix_agent_client the packet type.
 </summary>
@@ -71662,7 +71746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98683">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701">
 <summary>
 Send zabbix_agent_server packets.
 </summary>
@@ -71673,7 +71757,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98702">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720">
 <summary>
 Do not audit attempts to send zabbix_agent_server packets.
 </summary>
@@ -71684,7 +71768,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98721">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739">
 <summary>
 Receive zabbix_agent_server packets.
 </summary>
@@ -71695,7 +71779,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98740">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758">
 <summary>
 Do not audit attempts to receive zabbix_agent_server packets.
 </summary>
@@ -71706,7 +71790,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98759">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777">
 <summary>
 Send and receive zabbix_agent_server packets.
 </summary>
@@ -71717,7 +71801,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98775">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_server packets.
 </summary>
@@ -71728,7 +71812,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98790">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808">
 <summary>
 Relabel packets to zabbix_agent_server the packet type.
 </summary>
@@ -71738,7 +71822,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98812">
+<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830">
 <summary>
 Send and receive TCP traffic on the zookeeper_client port.
 </summary>
@@ -71749,7 +71833,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98827">
+<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845">
 <summary>
 Send UDP traffic on the zookeeper_client port.
 </summary>
@@ -71760,7 +71844,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98842">
+<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_client port.
 </summary>
@@ -71771,7 +71855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98857">
+<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875">
 <summary>
 Receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71782,7 +71866,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98872">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71793,7 +71877,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98887">
+<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905">
 <summary>
 Send and receive UDP traffic on the zookeeper_client port.
 </summary>
@@ -71804,7 +71888,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98903">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_client port.
@@ -71816,7 +71900,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98918">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936">
 <summary>
 Bind TCP sockets to the zookeeper_client port.
 </summary>
@@ -71827,7 +71911,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98938">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956">
 <summary>
 Bind UDP sockets to the zookeeper_client port.
 </summary>
@@ -71838,7 +71922,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98957">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975">
 <summary>
 Make a TCP connection to the zookeeper_client port.
 </summary>
@@ -71848,7 +71932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98977">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995">
 <summary>
 Send zookeeper_client_client packets.
 </summary>
@@ -71859,7 +71943,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98996">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014">
 <summary>
 Do not audit attempts to send zookeeper_client_client packets.
 </summary>
@@ -71870,7 +71954,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99015">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033">
 <summary>
 Receive zookeeper_client_client packets.
 </summary>
@@ -71881,7 +71965,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99034">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052">
 <summary>
 Do not audit attempts to receive zookeeper_client_client packets.
 </summary>
@@ -71892,7 +71976,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99053">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071">
 <summary>
 Send and receive zookeeper_client_client packets.
 </summary>
@@ -71903,7 +71987,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99069">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_client packets.
 </summary>
@@ -71914,7 +71998,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99084">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102">
 <summary>
 Relabel packets to zookeeper_client_client the packet type.
 </summary>
@@ -71924,7 +72008,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="99104">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122">
 <summary>
 Send zookeeper_client_server packets.
 </summary>
@@ -71935,7 +72019,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99123">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141">
 <summary>
 Do not audit attempts to send zookeeper_client_server packets.
 </summary>
@@ -71946,7 +72030,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99142">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160">
 <summary>
 Receive zookeeper_client_server packets.
 </summary>
@@ -71957,7 +72041,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99161">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179">
 <summary>
 Do not audit attempts to receive zookeeper_client_server packets.
 </summary>
@@ -71968,7 +72052,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99180">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198">
 <summary>
 Send and receive zookeeper_client_server packets.
 </summary>
@@ -71979,7 +72063,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99196">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_server packets.
 </summary>
@@ -71990,7 +72074,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99211">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229">
 <summary>
 Relabel packets to zookeeper_client_server the packet type.
 </summary>
@@ -72000,7 +72084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99233">
+<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251">
 <summary>
 Send and receive TCP traffic on the zookeeper_election port.
 </summary>
@@ -72011,7 +72095,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="99248">
+<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266">
 <summary>
 Send UDP traffic on the zookeeper_election port.
 </summary>
@@ -72022,7 +72106,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99263">
+<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_election port.
 </summary>
@@ -72033,7 +72117,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99278">
+<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296">
 <summary>
 Receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -72044,7 +72128,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99293">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -72055,7 +72139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99308">
+<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326">
 <summary>
 Send and receive UDP traffic on the zookeeper_election port.
 </summary>
@@ -72066,7 +72150,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99324">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_election port.
@@ -72078,7 +72162,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99339">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357">
 <summary>
 Bind TCP sockets to the zookeeper_election port.
 </summary>
@@ -72089,7 +72173,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99359">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377">
 <summary>
 Bind UDP sockets to the zookeeper_election port.
 </summary>
@@ -72100,7 +72184,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99378">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396">
 <summary>
 Make a TCP connection to the zookeeper_election port.
 </summary>
@@ -72110,7 +72194,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="99398">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416">
 <summary>
 Send zookeeper_election_client packets.
 </summary>
@@ -72121,7 +72205,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99417">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435">
 <summary>
 Do not audit attempts to send zookeeper_election_client packets.
 </summary>
@@ -72132,7 +72216,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99436">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454">
 <summary>
 Receive zookeeper_election_client packets.
 </summary>
@@ -72143,7 +72227,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99455">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473">
 <summary>
 Do not audit attempts to receive zookeeper_election_client packets.
 </summary>
@@ -72154,7 +72238,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99474">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492">
 <summary>
 Send and receive zookeeper_election_client packets.
 </summary>
@@ -72165,7 +72249,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99490">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_client packets.
 </summary>
@@ -72176,7 +72260,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99505">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523">
 <summary>
 Relabel packets to zookeeper_election_client the packet type.
 </summary>
@@ -72186,7 +72270,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="99525">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543">
 <summary>
 Send zookeeper_election_server packets.
 </summary>
@@ -72197,7 +72281,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99544">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562">
 <summary>
 Do not audit attempts to send zookeeper_election_server packets.
 </summary>
@@ -72208,7 +72292,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99563">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581">
 <summary>
 Receive zookeeper_election_server packets.
 </summary>
@@ -72219,7 +72303,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99582">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600">
 <summary>
 Do not audit attempts to receive zookeeper_election_server packets.
 </summary>
@@ -72230,7 +72314,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99601">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619">
 <summary>
 Send and receive zookeeper_election_server packets.
 </summary>
@@ -72241,7 +72325,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99617">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_server packets.
 </summary>
@@ -72252,7 +72336,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99632">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650">
 <summary>
 Relabel packets to zookeeper_election_server the packet type.
 </summary>
@@ -72262,7 +72346,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99654">
+<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672">
 <summary>
 Send and receive TCP traffic on the zookeeper_leader port.
 </summary>
@@ -72273,7 +72357,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99669">
+<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687">
 <summary>
 Send UDP traffic on the zookeeper_leader port.
 </summary>
@@ -72284,7 +72368,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99684">
+<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702">
 <summary>
 Do not audit attempts to send UDP traffic on the zookeeper_leader port.
 </summary>
@@ -72295,7 +72379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99699">
+<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717">
 <summary>
 Receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -72306,7 +72390,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99714">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732">
 <summary>
 Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -72317,7 +72401,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99729">
+<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747">
 <summary>
 Send and receive UDP traffic on the zookeeper_leader port.
 </summary>
@@ -72328,7 +72412,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99745">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zookeeper_leader port.
@@ -72340,7 +72424,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99760">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778">
 <summary>
 Bind TCP sockets to the zookeeper_leader port.
 </summary>
@@ -72351,7 +72435,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99780">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798">
 <summary>
 Bind UDP sockets to the zookeeper_leader port.
 </summary>
@@ -72362,7 +72446,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99799">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817">
 <summary>
 Make a TCP connection to the zookeeper_leader port.
 </summary>
@@ -72372,7 +72456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99819">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837">
 <summary>
 Send zookeeper_leader_client packets.
 </summary>
@@ -72383,7 +72467,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99838">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856">
 <summary>
 Do not audit attempts to send zookeeper_leader_client packets.
 </summary>
@@ -72394,7 +72478,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99857">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875">
 <summary>
 Receive zookeeper_leader_client packets.
 </summary>
@@ -72405,7 +72489,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99876">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894">
 <summary>
 Do not audit attempts to receive zookeeper_leader_client packets.
 </summary>
@@ -72416,7 +72500,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99895">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913">
 <summary>
 Send and receive zookeeper_leader_client packets.
 </summary>
@@ -72427,7 +72511,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99911">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_client packets.
 </summary>
@@ -72438,7 +72522,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99926">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944">
 <summary>
 Relabel packets to zookeeper_leader_client the packet type.
 </summary>
@@ -72448,7 +72532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99946">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964">
 <summary>
 Send zookeeper_leader_server packets.
 </summary>
@@ -72459,7 +72543,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99965">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983">
 <summary>
 Do not audit attempts to send zookeeper_leader_server packets.
 </summary>
@@ -72470,7 +72554,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99984">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002">
 <summary>
 Receive zookeeper_leader_server packets.
 </summary>
@@ -72481,7 +72565,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100003">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021">
 <summary>
 Do not audit attempts to receive zookeeper_leader_server packets.
 </summary>
@@ -72492,7 +72576,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100022">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040">
 <summary>
 Send and receive zookeeper_leader_server packets.
 </summary>
@@ -72503,7 +72587,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100038">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_server packets.
 </summary>
@@ -72514,7 +72598,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100053">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071">
 <summary>
 Relabel packets to zookeeper_leader_server the packet type.
 </summary>
@@ -72524,7 +72608,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100075">
+<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093">
 <summary>
 Send and receive TCP traffic on the zebra port.
 </summary>
@@ -72535,7 +72619,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zebra_port" lineno="100090">
+<interface name="corenet_udp_send_zebra_port" lineno="100108">
 <summary>
 Send UDP traffic on the zebra port.
 </summary>
@@ -72546,7 +72630,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100105">
+<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123">
 <summary>
 Do not audit attempts to send UDP traffic on the zebra port.
 </summary>
@@ -72557,7 +72641,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="100120">
+<interface name="corenet_udp_receive_zebra_port" lineno="100138">
 <summary>
 Receive UDP traffic on the zebra port.
 </summary>
@@ -72568,7 +72652,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100135">
+<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153">
 <summary>
 Do not audit attempts to receive UDP traffic on the zebra port.
 </summary>
@@ -72579,7 +72663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="100150">
+<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168">
 <summary>
 Send and receive UDP traffic on the zebra port.
 </summary>
@@ -72590,7 +72674,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100166">
+<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zebra port.
@@ -72602,7 +72686,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="100181">
+<interface name="corenet_tcp_bind_zebra_port" lineno="100199">
 <summary>
 Bind TCP sockets to the zebra port.
 </summary>
@@ -72613,7 +72697,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="100201">
+<interface name="corenet_udp_bind_zebra_port" lineno="100219">
 <summary>
 Bind UDP sockets to the zebra port.
 </summary>
@@ -72624,7 +72708,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="100220">
+<interface name="corenet_tcp_connect_zebra_port" lineno="100238">
 <summary>
 Make a TCP connection to the zebra port.
 </summary>
@@ -72634,7 +72718,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_client_packets" lineno="100240">
+<interface name="corenet_send_zebra_client_packets" lineno="100258">
 <summary>
 Send zebra_client packets.
 </summary>
@@ -72645,7 +72729,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100259">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277">
 <summary>
 Do not audit attempts to send zebra_client packets.
 </summary>
@@ -72656,7 +72740,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="100278">
+<interface name="corenet_receive_zebra_client_packets" lineno="100296">
 <summary>
 Receive zebra_client packets.
 </summary>
@@ -72667,7 +72751,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100297">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315">
 <summary>
 Do not audit attempts to receive zebra_client packets.
 </summary>
@@ -72678,7 +72762,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="100316">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334">
 <summary>
 Send and receive zebra_client packets.
 </summary>
@@ -72689,7 +72773,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100332">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350">
 <summary>
 Do not audit attempts to send and receive zebra_client packets.
 </summary>
@@ -72700,7 +72784,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="100347">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="100365">
 <summary>
 Relabel packets to zebra_client the packet type.
 </summary>
@@ -72710,7 +72794,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_server_packets" lineno="100367">
+<interface name="corenet_send_zebra_server_packets" lineno="100385">
 <summary>
 Send zebra_server packets.
 </summary>
@@ -72721,7 +72805,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100386">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404">
 <summary>
 Do not audit attempts to send zebra_server packets.
 </summary>
@@ -72732,7 +72816,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="100405">
+<interface name="corenet_receive_zebra_server_packets" lineno="100423">
 <summary>
 Receive zebra_server packets.
 </summary>
@@ -72743,7 +72827,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100424">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442">
 <summary>
 Do not audit attempts to receive zebra_server packets.
 </summary>
@@ -72754,7 +72838,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="100443">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461">
 <summary>
 Send and receive zebra_server packets.
 </summary>
@@ -72765,7 +72849,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100459">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477">
 <summary>
 Do not audit attempts to send and receive zebra_server packets.
 </summary>
@@ -72776,7 +72860,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="100474">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="100492">
 <summary>
 Relabel packets to zebra_server the packet type.
 </summary>
@@ -72786,7 +72870,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="100496">
+<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514">
 <summary>
 Send and receive TCP traffic on the zented port.
 </summary>
@@ -72797,7 +72881,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zented_port" lineno="100511">
+<interface name="corenet_udp_send_zented_port" lineno="100529">
 <summary>
 Send UDP traffic on the zented port.
 </summary>
@@ -72808,7 +72892,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100526">
+<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544">
 <summary>
 Do not audit attempts to send UDP traffic on the zented port.
 </summary>
@@ -72819,7 +72903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zented_port" lineno="100541">
+<interface name="corenet_udp_receive_zented_port" lineno="100559">
 <summary>
 Receive UDP traffic on the zented port.
 </summary>
@@ -72830,7 +72914,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100556">
+<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574">
 <summary>
 Do not audit attempts to receive UDP traffic on the zented port.
 </summary>
@@ -72841,7 +72925,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100571">
+<interface name="corenet_udp_sendrecv_zented_port" lineno="100589">
 <summary>
 Send and receive UDP traffic on the zented port.
 </summary>
@@ -72852,7 +72936,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100587">
+<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zented port.
@@ -72864,7 +72948,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100602">
+<interface name="corenet_tcp_bind_zented_port" lineno="100620">
 <summary>
 Bind TCP sockets to the zented port.
 </summary>
@@ -72875,7 +72959,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100622">
+<interface name="corenet_udp_bind_zented_port" lineno="100640">
 <summary>
 Bind UDP sockets to the zented port.
 </summary>
@@ -72886,7 +72970,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100641">
+<interface name="corenet_tcp_connect_zented_port" lineno="100659">
 <summary>
 Make a TCP connection to the zented port.
 </summary>
@@ -72896,7 +72980,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_client_packets" lineno="100661">
+<interface name="corenet_send_zented_client_packets" lineno="100679">
 <summary>
 Send zented_client packets.
 </summary>
@@ -72907,7 +72991,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100680">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698">
 <summary>
 Do not audit attempts to send zented_client packets.
 </summary>
@@ -72918,7 +73002,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100699">
+<interface name="corenet_receive_zented_client_packets" lineno="100717">
 <summary>
 Receive zented_client packets.
 </summary>
@@ -72929,7 +73013,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100718">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736">
 <summary>
 Do not audit attempts to receive zented_client packets.
 </summary>
@@ -72940,7 +73024,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100737">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="100755">
 <summary>
 Send and receive zented_client packets.
 </summary>
@@ -72951,7 +73035,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100753">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771">
 <summary>
 Do not audit attempts to send and receive zented_client packets.
 </summary>
@@ -72962,7 +73046,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100768">
+<interface name="corenet_relabelto_zented_client_packets" lineno="100786">
 <summary>
 Relabel packets to zented_client the packet type.
 </summary>
@@ -72972,7 +73056,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_server_packets" lineno="100788">
+<interface name="corenet_send_zented_server_packets" lineno="100806">
 <summary>
 Send zented_server packets.
 </summary>
@@ -72983,7 +73067,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100807">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825">
 <summary>
 Do not audit attempts to send zented_server packets.
 </summary>
@@ -72994,7 +73078,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100826">
+<interface name="corenet_receive_zented_server_packets" lineno="100844">
 <summary>
 Receive zented_server packets.
 </summary>
@@ -73005,7 +73089,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100845">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863">
 <summary>
 Do not audit attempts to receive zented_server packets.
 </summary>
@@ -73016,7 +73100,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100864">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="100882">
 <summary>
 Send and receive zented_server packets.
 </summary>
@@ -73027,7 +73111,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100880">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898">
 <summary>
 Do not audit attempts to send and receive zented_server packets.
 </summary>
@@ -73038,7 +73122,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100895">
+<interface name="corenet_relabelto_zented_server_packets" lineno="100913">
 <summary>
 Relabel packets to zented_server the packet type.
 </summary>
@@ -73048,7 +73132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100917">
+<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935">
 <summary>
 Send and receive TCP traffic on the zope port.
 </summary>
@@ -73059,7 +73143,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_zope_port" lineno="100932">
+<interface name="corenet_udp_send_zope_port" lineno="100950">
 <summary>
 Send UDP traffic on the zope port.
 </summary>
@@ -73070,7 +73154,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100947">
+<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965">
 <summary>
 Do not audit attempts to send UDP traffic on the zope port.
 </summary>
@@ -73081,7 +73165,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100962">
+<interface name="corenet_udp_receive_zope_port" lineno="100980">
 <summary>
 Receive UDP traffic on the zope port.
 </summary>
@@ -73092,7 +73176,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100977">
+<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995">
 <summary>
 Do not audit attempts to receive UDP traffic on the zope port.
 </summary>
@@ -73103,7 +73187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="100992">
+<interface name="corenet_udp_sendrecv_zope_port" lineno="101010">
 <summary>
 Send and receive UDP traffic on the zope port.
 </summary>
@@ -73114,7 +73198,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101008">
+<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026">
 <summary>
 Do not audit attempts to send and receive
 UDP traffic on the zope port.
@@ -73126,7 +73210,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="101023">
+<interface name="corenet_tcp_bind_zope_port" lineno="101041">
 <summary>
 Bind TCP sockets to the zope port.
 </summary>
@@ -73137,7 +73221,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zope_port" lineno="101043">
+<interface name="corenet_udp_bind_zope_port" lineno="101061">
 <summary>
 Bind UDP sockets to the zope port.
 </summary>
@@ -73148,7 +73232,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="101062">
+<interface name="corenet_tcp_connect_zope_port" lineno="101080">
 <summary>
 Make a TCP connection to the zope port.
 </summary>
@@ -73158,7 +73242,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_client_packets" lineno="101082">
+<interface name="corenet_send_zope_client_packets" lineno="101100">
 <summary>
 Send zope_client packets.
 </summary>
@@ -73169,7 +73253,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101101">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119">
 <summary>
 Do not audit attempts to send zope_client packets.
 </summary>
@@ -73180,7 +73264,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_client_packets" lineno="101120">
+<interface name="corenet_receive_zope_client_packets" lineno="101138">
 <summary>
 Receive zope_client packets.
 </summary>
@@ -73191,7 +73275,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101139">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157">
 <summary>
 Do not audit attempts to receive zope_client packets.
 </summary>
@@ -73202,7 +73286,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="101158">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="101176">
 <summary>
 Send and receive zope_client packets.
 </summary>
@@ -73213,7 +73297,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101174">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192">
 <summary>
 Do not audit attempts to send and receive zope_client packets.
 </summary>
@@ -73224,7 +73308,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="101189">
+<interface name="corenet_relabelto_zope_client_packets" lineno="101207">
 <summary>
 Relabel packets to zope_client the packet type.
 </summary>
@@ -73234,7 +73318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_server_packets" lineno="101209">
+<interface name="corenet_send_zope_server_packets" lineno="101227">
 <summary>
 Send zope_server packets.
 </summary>
@@ -73245,7 +73329,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101228">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246">
 <summary>
 Do not audit attempts to send zope_server packets.
 </summary>
@@ -73256,7 +73340,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_server_packets" lineno="101247">
+<interface name="corenet_receive_zope_server_packets" lineno="101265">
 <summary>
 Receive zope_server packets.
 </summary>
@@ -73267,7 +73351,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101266">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284">
 <summary>
 Do not audit attempts to receive zope_server packets.
 </summary>
@@ -73278,7 +73362,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="101285">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="101303">
 <summary>
 Send and receive zope_server packets.
 </summary>
@@ -73289,7 +73373,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101301">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319">
 <summary>
 Do not audit attempts to send and receive zope_server packets.
 </summary>
@@ -73300,7 +73384,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="101316">
+<interface name="corenet_relabelto_zope_server_packets" lineno="101334">
 <summary>
 Relabel packets to zope_server the packet type.
 </summary>
@@ -73310,7 +73394,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="101339">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357">
 <summary>
 Send and receive TCP network traffic on the lo interface.
 </summary>
@@ -73321,7 +73405,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lo_if" lineno="101358">
+<interface name="corenet_udp_send_lo_if" lineno="101376">
 <summary>
 Send UDP network traffic on the lo interface.
 </summary>
@@ -73332,7 +73416,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_udp_receive_lo_if" lineno="101377">
+<interface name="corenet_udp_receive_lo_if" lineno="101395">
 <summary>
 Receive UDP network traffic on the lo interface.
 </summary>
@@ -73343,7 +73427,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="101396">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="101414">
 <summary>
 Send and receive UDP network traffic on the lo interface.
 </summary>
@@ -73354,7 +73438,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_raw_send_lo_if" lineno="101412">
+<interface name="corenet_raw_send_lo_if" lineno="101430">
 <summary>
 Send raw IP packets on the lo interface.
 </summary>
@@ -73365,7 +73449,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_raw_receive_lo_if" lineno="101431">
+<interface name="corenet_raw_receive_lo_if" lineno="101449">
 <summary>
 Receive raw IP packets on the lo interface.
 </summary>
@@ -73376,7 +73460,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="101450">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="101468">
 <summary>
 Send and receive raw IP packets on the lo interface.
 </summary>
@@ -74725,7 +74809,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kmsg" lineno="2381">
+<interface name="dev_rw_hyperv_kvp" lineno="2381">
+<summary>
+Allow read/write the hypervkvp device
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_hyperv_vss" lineno="2399">
+<summary>
+Allow read/write the hypervvssd device
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_kmsg" lineno="2417">
 <summary>
 Read the kernel messages
 </summary>
@@ -74735,7 +74839,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2399">
+<interface name="dev_dontaudit_read_kmsg" lineno="2435">
 <summary>
 Do not audit attempts to read the kernel messages
 </summary>
@@ -74745,7 +74849,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_kmsg" lineno="2417">
+<interface name="dev_write_kmsg" lineno="2453">
 <summary>
 Write to the kernel messages device
 </summary>
@@ -74755,7 +74859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kmsg" lineno="2435">
+<interface name="dev_rw_kmsg" lineno="2471">
 <summary>
 Read and write to the kernel messages device
 </summary>
@@ -74765,7 +74869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_kmsg" lineno="2453">
+<interface name="dev_mounton_kmsg" lineno="2489">
 <summary>
 Mount on the kernel messages device
 </summary>
@@ -74775,7 +74879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_ksm_dev" lineno="2471">
+<interface name="dev_getattr_ksm_dev" lineno="2507">
 <summary>
 Get the attributes of the ksm devices.
 </summary>
@@ -74785,7 +74889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_ksm_dev" lineno="2489">
+<interface name="dev_setattr_ksm_dev" lineno="2525">
 <summary>
 Set the attributes of the ksm devices.
 </summary>
@@ -74795,7 +74899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_ksm" lineno="2507">
+<interface name="dev_read_ksm" lineno="2543">
 <summary>
 Read the ksm devices.
 </summary>
@@ -74805,7 +74909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_ksm" lineno="2525">
+<interface name="dev_rw_ksm" lineno="2561">
 <summary>
 Read and write to ksm devices.
 </summary>
@@ -74815,7 +74919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_kvm_dev" lineno="2543">
+<interface name="dev_getattr_kvm_dev" lineno="2579">
 <summary>
 Get the attributes of the kvm devices.
 </summary>
@@ -74825,7 +74929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_kvm_dev" lineno="2561">
+<interface name="dev_setattr_kvm_dev" lineno="2597">
 <summary>
 Set the attributes of the kvm devices.
 </summary>
@@ -74835,7 +74939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kvm" lineno="2579">
+<interface name="dev_read_kvm" lineno="2615">
 <summary>
 Read the kvm devices.
 </summary>
@@ -74845,7 +74949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kvm" lineno="2597">
+<interface name="dev_rw_kvm" lineno="2633">
 <summary>
 Read and write to kvm devices.
 </summary>
@@ -74855,7 +74959,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lirc" lineno="2615">
+<interface name="dev_read_lirc" lineno="2651">
 <summary>
 Read the lirc device.
 </summary>
@@ -74865,7 +74969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lirc" lineno="2633">
+<interface name="dev_rw_lirc" lineno="2669">
 <summary>
 Read and write the lirc device.
 </summary>
@@ -74875,7 +74979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_lirc" lineno="2657">
+<interface name="dev_filetrans_lirc" lineno="2693">
 <summary>
 Automatic type transition to the type
 for lirc device nodes when created in /dev.
@@ -74891,7 +74995,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_loop_control" lineno="2675">
+<interface name="dev_rw_loop_control" lineno="2711">
 <summary>
 Read and write the loop-control device.
 </summary>
@@ -74901,7 +75005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_lvm_control" lineno="2693">
+<interface name="dev_getattr_lvm_control" lineno="2729">
 <summary>
 Get the attributes of the lvm comtrol device.
 </summary>
@@ -74911,7 +75015,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lvm_control" lineno="2711">
+<interface name="dev_read_lvm_control" lineno="2747">
 <summary>
 Read the lvm comtrol device.
 </summary>
@@ -74921,7 +75025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lvm_control" lineno="2729">
+<interface name="dev_rw_lvm_control" lineno="2765">
 <summary>
 Read and write the lvm control device.
 </summary>
@@ -74931,7 +75035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2747">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2783">
 <summary>
 Do not audit attempts to read and write lvm control device.
 </summary>
@@ -74941,7 +75045,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2765">
+<interface name="dev_delete_lvm_control_dev" lineno="2801">
 <summary>
 Delete the lvm control device.
 </summary>
@@ -74951,7 +75055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2783">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819">
 <summary>
 dontaudit getattr raw memory devices (e.g. /dev/mem).
 </summary>
@@ -74961,7 +75065,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_raw_memory" lineno="2804">
+<interface name="dev_read_raw_memory" lineno="2840">
 <summary>
 Read raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -74974,7 +75078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_raw_memory_cond" lineno="2834">
+<interface name="dev_read_raw_memory_cond" lineno="2870">
 <summary>
 Read raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -74992,7 +75096,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2861">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2897">
 <summary>
 Do not audit attempts to read raw memory devices
 (e.g. /dev/mem).
@@ -75006,7 +75110,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_raw_memory" lineno="2882">
+<interface name="dev_write_raw_memory" lineno="2918">
 <summary>
 Write raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75019,7 +75123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_raw_memory_cond" lineno="2912">
+<interface name="dev_write_raw_memory_cond" lineno="2948">
 <summary>
 Write raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -75037,7 +75141,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_rx_raw_memory" lineno="2938">
+<interface name="dev_rx_raw_memory" lineno="2974">
 <summary>
 Read and execute raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75050,7 +75154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_wx_raw_memory" lineno="2960">
+<interface name="dev_wx_raw_memory" lineno="2996">
 <summary>
 Write and execute raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75063,7 +75167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_wx_raw_memory_cond" lineno="2987">
+<interface name="dev_wx_raw_memory_cond" lineno="3023">
 <summary>
 Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -75081,7 +75185,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_misc_dev" lineno="3010">
+<interface name="dev_getattr_misc_dev" lineno="3046">
 <summary>
 Get the attributes of miscellaneous devices.
 </summary>
@@ -75091,7 +75195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="3029">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065">
 <summary>
 Do not audit attempts to get the attributes
 of miscellaneous devices.
@@ -75102,7 +75206,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_misc_dev" lineno="3047">
+<interface name="dev_setattr_misc_dev" lineno="3083">
 <summary>
 Set the attributes of miscellaneous devices.
 </summary>
@@ -75112,7 +75216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="3066">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102">
 <summary>
 Do not audit attempts to set the attributes
 of miscellaneous devices.
@@ -75123,7 +75227,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_misc" lineno="3084">
+<interface name="dev_read_misc" lineno="3120">
 <summary>
 Read miscellaneous devices.
 </summary>
@@ -75133,7 +75237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_misc" lineno="3102">
+<interface name="dev_write_misc" lineno="3138">
 <summary>
 Write miscellaneous devices.
 </summary>
@@ -75143,7 +75247,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_misc" lineno="3120">
+<interface name="dev_dontaudit_rw_misc" lineno="3156">
 <summary>
 Do not audit attempts to read and write miscellaneous devices.
 </summary>
@@ -75153,7 +75257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_modem_dev" lineno="3138">
+<interface name="dev_getattr_modem_dev" lineno="3174">
 <summary>
 Get the attributes of the modem devices.
 </summary>
@@ -75163,7 +75267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_modem_dev" lineno="3156">
+<interface name="dev_setattr_modem_dev" lineno="3192">
 <summary>
 Set the attributes of the modem devices.
 </summary>
@@ -75173,7 +75277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_modem" lineno="3174">
+<interface name="dev_read_modem" lineno="3210">
 <summary>
 Read the modem devices.
 </summary>
@@ -75183,7 +75287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_modem" lineno="3192">
+<interface name="dev_rw_modem" lineno="3228">
 <summary>
 Read and write to modem devices.
 </summary>
@@ -75193,7 +75297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mouse_dev" lineno="3210">
+<interface name="dev_getattr_mouse_dev" lineno="3246">
 <summary>
 Get the attributes of the mouse devices.
 </summary>
@@ -75203,7 +75307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_mouse_dev" lineno="3228">
+<interface name="dev_setattr_mouse_dev" lineno="3264">
 <summary>
 Set the attributes of the mouse devices.
 </summary>
@@ -75213,7 +75317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_mouse" lineno="3246">
+<interface name="dev_read_mouse" lineno="3282">
 <summary>
 Read the mouse devices.
 </summary>
@@ -75223,7 +75327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mouse" lineno="3264">
+<interface name="dev_rw_mouse" lineno="3300">
 <summary>
 Read and write to mouse devices.
 </summary>
@@ -75233,7 +75337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3283">
+<interface name="dev_getattr_mtrr_dev" lineno="3319">
 <summary>
 Get the attributes of the memory type range
 registers (MTRR) device.
@@ -75244,7 +75348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3303">
+<interface name="dev_dontaudit_write_mtrr" lineno="3339">
 <summary>
 Do not audit attempts to write the memory type
 range registers (MTRR).
@@ -75255,7 +75359,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mtrr" lineno="3322">
+<interface name="dev_rw_mtrr" lineno="3358">
 <summary>
 Read and write the memory type range registers (MTRR).
 </summary>
@@ -75265,7 +75369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3341">
+<interface name="dev_getattr_netcontrol_dev" lineno="3377">
 <summary>
 Get the attributes of the network control device  (Deprecated)
 </summary>
@@ -75275,7 +75379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_netcontrol" lineno="3356">
+<interface name="dev_read_netcontrol" lineno="3392">
 <summary>
 Read the network control identity.  (Deprecated)
 </summary>
@@ -75285,7 +75389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_netcontrol" lineno="3371">
+<interface name="dev_rw_netcontrol" lineno="3407">
 <summary>
 Read and write the the network control device.  (Deprecated)
 </summary>
@@ -75295,7 +75399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_null_dev" lineno="3386">
+<interface name="dev_getattr_null_dev" lineno="3422">
 <summary>
 Get the attributes of the null device nodes.
 </summary>
@@ -75305,7 +75409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_null_dev" lineno="3404">
+<interface name="dev_setattr_null_dev" lineno="3440">
 <summary>
 Set the attributes of the null device nodes.
 </summary>
@@ -75315,7 +75419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_null_dev" lineno="3423">
+<interface name="dev_dontaudit_setattr_null_dev" lineno="3459">
 <summary>
 Do not audit attempts to set the attributes of
 the null device nodes.
@@ -75326,7 +75430,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_null" lineno="3441">
+<interface name="dev_delete_null" lineno="3477">
 <summary>
 Delete the null device (/dev/null).
 </summary>
@@ -75336,7 +75440,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_null" lineno="3459">
+<interface name="dev_rw_null" lineno="3495">
 <summary>
 Read and write to the null device (/dev/null).
 </summary>
@@ -75346,7 +75450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_null_dev" lineno="3477">
+<interface name="dev_create_null_dev" lineno="3513">
 <summary>
 Create the null device (/dev/null).
 </summary>
@@ -75356,7 +75460,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_null_service" lineno="3496">
+<interface name="dev_manage_null_service" lineno="3532">
 <summary>
 Manage services with script type null_device_t for when
 /lib/systemd/system/something.service is a link to /dev/null
@@ -75367,7 +75471,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3516">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552">
 <summary>
 Do not audit attempts to get the attributes
 of the BIOS non-volatile RAM device.
@@ -75378,7 +75482,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_nvram" lineno="3534">
+<interface name="dev_rw_nvram" lineno="3570">
 <summary>
 Read and write BIOS non-volatile RAM.
 </summary>
@@ -75388,7 +75492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_printer_dev" lineno="3552">
+<interface name="dev_getattr_printer_dev" lineno="3588">
 <summary>
 Get the attributes of the printer device nodes.
 </summary>
@@ -75398,7 +75502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_printer_dev" lineno="3570">
+<interface name="dev_setattr_printer_dev" lineno="3606">
 <summary>
 Set the attributes of the printer device nodes.
 </summary>
@@ -75408,7 +75512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_append_printer" lineno="3589">
+<interface name="dev_append_printer" lineno="3625">
 <summary>
 Append the printer device.
 </summary>
@@ -75418,7 +75522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_printer" lineno="3607">
+<interface name="dev_rw_printer" lineno="3643">
 <summary>
 Read and write the printer device.
 </summary>
@@ -75428,7 +75532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3625">
+<interface name="dev_getattr_pmqos_dev" lineno="3661">
 <summary>
 Get the attributes of PM QoS devices
 </summary>
@@ -75438,7 +75542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_pmqos" lineno="3643">
+<interface name="dev_read_pmqos" lineno="3679">
 <summary>
 Read the PM QoS devices.
 </summary>
@@ -75448,7 +75552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_pmqos" lineno="3661">
+<interface name="dev_rw_pmqos" lineno="3697">
 <summary>
 Read and write the the PM QoS devices.
 </summary>
@@ -75458,7 +75562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_qemu_dev" lineno="3680">
+<interface name="dev_getattr_qemu_dev" lineno="3716">
 <summary>
 Get the attributes of the QEMU
 microcode and id interfaces.
@@ -75469,7 +75573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_qemu_dev" lineno="3699">
+<interface name="dev_setattr_qemu_dev" lineno="3735">
 <summary>
 Set the attributes of the QEMU
 microcode and id interfaces.
@@ -75480,7 +75584,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_qemu" lineno="3717">
+<interface name="dev_read_qemu" lineno="3753">
 <summary>
 Read the QEMU device
 </summary>
@@ -75490,7 +75594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_qemu" lineno="3735">
+<interface name="dev_rw_qemu" lineno="3771">
 <summary>
 Read and write the the QEMU device.
 </summary>
@@ -75500,7 +75604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_rand" lineno="3769">
+<interface name="dev_read_rand" lineno="3805">
 <summary>
 Read from random number generator
 devices (e.g., /dev/random).
@@ -75526,7 +75630,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_rand" lineno="3788">
+<interface name="dev_dontaudit_read_rand" lineno="3824">
 <summary>
 Do not audit attempts to read from random
 number generator devices (e.g., /dev/random)
@@ -75537,7 +75641,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_append_rand" lineno="3807">
+<interface name="dev_dontaudit_append_rand" lineno="3843">
 <summary>
 Do not audit attempts to append to random
 number generator devices (e.g., /dev/random)
@@ -75548,7 +75652,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_rand" lineno="3827">
+<interface name="dev_write_rand" lineno="3863">
 <summary>
 Write to the random device (e.g., /dev/random). This adds
 entropy used to generate the random data read from the
@@ -75560,7 +75664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_rand_dev" lineno="3845">
+<interface name="dev_create_rand_dev" lineno="3881">
 <summary>
 Create the random device (/dev/random).
 </summary>
@@ -75570,7 +75674,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_realtime_clock" lineno="3863">
+<interface name="dev_read_realtime_clock" lineno="3899">
 <summary>
 Read the realtime clock (/dev/rtc).
 </summary>
@@ -75580,7 +75684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_realtime_clock" lineno="3881">
+<interface name="dev_write_realtime_clock" lineno="3917">
 <summary>
 Set the realtime clock (/dev/rtc).
 </summary>
@@ -75590,7 +75694,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_realtime_clock" lineno="3901">
+<interface name="dev_rw_realtime_clock" lineno="3937">
 <summary>
 Read and set the realtime clock (/dev/rtc).
 </summary>
@@ -75600,7 +75704,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_scanner_dev" lineno="3916">
+<interface name="dev_getattr_scanner_dev" lineno="3952">
 <summary>
 Get the attributes of the scanner device.
 </summary>
@@ -75610,7 +75714,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3935">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971">
 <summary>
 Do not audit attempts to get the attributes of
 the scanner device.
@@ -75621,7 +75725,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_scanner_dev" lineno="3953">
+<interface name="dev_setattr_scanner_dev" lineno="3989">
 <summary>
 Set the attributes of the scanner device.
 </summary>
@@ -75631,7 +75735,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3972">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008">
 <summary>
 Do not audit attempts to set the attributes of
 the scanner device.
@@ -75642,7 +75746,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_scanner" lineno="3990">
+<interface name="dev_rw_scanner" lineno="4026">
 <summary>
 Read and write the scanner device.
 </summary>
@@ -75652,7 +75756,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sound_dev" lineno="4008">
+<interface name="dev_getattr_sound_dev" lineno="4044">
 <summary>
 Get the attributes of the sound devices.
 </summary>
@@ -75662,7 +75766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_sound_dev" lineno="4026">
+<interface name="dev_setattr_sound_dev" lineno="4062">
 <summary>
 Set the attributes of the sound devices.
 </summary>
@@ -75672,7 +75776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound" lineno="4044">
+<interface name="dev_read_sound" lineno="4080">
 <summary>
 Read the sound devices.
 </summary>
@@ -75682,7 +75786,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound" lineno="4063">
+<interface name="dev_write_sound" lineno="4099">
 <summary>
 Write the sound devices.
 </summary>
@@ -75692,7 +75796,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound_mixer" lineno="4082">
+<interface name="dev_read_sound_mixer" lineno="4118">
 <summary>
 Read the sound mixer devices.
 </summary>
@@ -75702,7 +75806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound_mixer" lineno="4101">
+<interface name="dev_write_sound_mixer" lineno="4137">
 <summary>
 Write the sound mixer devices.
 </summary>
@@ -75712,7 +75816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="4120">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4156">
 <summary>
 Get the attributes of the the power management device.
 </summary>
@@ -75722,7 +75826,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="4138">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4174">
 <summary>
 Set the attributes of the the power management device.
 </summary>
@@ -75732,7 +75836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_power_management" lineno="4156">
+<interface name="dev_rw_power_management" lineno="4192">
 <summary>
 Read and write the the power management device.
 </summary>
@@ -75742,7 +75846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_smartcard_dev" lineno="4174">
+<interface name="dev_getattr_smartcard_dev" lineno="4210">
 <summary>
 Getattr on smartcard devices
 </summary>
@@ -75752,7 +75856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4193">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229">
 <summary>
 dontaudit getattr on smartcard devices
 </summary>
@@ -75762,7 +75866,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_smartcard" lineno="4212">
+<interface name="dev_rw_smartcard" lineno="4248">
 <summary>
 Read and write smartcard devices.
 </summary>
@@ -75772,7 +75876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_smartcard" lineno="4230">
+<interface name="dev_manage_smartcard" lineno="4266">
 <summary>
 Create, read, write, and delete smartcard devices.
 </summary>
@@ -75782,7 +75886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_sysdig" lineno="4248">
+<interface name="dev_rw_sysdig" lineno="4284">
 <summary>
 Read, write and map the sysdig device.
 </summary>
@@ -75792,7 +75896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs" lineno="4267">
+<interface name="dev_mounton_sysfs" lineno="4303">
 <summary>
 Mount a filesystem on sysfs.  (Deprecated)
 </summary>
@@ -75802,7 +75906,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_sysfs" lineno="4282">
+<interface name="dev_associate_sysfs" lineno="4318">
 <summary>
 Associate a file to a sysfs filesystem.
 </summary>
@@ -75812,7 +75916,7 @@ The type of the file to be associated to sysfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4300">
+<interface name="dev_getattr_sysfs_dirs" lineno="4336">
 <summary>
 Get the attributes of sysfs directories.
 </summary>
@@ -75822,7 +75926,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs" lineno="4318">
+<interface name="dev_getattr_sysfs" lineno="4354">
 <summary>
 Get the attributes of sysfs filesystem
 </summary>
@@ -75832,7 +75936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_sysfs" lineno="4336">
+<interface name="dev_mount_sysfs" lineno="4372">
 <summary>
 mount a sysfs filesystem
 </summary>
@@ -75842,7 +75946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_remount_sysfs" lineno="4354">
+<interface name="dev_remount_sysfs" lineno="4390">
 <summary>
 Remount a sysfs filesystem.
 </summary>
@@ -75852,7 +75956,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4372">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4408">
 <summary>
 Do not audit getting the attributes of sysfs filesystem
 </summary>
@@ -75862,7 +75966,7 @@ Domain to dontaudit access from
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4390">
+<interface name="dev_dontaudit_read_sysfs" lineno="4426">
 <summary>
 Dont audit attempts to read hardware state information
 </summary>
@@ -75872,7 +75976,7 @@ Domain for which the attempts do not need to be audited
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4410">
+<interface name="dev_mounton_sysfs_dirs" lineno="4446">
 <summary>
 Mount on sysfs directories.
 </summary>
@@ -75882,7 +75986,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_sysfs" lineno="4428">
+<interface name="dev_search_sysfs" lineno="4464">
 <summary>
 Search the sysfs directories.
 </summary>
@@ -75892,7 +75996,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4446">
+<interface name="dev_dontaudit_search_sysfs" lineno="4482">
 <summary>
 Do not audit attempts to search sysfs.
 </summary>
@@ -75902,7 +76006,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_sysfs" lineno="4464">
+<interface name="dev_list_sysfs" lineno="4500">
 <summary>
 List the contents of the sysfs directories.
 </summary>
@@ -75912,7 +76016,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sysfs_dirs" lineno="4483">
+<interface name="dev_write_sysfs_dirs" lineno="4519">
 <summary>
 Write in a sysfs directories.
 </summary>
@@ -75922,7 +76026,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4501">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537">
 <summary>
 Do not audit attempts to write in a sysfs directory.
 </summary>
@@ -75932,7 +76036,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4519">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4555">
 <summary>
 Do not audit attempts to write to a sysfs file.
 </summary>
@@ -75942,7 +76046,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4538">
+<interface name="dev_manage_sysfs_dirs" lineno="4574">
 <summary>
 Create, read, write, and delete sysfs
 directories.
@@ -75953,7 +76057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sysfs" lineno="4565">
+<interface name="dev_read_sysfs" lineno="4601">
 <summary>
 Read hardware state information.
 </summary>
@@ -75972,7 +76076,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_write_sysfs" lineno="4593">
+<interface name="dev_write_sysfs" lineno="4629">
 <summary>
 Write to hardware state information.
 </summary>
@@ -75989,7 +76093,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_rw_sysfs" lineno="4612">
+<interface name="dev_rw_sysfs" lineno="4648">
 <summary>
 Allow caller to modify hardware state information.
 </summary>
@@ -75999,7 +76103,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_sysfs_files" lineno="4633">
+<interface name="dev_create_sysfs_files" lineno="4669">
 <summary>
 Add a sysfs file
 </summary>
@@ -76009,7 +76113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4651">
+<interface name="dev_relabel_sysfs_dirs" lineno="4687">
 <summary>
 Relabel hardware state directories.
 </summary>
@@ -76019,7 +76123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_all_sysfs" lineno="4669">
+<interface name="dev_relabel_all_sysfs" lineno="4705">
 <summary>
 Relabel from/to all sysfs types.
 </summary>
@@ -76029,7 +76133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_all_sysfs" lineno="4689">
+<interface name="dev_setattr_all_sysfs" lineno="4725">
 <summary>
 Set the attributes of sysfs files, directories and symlinks.
 </summary>
@@ -76039,7 +76143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_tpm" lineno="4709">
+<interface name="dev_rw_tpm" lineno="4745">
 <summary>
 Read and write the TPM device.
 </summary>
@@ -76049,7 +76153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_urand" lineno="4750">
+<interface name="dev_read_urand" lineno="4786">
 <summary>
 Read from pseudo random number generator devices (e.g., /dev/urandom).
 </summary>
@@ -76082,7 +76186,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_urand" lineno="4769">
+<interface name="dev_dontaudit_read_urand" lineno="4805">
 <summary>
 Do not audit attempts to read from pseudo
 random devices (e.g., /dev/urandom)
@@ -76093,7 +76197,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_urand" lineno="4788">
+<interface name="dev_write_urand" lineno="4824">
 <summary>
 Write to the pseudo random device (e.g., /dev/urandom). This
 sets the random number generator seed.
@@ -76104,7 +76208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_urand_dev" lineno="4806">
+<interface name="dev_create_urand_dev" lineno="4842">
 <summary>
 Create the urandom device (/dev/urandom).
 </summary>
@@ -76114,7 +76218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4824">
+<interface name="dev_getattr_generic_usb_dev" lineno="4860">
 <summary>
 Getattr generic the USB devices.
 </summary>
@@ -76124,7 +76228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4842">
+<interface name="dev_setattr_generic_usb_dev" lineno="4878">
 <summary>
 Setattr generic the USB devices.
 </summary>
@@ -76134,7 +76238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_generic_usb_dev" lineno="4860">
+<interface name="dev_read_generic_usb_dev" lineno="4896">
 <summary>
 Read generic the USB devices.
 </summary>
@@ -76144,7 +76248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4878">
+<interface name="dev_rw_generic_usb_dev" lineno="4914">
 <summary>
 Read and write generic the USB devices.
 </summary>
@@ -76154,7 +76258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4896">
+<interface name="dev_relabel_generic_usb_dev" lineno="4932">
 <summary>
 Relabel generic the USB devices.
 </summary>
@@ -76164,7 +76268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbmon_dev" lineno="4914">
+<interface name="dev_read_usbmon_dev" lineno="4950">
 <summary>
 Read USB monitor devices.
 </summary>
@@ -76174,7 +76278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_usbmon_dev" lineno="4932">
+<interface name="dev_write_usbmon_dev" lineno="4968">
 <summary>
 Write USB monitor devices.
 </summary>
@@ -76184,7 +76288,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_usbfs" lineno="4950">
+<interface name="dev_mount_usbfs" lineno="4986">
 <summary>
 Mount a usbfs filesystem.
 </summary>
@@ -76194,7 +76298,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_usbfs" lineno="4968">
+<interface name="dev_associate_usbfs" lineno="5004">
 <summary>
 Associate a file to a usbfs filesystem.
 </summary>
@@ -76204,7 +76308,7 @@ The type of the file to be associated to usbfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="4986">
+<interface name="dev_getattr_usbfs_dirs" lineno="5022">
 <summary>
 Get the attributes of a directory in the usb filesystem.
 </summary>
@@ -76214,7 +76318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5005">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041">
 <summary>
 Do not audit attempts to get the attributes
 of a directory in the usb filesystem.
@@ -76225,7 +76329,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_usbfs" lineno="5023">
+<interface name="dev_search_usbfs" lineno="5059">
 <summary>
 Search the directory containing USB hardware information.
 </summary>
@@ -76235,7 +76339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_usbfs" lineno="5041">
+<interface name="dev_list_usbfs" lineno="5077">
 <summary>
 Allow caller to get a list of usb hardware.
 </summary>
@@ -76245,7 +76349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_usbfs_files" lineno="5062">
+<interface name="dev_setattr_usbfs_files" lineno="5098">
 <summary>
 Set the attributes of usbfs filesystem.
 </summary>
@@ -76255,7 +76359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbfs" lineno="5082">
+<interface name="dev_read_usbfs" lineno="5118">
 <summary>
 Read USB hardware information using
 the usbfs filesystem interface.
@@ -76266,7 +76370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_usbfs" lineno="5102">
+<interface name="dev_rw_usbfs" lineno="5138">
 <summary>
 Allow caller to modify usb hardware configuration files.
 </summary>
@@ -76276,7 +76380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_video_dev" lineno="5122">
+<interface name="dev_getattr_video_dev" lineno="5158">
 <summary>
 Get the attributes of video4linux devices.
 </summary>
@@ -76286,7 +76390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_userio_dev" lineno="5140">
+<interface name="dev_rw_userio_dev" lineno="5176">
 <summary>
 Read and write userio device.
 </summary>
@@ -76296,7 +76400,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5159">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5195">
 <summary>
 Do not audit attempts to get the attributes
 of video4linux device nodes.
@@ -76307,7 +76411,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_video_dev" lineno="5177">
+<interface name="dev_setattr_video_dev" lineno="5213">
 <summary>
 Set the attributes of video4linux device nodes.
 </summary>
@@ -76317,7 +76421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5196">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5232">
 <summary>
 Do not audit attempts to set the attributes
 of video4linux device nodes.
@@ -76328,7 +76432,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_video_dev" lineno="5214">
+<interface name="dev_read_video_dev" lineno="5250">
 <summary>
 Read the video4linux devices.
 </summary>
@@ -76338,7 +76442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_video_dev" lineno="5232">
+<interface name="dev_write_video_dev" lineno="5268">
 <summary>
 Write the video4linux devices.
 </summary>
@@ -76348,7 +76452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vfio_dev" lineno="5250">
+<interface name="dev_rw_vfio_dev" lineno="5286">
 <summary>
 Read and write vfio devices.
 </summary>
@@ -76358,7 +76462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5268">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5304">
 <summary>
 Relabel vfio devices.
 </summary>
@@ -76368,7 +76472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vhost" lineno="5286">
+<interface name="dev_rw_vhost" lineno="5322">
 <summary>
 Allow read/write the vhost devices
 </summary>
@@ -76378,7 +76482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vmware" lineno="5304">
+<interface name="dev_rw_vmware" lineno="5340">
 <summary>
 Read and write VMWare devices.
 </summary>
@@ -76388,7 +76492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_vmware" lineno="5322">
+<interface name="dev_rwx_vmware" lineno="5358">
 <summary>
 Read, write, and mmap VMWare devices.
 </summary>
@@ -76398,7 +76502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_watchdog" lineno="5341">
+<interface name="dev_read_watchdog" lineno="5377">
 <summary>
 Read from watchdog devices.
 </summary>
@@ -76408,7 +76512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_watchdog" lineno="5359">
+<interface name="dev_write_watchdog" lineno="5395">
 <summary>
 Write to watchdog devices.
 </summary>
@@ -76418,7 +76522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_wireless" lineno="5377">
+<interface name="dev_read_wireless" lineno="5413">
 <summary>
 Read the wireless device.
 </summary>
@@ -76428,7 +76532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_wireless" lineno="5395">
+<interface name="dev_rw_wireless" lineno="5431">
 <summary>
 Read and write the the wireless device.
 </summary>
@@ -76438,7 +76542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_wireless" lineno="5413">
+<interface name="dev_manage_wireless" lineno="5449">
 <summary>
 manage the wireless device.
 </summary>
@@ -76448,7 +76552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xen" lineno="5431">
+<interface name="dev_rw_xen" lineno="5467">
 <summary>
 Read and write Xen devices.
 </summary>
@@ -76458,7 +76562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_xen" lineno="5450">
+<interface name="dev_manage_xen" lineno="5486">
 <summary>
 Create, read, write, and delete Xen devices.
 </summary>
@@ -76468,7 +76572,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_xen" lineno="5474">
+<interface name="dev_filetrans_xen" lineno="5510">
 <summary>
 Automatic type transition to the type
 for xen device nodes when created in /dev.
@@ -76484,7 +76588,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5492">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5528">
 <summary>
 Get the attributes of X server miscellaneous devices.
 </summary>
@@ -76494,7 +76598,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5510">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5546">
 <summary>
 Set the attributes of X server miscellaneous devices.
 </summary>
@@ -76504,7 +76608,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xserver_misc" lineno="5528">
+<interface name="dev_rw_xserver_misc" lineno="5564">
 <summary>
 Read and write X server miscellaneous devices.
 </summary>
@@ -76514,7 +76618,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_map_xserver_misc" lineno="5546">
+<interface name="dev_map_xserver_misc" lineno="5582">
 <summary>
 Map X server miscellaneous devices.
 </summary>
@@ -76524,7 +76628,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_zero" lineno="5564">
+<interface name="dev_rw_zero" lineno="5600">
 <summary>
 Read and write to the zero device (/dev/zero).
 </summary>
@@ -76534,7 +76638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_zero" lineno="5582">
+<interface name="dev_rwx_zero" lineno="5618">
 <summary>
 Read, write, and execute the zero device (/dev/zero).
 </summary>
@@ -76544,7 +76648,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_execmod_zero" lineno="5601">
+<interface name="dev_execmod_zero" lineno="5637">
 <summary>
 Execmod the zero device (/dev/zero).
 </summary>
@@ -76554,7 +76658,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_zero_dev" lineno="5620">
+<interface name="dev_create_zero_dev" lineno="5656">
 <summary>
 Create the zero device (/dev/zero).
 </summary>
@@ -76564,7 +76668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_cpu_online" lineno="5643">
+<interface name="dev_read_cpu_online" lineno="5679">
 <summary>
 Read cpu online hardware state information
 </summary>
@@ -76579,7 +76683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_unconfined" lineno="5663">
+<interface name="dev_unconfined" lineno="5699">
 <summary>
 Unconfined access to devices.
 </summary>
@@ -76589,7 +76693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_cpu_online" lineno="5683">
+<interface name="dev_relabel_cpu_online" lineno="5719">
 <summary>
 Relabel cpu online hardware state information.
 </summary>
@@ -76599,7 +76703,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5702">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738">
 <summary>
 Dont audit attempts to read usbmon devices
 </summary>
@@ -78355,7 +78459,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_all" lineno="1259">
+<interface name="files_search_all" lineno="1255">
 <summary>
 Search the contents of all directories on
 extended attribute filesystems.
@@ -78366,7 +78470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all" lineno="1278">
+<interface name="files_list_all" lineno="1274">
 <summary>
 List the contents of all directories on
 extended attribute filesystems.
@@ -78377,7 +78481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_files_as" lineno="1296">
+<interface name="files_create_all_files_as" lineno="1292">
 <summary>
 Create all files as is.
 </summary>
@@ -78387,7 +78491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1316">
+<interface name="files_dontaudit_search_all_dirs" lineno="1312">
 <summary>
 Do not audit attempts to search the
 contents of any directories on extended
@@ -78399,7 +78503,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1339">
+<interface name="files_getattr_all_file_type_fs" lineno="1335">
 <summary>
 Get the attributes of all filesystems
 with the type of a file.
@@ -78410,7 +78514,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1357">
+<interface name="files_relabelto_all_file_type_fs" lineno="1353">
 <summary>
 Relabel a filesystem to the type of a file.
 </summary>
@@ -78420,7 +78524,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1375">
+<interface name="files_relabel_all_file_type_fs" lineno="1371">
 <summary>
 Relabel a filesystem to and from the type of a file.
 </summary>
@@ -78430,7 +78534,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mount_all_file_type_fs" lineno="1393">
+<interface name="files_mount_all_file_type_fs" lineno="1389">
 <summary>
 Mount all filesystems with the type of a file.
 </summary>
@@ -78440,7 +78544,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1411">
+<interface name="files_unmount_all_file_type_fs" lineno="1407">
 <summary>
 Unmount all filesystems with the type of a file.
 </summary>
@@ -78450,7 +78554,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_non_auth_dirs" lineno="1430">
+<interface name="files_list_non_auth_dirs" lineno="1426">
 <summary>
 Read all non-authentication related
 directories.
@@ -78461,7 +78565,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_files" lineno="1449">
+<interface name="files_read_non_auth_files" lineno="1445">
 <summary>
 Read all non-authentication related
 files.
@@ -78472,7 +78576,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_symlinks" lineno="1468">
+<interface name="files_read_non_auth_symlinks" lineno="1464">
 <summary>
 Read all non-authentication related
 symbolic links.
@@ -78483,7 +78587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_non_auth_files" lineno="1486">
+<interface name="files_rw_non_auth_files" lineno="1482">
 <summary>
 rw non-authentication related files.
 </summary>
@@ -78493,7 +78597,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_auth_files" lineno="1506">
+<interface name="files_manage_non_auth_files" lineno="1502">
 <summary>
 Manage non-authentication related
 files.
@@ -78505,7 +78609,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_map_non_auth_files" lineno="1534">
+<interface name="files_map_non_auth_files" lineno="1526">
 <summary>
 Mmap non-authentication related
 files.
@@ -78517,7 +78621,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_non_auth_files" lineno="1554">
+<interface name="files_relabel_non_auth_files" lineno="1546">
 <summary>
 Relabel all non-authentication related
 files.
@@ -78529,7 +78633,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_config_dirs" lineno="1587">
+<interface name="files_manage_config_dirs" lineno="1579">
 <summary>
 Manage all configuration directories on filesystem
 </summary>
@@ -78540,7 +78644,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_dirs" lineno="1606">
+<interface name="files_relabel_config_dirs" lineno="1598">
 <summary>
 Relabel configuration directories
 </summary>
@@ -78551,7 +78655,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_dontaudit_relabel_config_dirs" lineno="1625">
+<interface name="files_dontaudit_relabel_config_dirs" lineno="1617">
 <summary>
 Do not audit attempts to relabel configuration directories
 </summary>
@@ -78562,7 +78666,7 @@ Domain not to audit.
 </param>
 
 </interface>
-<interface name="files_read_config_files" lineno="1643">
+<interface name="files_read_config_files" lineno="1635">
 <summary>
 Read config files in /etc.
 </summary>
@@ -78572,7 +78676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_config_files" lineno="1664">
+<interface name="files_manage_config_files" lineno="1656">
 <summary>
 Manage all configuration files on filesystem
 </summary>
@@ -78583,7 +78687,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_files" lineno="1683">
+<interface name="files_relabel_config_files" lineno="1675">
 <summary>
 Relabel configuration files
 </summary>
@@ -78594,7 +78698,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_dontaudit_relabel_config_files" lineno="1702">
+<interface name="files_dontaudit_relabel_config_files" lineno="1694">
 <summary>
 Do not audit attempts to relabel configuration files
 </summary>
@@ -78605,7 +78709,7 @@ Domain not to audit.
 </param>
 
 </interface>
-<interface name="files_mounton_all_mountpoints" lineno="1720">
+<interface name="files_mounton_all_mountpoints" lineno="1712">
 <summary>
 Mount a filesystem on all mount points.
 </summary>
@@ -78615,7 +78719,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_mountpoints" lineno="1741">
+<interface name="files_getattr_all_mountpoints" lineno="1733">
 <summary>
 Get the attributes of all mount points.
 </summary>
@@ -78625,7 +78729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_mountpoints" lineno="1759">
+<interface name="files_setattr_all_mountpoints" lineno="1751">
 <summary>
 Set the attributes of all mount points.
 </summary>
@@ -78635,7 +78739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1777">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769">
 <summary>
 Do not audit attempts to set the attributes on all mount points.
 </summary>
@@ -78645,7 +78749,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_all_mountpoints" lineno="1795">
+<interface name="files_search_all_mountpoints" lineno="1787">
 <summary>
 Search all mount points.
 </summary>
@@ -78655,7 +78759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1813">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1805">
 <summary>
 Do not audit searching of all mount points.
 </summary>
@@ -78665,7 +78769,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_mountpoints" lineno="1831">
+<interface name="files_list_all_mountpoints" lineno="1823">
 <summary>
 List all mount points.
 </summary>
@@ -78675,7 +78779,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1849">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1841">
 <summary>
 Do not audit listing of all mount points.
 </summary>
@@ -78685,7 +78789,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1867">
+<interface name="files_write_all_mountpoints" lineno="1859">
+<summary>
+Check if all mountpoints are writable.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1877">
 <summary>
 Do not audit attempts to write to mount points.
 </summary>
@@ -78695,7 +78809,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_root" lineno="1885">
+<interface name="files_list_root" lineno="1895">
 <summary>
 List the contents of the root directory.
 </summary>
@@ -78705,7 +78819,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_symlinks" lineno="1905">
+<interface name="files_delete_root_symlinks" lineno="1915">
 <summary>
 Delete symbolic links in the
 root directory.
@@ -78716,7 +78830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1923">
+<interface name="files_dontaudit_write_root_dirs" lineno="1933">
 <summary>
 Do not audit attempts to write to / dirs.
 </summary>
@@ -78726,7 +78840,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1942">
+<interface name="files_dontaudit_rw_root_dir" lineno="1952">
 <summary>
 Do not audit attempts to write
 files in the root directory.
@@ -78737,7 +78851,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_root_dirs" lineno="1960">
+<interface name="files_watch_root_dirs" lineno="1970">
 <summary>
 Watch the root directory.
 </summary>
@@ -78747,7 +78861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_root_filetrans" lineno="1994">
+<interface name="files_root_filetrans" lineno="2004">
 <summary>
 Create an object in the root directory, with a private
 type using a type transition.
@@ -78773,7 +78887,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_root_files" lineno="2013">
+<interface name="files_dontaudit_read_root_files" lineno="2023">
 <summary>
 Do not audit attempts to read files in
 the root directory.
@@ -78784,7 +78898,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_files" lineno="2032">
+<interface name="files_dontaudit_rw_root_files" lineno="2042">
 <summary>
 Do not audit attempts to read or write
 files in the root directory.
@@ -78795,7 +78909,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="2051">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2061">
 <summary>
 Do not audit attempts to read or write
 character device nodes in the root directory.
@@ -78806,7 +78920,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_chr_files" lineno="2070">
+<interface name="files_delete_root_chr_files" lineno="2080">
 <summary>
 Delete character device nodes in
 the root directory.
@@ -78817,7 +78931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_files" lineno="2088">
+<interface name="files_delete_root_files" lineno="2098">
 <summary>
 Delete files in the root directory.
 </summary>
@@ -78827,7 +78941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_root_files" lineno="2106">
+<interface name="files_exec_root_files" lineno="2116">
 <summary>
 Execute files in the root directory.
 </summary>
@@ -78837,7 +78951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_dir_entry" lineno="2124">
+<interface name="files_delete_root_dir_entry" lineno="2134">
 <summary>
 Remove entries from the root directory.
 </summary>
@@ -78847,7 +78961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_root_dir" lineno="2142">
+<interface name="files_manage_root_dir" lineno="2152">
 <summary>
 Manage the root directory.
 </summary>
@@ -78857,7 +78971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_rootfs" lineno="2161">
+<interface name="files_getattr_rootfs" lineno="2171">
 <summary>
 Get the attributes of a rootfs
 file system.
@@ -78868,7 +78982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_rootfs" lineno="2179">
+<interface name="files_associate_rootfs" lineno="2189">
 <summary>
 Associate to root file system.
 </summary>
@@ -78878,7 +78992,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_rootfs" lineno="2197">
+<interface name="files_relabel_rootfs" lineno="2207">
 <summary>
 Relabel to and from rootfs file system.
 </summary>
@@ -78888,7 +79002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_rootfs" lineno="2215">
+<interface name="files_unmount_rootfs" lineno="2225">
 <summary>
 Unmount a rootfs filesystem.
 </summary>
@@ -78898,7 +79012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_root" lineno="2233">
+<interface name="files_mounton_root" lineno="2243">
 <summary>
 Mount on the root directory (/)
 </summary>
@@ -78908,7 +79022,28 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_boot_dirs" lineno="2251">
+<interface name="files_getattr_boot_fs" lineno="2262">
+<summary>
+Get the attributes of a filesystem
+mounted on /boot.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_remount_boot" lineno="2280">
+<summary>
+Remount a filesystem mounted on /boot.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_getattr_boot_dirs" lineno="2298">
 <summary>
 Get attributes of the /boot directory.
 </summary>
@@ -78918,7 +79053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2270">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317">
 <summary>
 Do not audit attempts to get attributes
 of the /boot directory.
@@ -78929,7 +79064,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_boot" lineno="2288">
+<interface name="files_search_boot" lineno="2335">
 <summary>
 Search the /boot directory.
 </summary>
@@ -78939,7 +79074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_boot" lineno="2306">
+<interface name="files_dontaudit_search_boot" lineno="2353">
 <summary>
 Do not audit attempts to search the /boot directory.
 </summary>
@@ -78949,7 +79084,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_boot" lineno="2324">
+<interface name="files_list_boot" lineno="2371">
 <summary>
 List the /boot directory.
 </summary>
@@ -78959,7 +79094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_boot" lineno="2342">
+<interface name="files_dontaudit_list_boot" lineno="2389">
 <summary>
 Do not audit attempts to list the /boot directory.
 </summary>
@@ -78969,7 +79104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_dirs" lineno="2360">
+<interface name="files_create_boot_dirs" lineno="2407">
 <summary>
 Create directories in /boot
 </summary>
@@ -78979,7 +79114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_dirs" lineno="2379">
+<interface name="files_manage_boot_dirs" lineno="2426">
 <summary>
 Create, read, write, and delete
 directories in /boot.
@@ -78990,7 +79125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_boot_filetrans" lineno="2413">
+<interface name="files_boot_filetrans" lineno="2460">
 <summary>
 Create a private type object in boot
 with an automatic type transition
@@ -79016,7 +79151,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_files" lineno="2432">
+<interface name="files_read_boot_files" lineno="2479">
 <summary>
 read files in the /boot directory.
 </summary>
@@ -79027,7 +79162,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_boot_files" lineno="2452">
+<interface name="files_manage_boot_files" lineno="2499">
 <summary>
 Create, read, write, and delete files
 in the /boot directory.
@@ -79039,7 +79174,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelfrom_boot_files" lineno="2470">
+<interface name="files_relabelfrom_boot_files" lineno="2517">
 <summary>
 Relabel from files in the /boot directory.
 </summary>
@@ -79049,7 +79184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_symlinks" lineno="2488">
+<interface name="files_read_boot_symlinks" lineno="2535">
 <summary>
 Read symbolic links in the /boot directory.
 </summary>
@@ -79059,7 +79194,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_boot_symlinks" lineno="2507">
+<interface name="files_rw_boot_symlinks" lineno="2554">
 <summary>
 Read and write symbolic links
 in the /boot directory.
@@ -79070,7 +79205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_symlinks" lineno="2527">
+<interface name="files_manage_boot_symlinks" lineno="2574">
 <summary>
 Create, read, write, and delete symbolic links
 in the /boot directory.
@@ -79081,7 +79216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_img" lineno="2545">
+<interface name="files_read_kernel_img" lineno="2592">
 <summary>
 Read kernel files in the /boot directory.
 </summary>
@@ -79091,7 +79226,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_img" lineno="2566">
+<interface name="files_create_kernel_img" lineno="2613">
 <summary>
 Install a kernel into the /boot directory.
 </summary>
@@ -79102,7 +79237,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_kernel" lineno="2586">
+<interface name="files_delete_kernel" lineno="2633">
 <summary>
 Delete a kernel from /boot.
 </summary>
@@ -79113,7 +79248,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_default_dirs" lineno="2604">
+<interface name="files_getattr_default_dirs" lineno="2651">
 <summary>
 Getattr of directories with the default file type.
 </summary>
@@ -79123,7 +79258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2623">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2670">
 <summary>
 Do not audit attempts to get the attributes of
 directories with the default file type.
@@ -79134,7 +79269,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_default" lineno="2641">
+<interface name="files_search_default" lineno="2688">
 <summary>
 Search the contents of directories with the default file type.
 </summary>
@@ -79144,7 +79279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_default" lineno="2659">
+<interface name="files_list_default" lineno="2706">
 <summary>
 List contents of directories with the default file type.
 </summary>
@@ -79154,7 +79289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_default" lineno="2678">
+<interface name="files_dontaudit_list_default" lineno="2725">
 <summary>
 Do not audit attempts to list contents of
 directories with the default file type.
@@ -79165,7 +79300,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_dirs" lineno="2697">
+<interface name="files_manage_default_dirs" lineno="2744">
 <summary>
 Create, read, write, and delete directories with
 the default file type.
@@ -79176,7 +79311,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_default" lineno="2715">
+<interface name="files_mounton_default" lineno="2762">
 <summary>
 Mount a filesystem on a directory with the default file type.
 </summary>
@@ -79186,7 +79321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2734">
+<interface name="files_dontaudit_getattr_default_files" lineno="2781">
 <summary>
 Do not audit attempts to get the attributes of
 files with the default file type.
@@ -79197,7 +79332,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_files" lineno="2752">
+<interface name="files_read_default_files" lineno="2799">
 <summary>
 Read files with the default file type.
 </summary>
@@ -79207,7 +79342,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_default_files" lineno="2771">
+<interface name="files_dontaudit_read_default_files" lineno="2818">
 <summary>
 Do not audit attempts to read files
 with the default file type.
@@ -79218,7 +79353,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_files" lineno="2790">
+<interface name="files_manage_default_files" lineno="2837">
 <summary>
 Create, read, write, and delete files with
 the default file type.
@@ -79229,7 +79364,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_symlinks" lineno="2808">
+<interface name="files_read_default_symlinks" lineno="2855">
 <summary>
 Read symbolic links with the default file type.
 </summary>
@@ -79239,7 +79374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_sockets" lineno="2826">
+<interface name="files_read_default_sockets" lineno="2873">
 <summary>
 Read sockets with the default file type.
 </summary>
@@ -79249,7 +79384,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_pipes" lineno="2844">
+<interface name="files_read_default_pipes" lineno="2891">
 <summary>
 Read named pipes with the default file type.
 </summary>
@@ -79259,7 +79394,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_etc" lineno="2862">
+<interface name="files_search_etc" lineno="2909">
 <summary>
 Search the contents of /etc directories.
 </summary>
@@ -79269,7 +79404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_etc_dirs" lineno="2880">
+<interface name="files_setattr_etc_dirs" lineno="2927">
 <summary>
 Set the attributes of the /etc directories.
 </summary>
@@ -79279,7 +79414,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_etc" lineno="2898">
+<interface name="files_list_etc" lineno="2945">
 <summary>
 List the contents of /etc directories.
 </summary>
@@ -79289,7 +79424,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2916">
+<interface name="files_dontaudit_write_etc_dirs" lineno="2963">
 <summary>
 Do not audit attempts to write to /etc dirs.
 </summary>
@@ -79299,7 +79434,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_dirs" lineno="2934">
+<interface name="files_rw_etc_dirs" lineno="2981">
 <summary>
 Add and remove entries from /etc directories.
 </summary>
@@ -79309,7 +79444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_dirs" lineno="2953">
+<interface name="files_manage_etc_dirs" lineno="3000">
 <summary>
 Manage generic directories in /etc
 </summary>
@@ -79320,7 +79455,7 @@ Domain allowed access
 </param>
 
 </interface>
-<interface name="files_relabelto_etc_dirs" lineno="2971">
+<interface name="files_relabelto_etc_dirs" lineno="3018">
 <summary>
 Relabel directories to etc_t.
 </summary>
@@ -79330,7 +79465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_dirs" lineno="2990">
+<interface name="files_mounton_etc_dirs" lineno="3037">
 <summary>
 Mount a filesystem on the
 etc directories.
@@ -79341,7 +79476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_dirs" lineno="3008">
+<interface name="files_watch_etc_dirs" lineno="3055">
 <summary>
 Watch /etc directories
 </summary>
@@ -79351,7 +79486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_files" lineno="3060">
+<interface name="files_read_etc_files" lineno="3107">
 <summary>
 Read generic files in /etc.
 </summary>
@@ -79395,7 +79530,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_map_etc_files" lineno="3092">
+<interface name="files_map_etc_files" lineno="3139">
 <summary>
 Map generic files in /etc.
 </summary>
@@ -79417,7 +79552,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3110">
+<interface name="files_dontaudit_write_etc_files" lineno="3157">
 <summary>
 Do not audit attempts to write generic files in /etc.
 </summary>
@@ -79427,7 +79562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_files" lineno="3129">
+<interface name="files_rw_etc_files" lineno="3176">
 <summary>
 Read and write generic files in /etc.
 </summary>
@@ -79438,7 +79573,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_files" lineno="3151">
+<interface name="files_manage_etc_files" lineno="3198">
 <summary>
 Create, read, write, and delete generic
 files in /etc.
@@ -79450,7 +79585,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_manage_etc_files" lineno="3172">
+<interface name="files_dontaudit_manage_etc_files" lineno="3219">
 <summary>
 Do not audit attempts to create, read, write,
 and delete generic files in /etc.
@@ -79462,7 +79597,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_etc_files" lineno="3190">
+<interface name="files_delete_etc_files" lineno="3237">
 <summary>
 Delete system configuration files in /etc.
 </summary>
@@ -79472,7 +79607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_etc_files" lineno="3208">
+<interface name="files_exec_etc_files" lineno="3255">
 <summary>
 Execute generic files in /etc.
 </summary>
@@ -79482,7 +79617,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_get_etc_unit_status" lineno="3228">
+<interface name="files_watch_etc_files" lineno="3275">
+<summary>
+Watch /etc files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_get_etc_unit_status" lineno="3293">
 <summary>
 Get etc_t service status.
 </summary>
@@ -79492,7 +79637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_start_etc_service" lineno="3247">
+<interface name="files_start_etc_service" lineno="3312">
 <summary>
 start etc_t service
 </summary>
@@ -79502,7 +79647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_stop_etc_service" lineno="3266">
+<interface name="files_stop_etc_service" lineno="3331">
 <summary>
 stop etc_t service
 </summary>
@@ -79512,7 +79657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_etc_files" lineno="3285">
+<interface name="files_relabel_etc_files" lineno="3350">
 <summary>
 Relabel from and to generic files in /etc.
 </summary>
@@ -79522,7 +79667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_symlinks" lineno="3304">
+<interface name="files_read_etc_symlinks" lineno="3369">
 <summary>
 Read symbolic links in /etc.
 </summary>
@@ -79532,7 +79677,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_symlinks" lineno="3322">
+<interface name="files_watch_etc_symlinks" lineno="3387">
 <summary>
 Watch /etc symlinks
 </summary>
@@ -79542,7 +79687,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_symlinks" lineno="3340">
+<interface name="files_manage_etc_symlinks" lineno="3405">
 <summary>
 Create, read, write, and delete symbolic links in /etc.
 </summary>
@@ -79552,7 +79697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans" lineno="3374">
+<interface name="files_etc_filetrans" lineno="3439">
 <summary>
 Create objects in /etc with a private
 type using a type_transition.
@@ -79578,7 +79723,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_flag" lineno="3404">
+<interface name="files_create_boot_flag" lineno="3469">
 <summary>
 Create a boot flag.
 </summary>
@@ -79600,7 +79745,7 @@ The name of the object being created.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_boot_flag" lineno="3430">
+<interface name="files_delete_boot_flag" lineno="3495">
 <summary>
 Delete a boot flag.
 </summary>
@@ -79617,7 +79762,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3449">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3514">
 <summary>
 Get the attributes of the
 etc_runtime directories.
@@ -79628,7 +79773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3468">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3533">
 <summary>
 Mount a filesystem on the
 etc_runtime directories.
@@ -79639,7 +79784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3486">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3551">
 <summary>
 Relabel to etc_runtime_t dirs.
 </summary>
@@ -79649,7 +79794,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3504">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569">
 <summary>
 Do not audit attempts to set the attributes of the etc_runtime files
 </summary>
@@ -79659,7 +79804,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime_files" lineno="3542">
+<interface name="files_read_etc_runtime_files" lineno="3607">
 <summary>
 Read files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79689,7 +79834,7 @@ Domain allowed access.
 <infoflow type="read" weight="10" />
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3564">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629">
 <summary>
 Do not audit attempts to read files
 in /etc that are dynamically
@@ -79701,7 +79846,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3583">
+<interface name="files_dontaudit_read_etc_files" lineno="3648">
 <summary>
 Do not audit attempts to read files
 in /etc
@@ -79712,7 +79857,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3602">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667">
 <summary>
 Do not audit attempts to write
 etc runtime files.
@@ -79723,7 +79868,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_runtime_files" lineno="3622">
+<interface name="files_rw_etc_runtime_files" lineno="3687">
 <summary>
 Read and write files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79735,7 +79880,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_runtime_files" lineno="3644">
+<interface name="files_manage_etc_runtime_files" lineno="3709">
 <summary>
 Create, read, write, and delete files in
 /etc that are dynamically created on boot,
@@ -79748,7 +79893,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3662">
+<interface name="files_relabelto_etc_runtime_files" lineno="3727">
 <summary>
 Relabel to etc_runtime_t files.
 </summary>
@@ -79758,7 +79903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3691">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3756">
 <summary>
 Create, etc runtime objects with an automatic
 type transition.
@@ -79779,7 +79924,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_home_dir" lineno="3710">
+<interface name="files_getattr_home_dir" lineno="3775">
 <summary>
 Get the attributes of the home directories root
 (/home).
@@ -79790,7 +79935,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3731">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3796">
 <summary>
 Do not audit attempts to get the
 attributes of the home directories root
@@ -79802,7 +79947,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_home" lineno="3750">
+<interface name="files_search_home" lineno="3815">
 <summary>
 Search home directories root (/home).
 </summary>
@@ -79812,7 +79957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_home" lineno="3770">
+<interface name="files_dontaudit_search_home" lineno="3835">
 <summary>
 Do not audit attempts to search
 home directories root (/home).
@@ -79823,7 +79968,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_home" lineno="3790">
+<interface name="files_dontaudit_list_home" lineno="3855">
 <summary>
 Do not audit attempts to list
 home directories root (/home).
@@ -79834,7 +79979,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_home" lineno="3809">
+<interface name="files_list_home" lineno="3874">
 <summary>
 Get listing of home directories.
 </summary>
@@ -79844,7 +79989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_home" lineno="3828">
+<interface name="files_relabelto_home" lineno="3893">
 <summary>
 Relabel to user home root (/home).
 </summary>
@@ -79854,7 +79999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_home" lineno="3846">
+<interface name="files_relabelfrom_home" lineno="3911">
 <summary>
 Relabel from user home root (/home).
 </summary>
@@ -79864,7 +80009,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_home_filetrans" lineno="3879">
+<interface name="files_watch_home" lineno="3929">
+<summary>
+Watch the user home root (/home).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_home_filetrans" lineno="3962">
 <summary>
 Create objects in /home.
 </summary>
@@ -79889,7 +80044,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3897">
+<interface name="files_getattr_lost_found_dirs" lineno="3980">
 <summary>
 Get the attributes of lost+found directories.
 </summary>
@@ -79899,7 +80054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3916">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999">
 <summary>
 Do not audit attempts to get the attributes of
 lost+found directories.
@@ -79910,7 +80065,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_lost_found" lineno="3934">
+<interface name="files_list_lost_found" lineno="4017">
 <summary>
 List the contents of lost+found directories.
 </summary>
@@ -79920,7 +80075,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_lost_found" lineno="3954">
+<interface name="files_manage_lost_found" lineno="4037">
 <summary>
 Create, read, write, and delete objects in
 lost+found directories.
@@ -79932,7 +80087,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_mnt" lineno="3976">
+<interface name="files_search_mnt" lineno="4059">
 <summary>
 Search the contents of /mnt.
 </summary>
@@ -79942,7 +80097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_mnt" lineno="3994">
+<interface name="files_dontaudit_search_mnt" lineno="4077">
 <summary>
 Do not audit attempts to search /mnt.
 </summary>
@@ -79952,7 +80107,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_mnt" lineno="4012">
+<interface name="files_list_mnt" lineno="4095">
 <summary>
 List the contents of /mnt.
 </summary>
@@ -79962,7 +80117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_mnt" lineno="4030">
+<interface name="files_dontaudit_list_mnt" lineno="4113">
 <summary>
 Do not audit attempts to list the contents of /mnt.
 </summary>
@@ -79972,7 +80127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_mnt" lineno="4048">
+<interface name="files_mounton_mnt" lineno="4131">
 <summary>
 Mount a filesystem on /mnt.
 </summary>
@@ -79982,7 +80137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_dirs" lineno="4067">
+<interface name="files_manage_mnt_dirs" lineno="4150">
 <summary>
 Create, read, write, and delete directories in /mnt.
 </summary>
@@ -79993,7 +80148,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_mnt_files" lineno="4085">
+<interface name="files_manage_mnt_files" lineno="4168">
 <summary>
 Create, read, write, and delete files in /mnt.
 </summary>
@@ -80003,7 +80158,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_files" lineno="4103">
+<interface name="files_read_mnt_files" lineno="4186">
 <summary>
 read files in /mnt.
 </summary>
@@ -80013,7 +80168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_symlinks" lineno="4121">
+<interface name="files_read_mnt_symlinks" lineno="4204">
 <summary>
 Read symbolic links in /mnt.
 </summary>
@@ -80023,7 +80178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_symlinks" lineno="4139">
+<interface name="files_manage_mnt_symlinks" lineno="4222">
 <summary>
 Create, read, write, and delete symbolic links in /mnt.
 </summary>
@@ -80033,7 +80188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_kernel_modules" lineno="4157">
+<interface name="files_search_kernel_modules" lineno="4240">
 <summary>
 Search the contents of the kernel module directories.
 </summary>
@@ -80043,7 +80198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_kernel_modules" lineno="4176">
+<interface name="files_list_kernel_modules" lineno="4259">
 <summary>
 List the contents of the kernel module directories.
 </summary>
@@ -80053,7 +80208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_kernel_modules" lineno="4195">
+<interface name="files_getattr_kernel_modules" lineno="4278">
 <summary>
 Get the attributes of kernel module files.
 </summary>
@@ -80063,7 +80218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_modules" lineno="4213">
+<interface name="files_read_kernel_modules" lineno="4296">
 <summary>
 Read kernel module files.
 </summary>
@@ -80073,7 +80228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mmap_read_kernel_modules" lineno="4233">
+<interface name="files_mmap_read_kernel_modules" lineno="4316">
 <summary>
 Read and mmap kernel module files.
 </summary>
@@ -80083,7 +80238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_kernel_modules" lineno="4254">
+<interface name="files_write_kernel_modules" lineno="4337">
 <summary>
 Write kernel module files.
 </summary>
@@ -80093,7 +80248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_modules" lineno="4273">
+<interface name="files_delete_kernel_modules" lineno="4356">
 <summary>
 Delete kernel module files.
 </summary>
@@ -80103,7 +80258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_kernel_modules" lineno="4293">
+<interface name="files_manage_kernel_modules" lineno="4376">
 <summary>
 Create, read, write, and delete
 kernel module files.
@@ -80115,7 +80270,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_kernel_modules" lineno="4313">
+<interface name="files_relabel_kernel_modules" lineno="4396">
 <summary>
 Relabel from and to kernel module files.
 </summary>
@@ -80125,7 +80280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_kernel_modules_filetrans" lineno="4348">
+<interface name="files_kernel_modules_filetrans" lineno="4431">
 <summary>
 Create objects in the kernel module directories
 with a private type via an automatic type transition.
@@ -80151,7 +80306,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_load_kernel_modules" lineno="4366">
+<interface name="files_load_kernel_modules" lineno="4449">
 <summary>
 Load kernel module files.
 </summary>
@@ -80161,7 +80316,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_load_kernel_modules" lineno="4385">
+<interface name="files_dontaudit_load_kernel_modules" lineno="4468">
 <summary>
 Load kernel module files.
 </summary>
@@ -80171,7 +80326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_world_readable" lineno="4405">
+<interface name="files_list_world_readable" lineno="4488">
 <summary>
 List world-readable directories.
 </summary>
@@ -80182,7 +80337,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_files" lineno="4424">
+<interface name="files_read_world_readable_files" lineno="4507">
 <summary>
 Read world-readable files.
 </summary>
@@ -80193,7 +80348,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_symlinks" lineno="4443">
+<interface name="files_read_world_readable_symlinks" lineno="4526">
 <summary>
 Read world-readable symbolic links.
 </summary>
@@ -80204,7 +80359,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_pipes" lineno="4461">
+<interface name="files_read_world_readable_pipes" lineno="4544">
 <summary>
 Read world-readable named pipes.
 </summary>
@@ -80214,7 +80369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_world_readable_sockets" lineno="4479">
+<interface name="files_read_world_readable_sockets" lineno="4562">
 <summary>
 Read world-readable sockets.
 </summary>
@@ -80224,7 +80379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_tmp" lineno="4499">
+<interface name="files_associate_tmp" lineno="4582">
 <summary>
 Allow the specified type to associate
 to a filesystem with the type of the
@@ -80236,7 +80391,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_tmp_dirs" lineno="4517">
+<interface name="files_getattr_tmp_dirs" lineno="4600">
 <summary>
 Get the	attributes of the tmp directory (/tmp).
 </summary>
@@ -80246,7 +80401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4536">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619">
 <summary>
 Do not audit attempts to get the
 attributes of the tmp directory (/tmp).
@@ -80257,7 +80412,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_tmp" lineno="4554">
+<interface name="files_search_tmp" lineno="4637">
 <summary>
 Search the tmp directory (/tmp).
 </summary>
@@ -80267,7 +80422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_tmp" lineno="4572">
+<interface name="files_dontaudit_search_tmp" lineno="4655">
 <summary>
 Do not audit attempts to search the tmp directory (/tmp).
 </summary>
@@ -80277,7 +80432,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_tmp" lineno="4590">
+<interface name="files_list_tmp" lineno="4673">
 <summary>
 Read the tmp directory (/tmp).
 </summary>
@@ -80287,7 +80442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_tmp" lineno="4608">
+<interface name="files_dontaudit_list_tmp" lineno="4691">
 <summary>
 Do not audit listing of the tmp directory (/tmp).
 </summary>
@@ -80297,7 +80452,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4626">
+<interface name="files_delete_tmp_dir_entry" lineno="4709">
 <summary>
 Remove entries from the tmp directory.
 </summary>
@@ -80307,7 +80462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_files" lineno="4644">
+<interface name="files_read_generic_tmp_files" lineno="4727">
 <summary>
 Read files in the tmp directory (/tmp).
 </summary>
@@ -80317,7 +80472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4662">
+<interface name="files_manage_generic_tmp_dirs" lineno="4745">
 <summary>
 Manage temporary directories in /tmp.
 </summary>
@@ -80327,7 +80482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_generic_tmp_dirs" lineno="4680">
+<interface name="files_relabel_generic_tmp_dirs" lineno="4763">
 <summary>
 Relabel temporary directories in /tmp.
 </summary>
@@ -80337,7 +80492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_files" lineno="4698">
+<interface name="files_manage_generic_tmp_files" lineno="4781">
 <summary>
 Manage temporary files and directories in /tmp.
 </summary>
@@ -80347,7 +80502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4716">
+<interface name="files_read_generic_tmp_symlinks" lineno="4799">
 <summary>
 Read symbolic links in the tmp directory (/tmp).
 </summary>
@@ -80357,7 +80512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4734">
+<interface name="files_rw_generic_tmp_sockets" lineno="4817">
 <summary>
 Read and write generic named sockets in the tmp directory (/tmp).
 </summary>
@@ -80367,7 +80522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_tmp" lineno="4752">
+<interface name="files_mounton_tmp" lineno="4835">
 <summary>
 Mount filesystems in the tmp directory (/tmp)
 </summary>
@@ -80377,7 +80532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4770">
+<interface name="files_setattr_all_tmp_dirs" lineno="4853">
 <summary>
 Set the attributes of all tmp directories.
 </summary>
@@ -80387,7 +80542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_tmp" lineno="4788">
+<interface name="files_list_all_tmp" lineno="4871">
 <summary>
 List all tmp directories.
 </summary>
@@ -80397,7 +80552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4808">
+<interface name="files_relabel_all_tmp_dirs" lineno="4891">
 <summary>
 Relabel to and from all temporary
 directory types.
@@ -80409,7 +80564,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4829">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp files.
@@ -80420,7 +80575,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_tmp_files" lineno="4848">
+<interface name="files_getattr_all_tmp_files" lineno="4931">
 <summary>
 Allow attempts to get the attributes
 of all tmp files.
@@ -80431,7 +80586,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_files" lineno="4868">
+<interface name="files_relabel_all_tmp_files" lineno="4951">
 <summary>
 Relabel to and from all temporary
 file types.
@@ -80443,7 +80598,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4889">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp sock_file.
@@ -80454,7 +80609,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_tmp_files" lineno="4907">
+<interface name="files_read_all_tmp_files" lineno="4990">
 <summary>
 Read all tmp files.
 </summary>
@@ -80464,7 +80619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_tmp_filetrans" lineno="4941">
+<interface name="files_tmp_filetrans" lineno="5024">
 <summary>
 Create an object in the tmp directories, with a private
 type using a type transition.
@@ -80490,7 +80645,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_purge_tmp" lineno="4959">
+<interface name="files_purge_tmp" lineno="5042">
 <summary>
 Delete the contents of /tmp.
 </summary>
@@ -80500,7 +80655,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_usr_dirs" lineno="4982">
+<interface name="files_getattr_all_tmpfs_files" lineno="5065">
+<summary>
+Get the attributes of all tmpfs files.
+</summary>
+<param name="type">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_setattr_usr_dirs" lineno="5084">
 <summary>
 Set the attributes of the /usr directory.
 </summary>
@@ -80510,7 +80675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_usr" lineno="5000">
+<interface name="files_search_usr" lineno="5102">
 <summary>
 Search the content of /usr.
 </summary>
@@ -80520,7 +80685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_usr" lineno="5019">
+<interface name="files_list_usr" lineno="5121">
 <summary>
 List the contents of generic
 directories in /usr.
@@ -80531,7 +80696,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="5037">
+<interface name="files_dontaudit_write_usr_dirs" lineno="5139">
 <summary>
 Do not audit write of /usr dirs
 </summary>
@@ -80541,7 +80706,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_usr_dirs" lineno="5055">
+<interface name="files_rw_usr_dirs" lineno="5157">
 <summary>
 Add and remove entries from /usr directories.
 </summary>
@@ -80551,7 +80716,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="5074">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="5176">
 <summary>
 Do not audit attempts to add and remove
 entries from /usr directories.
@@ -80562,7 +80727,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_dirs" lineno="5092">
+<interface name="files_delete_usr_dirs" lineno="5194">
 <summary>
 Delete generic directories in /usr in the caller domain.
 </summary>
@@ -80572,7 +80737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_usr_dirs" lineno="5110">
+<interface name="files_watch_usr_dirs" lineno="5212">
 <summary>
 Watch generic directories in /usr.
 </summary>
@@ -80582,7 +80747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_files" lineno="5128">
+<interface name="files_delete_usr_files" lineno="5230">
 <summary>
 Delete generic files in /usr in the caller domain.
 </summary>
@@ -80592,7 +80757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_files" lineno="5146">
+<interface name="files_getattr_usr_files" lineno="5248">
 <summary>
 Get the attributes of files in /usr.
 </summary>
@@ -80602,7 +80767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_map_usr_files" lineno="5165">
+<interface name="files_map_usr_files" lineno="5267">
 <summary>
 Map generic files in /usr.
 </summary>
@@ -80613,7 +80778,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_read_usr_files" lineno="5201">
+<interface name="files_read_usr_files" lineno="5303">
 <summary>
 Read generic files in /usr.
 </summary>
@@ -80641,7 +80806,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_exec_usr_files" lineno="5221">
+<interface name="files_exec_usr_files" lineno="5323">
 <summary>
 Execute generic programs in /usr in the caller domain.
 </summary>
@@ -80651,7 +80816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5241">
+<interface name="files_dontaudit_write_usr_files" lineno="5343">
 <summary>
 dontaudit write of /usr files
 </summary>
@@ -80661,7 +80826,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_usr_files" lineno="5259">
+<interface name="files_manage_usr_files" lineno="5361">
 <summary>
 Create, read, write, and delete files in the /usr directory.
 </summary>
@@ -80671,7 +80836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_usr_files" lineno="5277">
+<interface name="files_relabelto_usr_files" lineno="5379">
 <summary>
 Relabel a file to the type used in /usr.
 </summary>
@@ -80681,7 +80846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_usr_files" lineno="5295">
+<interface name="files_relabelfrom_usr_files" lineno="5397">
 <summary>
 Relabel a file from the type used in /usr.
 </summary>
@@ -80691,7 +80856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_symlinks" lineno="5313">
+<interface name="files_read_usr_symlinks" lineno="5415">
 <summary>
 Read symbolic links in /usr.
 </summary>
@@ -80701,7 +80866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_usr_filetrans" lineno="5346">
+<interface name="files_usr_filetrans" lineno="5448">
 <summary>
 Create objects in the /usr directory
 </summary>
@@ -80726,7 +80891,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_search_src" lineno="5364">
+<interface name="files_search_src" lineno="5466">
 <summary>
 Search directories in /usr/src.
 </summary>
@@ -80736,7 +80901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_src" lineno="5382">
+<interface name="files_dontaudit_search_src" lineno="5484">
 <summary>
 Do not audit attempts to search /usr/src.
 </summary>
@@ -80746,7 +80911,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_src_files" lineno="5400">
+<interface name="files_getattr_usr_src_files" lineno="5502">
 <summary>
 Get the attributes of files in /usr/src.
 </summary>
@@ -80756,7 +80921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_src_files" lineno="5421">
+<interface name="files_read_usr_src_files" lineno="5523">
 <summary>
 Read files in /usr/src.
 </summary>
@@ -80766,7 +80931,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_usr_src_files" lineno="5442">
+<interface name="files_exec_usr_src_files" lineno="5544">
 <summary>
 Execute programs in /usr/src in the caller domain.
 </summary>
@@ -80776,7 +80941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_symbol_table" lineno="5462">
+<interface name="files_create_kernel_symbol_table" lineno="5564">
 <summary>
 Install a system.map into the /boot directory.
 </summary>
@@ -80786,7 +80951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_symbol_table" lineno="5481">
+<interface name="files_read_kernel_symbol_table" lineno="5583">
 <summary>
 Read system.map in the /boot directory.
 </summary>
@@ -80796,7 +80961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5500">
+<interface name="files_delete_kernel_symbol_table" lineno="5602">
 <summary>
 Delete a system.map in the /boot directory.
 </summary>
@@ -80806,7 +80971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var" lineno="5519">
+<interface name="files_search_var" lineno="5621">
 <summary>
 Search the contents of /var.
 </summary>
@@ -80816,7 +80981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5537">
+<interface name="files_dontaudit_write_var_dirs" lineno="5639">
 <summary>
 Do not audit attempts to write to /var.
 </summary>
@@ -80826,7 +80991,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_write_var_dirs" lineno="5555">
+<interface name="files_write_var_dirs" lineno="5657">
 <summary>
 Allow attempts to write to /var.dirs
 </summary>
@@ -80836,7 +81001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_var" lineno="5574">
+<interface name="files_dontaudit_search_var" lineno="5676">
 <summary>
 Do not audit attempts to search
 the contents of /var.
@@ -80847,7 +81012,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_var" lineno="5592">
+<interface name="files_list_var" lineno="5694">
 <summary>
 List the contents of /var.
 </summary>
@@ -80857,7 +81022,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_var" lineno="5611">
+<interface name="files_dontaudit_list_var" lineno="5713">
 <summary>
 Do not audit attempts to list
 the contents of /var.
@@ -80868,7 +81033,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_dirs" lineno="5630">
+<interface name="files_manage_var_dirs" lineno="5732">
 <summary>
 Create, read, write, and delete directories
 in the /var directory.
@@ -80879,7 +81044,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_dirs" lineno="5648">
+<interface name="files_relabel_var_dirs" lineno="5750">
 <summary>
 relabelto/from var directories
 </summary>
@@ -80889,7 +81054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_files" lineno="5666">
+<interface name="files_read_var_files" lineno="5768">
 <summary>
 Read files in the /var directory.
 </summary>
@@ -80899,7 +81064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_append_var_files" lineno="5684">
+<interface name="files_append_var_files" lineno="5786">
 <summary>
 Append files in the /var directory.
 </summary>
@@ -80909,7 +81074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_files" lineno="5702">
+<interface name="files_rw_var_files" lineno="5804">
 <summary>
 Read and write files in the /var directory.
 </summary>
@@ -80919,7 +81084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5721">
+<interface name="files_dontaudit_rw_var_files" lineno="5823">
 <summary>
 Do not audit attempts to read and write
 files in the /var directory.
@@ -80930,7 +81095,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_files" lineno="5739">
+<interface name="files_manage_var_files" lineno="5841">
 <summary>
 Create, read, write, and delete files in the /var directory.
 </summary>
@@ -80940,7 +81105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_symlinks" lineno="5757">
+<interface name="files_read_var_symlinks" lineno="5859">
 <summary>
 Read symbolic links in the /var directory.
 </summary>
@@ -80950,7 +81115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_symlinks" lineno="5776">
+<interface name="files_manage_var_symlinks" lineno="5878">
 <summary>
 Create, read, write, and delete symbolic
 links in the /var directory.
@@ -80961,7 +81126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_filetrans" lineno="5809">
+<interface name="files_var_filetrans" lineno="5911">
 <summary>
 Create objects in the /var directory
 </summary>
@@ -80986,7 +81151,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5827">
+<interface name="files_getattr_var_lib_dirs" lineno="5929">
 <summary>
 Get the attributes of the /var/lib directory.
 </summary>
@@ -80996,7 +81161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var_lib" lineno="5859">
+<interface name="files_search_var_lib" lineno="5961">
 <summary>
 Search the /var/lib directory.
 </summary>
@@ -81020,7 +81185,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5879">
+<interface name="files_dontaudit_search_var_lib" lineno="5981">
 <summary>
 Do not audit attempts to search the
 contents of /var/lib.
@@ -81032,7 +81197,7 @@ Domain to not audit.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_list_var_lib" lineno="5897">
+<interface name="files_list_var_lib" lineno="5999">
 <summary>
 List the contents of the /var/lib directory.
 </summary>
@@ -81042,7 +81207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_lib_dirs" lineno="5915">
+<interface name="files_rw_var_lib_dirs" lineno="6017">
 <summary>
 Read-write /var/lib directories
 </summary>
@@ -81052,7 +81217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_lib_dirs" lineno="5933">
+<interface name="files_manage_var_lib_dirs" lineno="6035">
 <summary>
 manage var_lib_t dirs
 </summary>
@@ -81062,7 +81227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_lib_dirs" lineno="5952">
+<interface name="files_relabel_var_lib_dirs" lineno="6054">
 <summary>
 relabel var_lib_t dirs
 </summary>
@@ -81072,7 +81237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_lib_filetrans" lineno="5986">
+<interface name="files_var_lib_filetrans" lineno="6088">
 <summary>
 Create objects in the /var/lib directory
 </summary>
@@ -81097,7 +81262,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_files" lineno="6005">
+<interface name="files_read_var_lib_files" lineno="6107">
 <summary>
 Read generic files in /var/lib.
 </summary>
@@ -81107,7 +81272,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_symlinks" lineno="6024">
+<interface name="files_read_var_lib_symlinks" lineno="6126">
 <summary>
 Read generic symbolic links in /var/lib
 </summary>
@@ -81117,7 +81282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_urandom_seed" lineno="6046">
+<interface name="files_manage_urandom_seed" lineno="6148">
 <summary>
 Create, read, write, and delete the
 pseudorandom number generator seed.
@@ -81128,7 +81293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mounttab" lineno="6066">
+<interface name="files_manage_mounttab" lineno="6168">
 <summary>
 Allow domain to manage mount tables
 necessary for rpcd, nfsd, etc.
@@ -81139,7 +81304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_lock_dirs" lineno="6085">
+<interface name="files_setattr_lock_dirs" lineno="6187">
 <summary>
 Set the attributes of the generic lock directories.
 </summary>
@@ -81149,7 +81314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_locks" lineno="6103">
+<interface name="files_search_locks" lineno="6205">
 <summary>
 Search the locks directory (/var/lock).
 </summary>
@@ -81159,7 +81324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_locks" lineno="6123">
+<interface name="files_dontaudit_search_locks" lineno="6225">
 <summary>
 Do not audit attempts to search the
 locks directory (/var/lock).
@@ -81170,7 +81335,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_locks" lineno="6142">
+<interface name="files_list_locks" lineno="6244">
 <summary>
 List generic lock directories.
 </summary>
@@ -81180,7 +81345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_lock_dirs" lineno="6161">
+<interface name="files_check_write_lock_dirs" lineno="6263">
 <summary>
 Test write access on lock directories.
 </summary>
@@ -81190,7 +81355,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_add_entry_lock_dirs" lineno="6180">
+<interface name="files_add_entry_lock_dirs" lineno="6282">
 <summary>
 Add entries in the /var/lock directories.
 </summary>
@@ -81200,7 +81365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_lock_dirs" lineno="6200">
+<interface name="files_rw_lock_dirs" lineno="6302">
 <summary>
 Add and remove entries in the /var/lock
 directories.
@@ -81211,7 +81376,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_lock_dirs" lineno="6219">
+<interface name="files_create_lock_dirs" lineno="6321">
 <summary>
 Create lock directories
 </summary>
@@ -81221,7 +81386,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6240">
+<interface name="files_relabel_all_lock_dirs" lineno="6342">
 <summary>
 Relabel to and from all lock directory types.
 </summary>
@@ -81232,7 +81397,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_generic_locks" lineno="6261">
+<interface name="files_getattr_generic_locks" lineno="6363">
 <summary>
 Get the attributes of generic lock files.
 </summary>
@@ -81242,7 +81407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_generic_locks" lineno="6282">
+<interface name="files_delete_generic_locks" lineno="6384">
 <summary>
 Delete generic lock files.
 </summary>
@@ -81252,7 +81417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_locks" lineno="6303">
+<interface name="files_manage_generic_locks" lineno="6405">
 <summary>
 Create, read, write, and delete generic
 lock files.
@@ -81263,7 +81428,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_locks" lineno="6325">
+<interface name="files_delete_all_locks" lineno="6427">
 <summary>
 Delete all lock files.
 </summary>
@@ -81274,7 +81439,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_locks" lineno="6346">
+<interface name="files_read_all_locks" lineno="6448">
 <summary>
 Read all lock files.
 </summary>
@@ -81284,7 +81449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_locks" lineno="6369">
+<interface name="files_manage_all_locks" lineno="6471">
 <summary>
 manage all lock files.
 </summary>
@@ -81294,7 +81459,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_locks" lineno="6392">
+<interface name="files_relabel_all_locks" lineno="6494">
 <summary>
 Relabel from/to all lock files.
 </summary>
@@ -81304,7 +81469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_lock_filetrans" lineno="6431">
+<interface name="files_lock_filetrans" lineno="6533">
 <summary>
 Create an object in the locks directory, with a private
 type using a type transition.
@@ -81330,7 +81495,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6452">
+<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554">
 <summary>
 Do not audit attempts to get the attributes
 of the /var/run directory.  (Deprecated)
@@ -81341,7 +81506,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_pid_dirs" lineno="6467">
+<interface name="files_mounton_pid_dirs" lineno="6569">
 <summary>
 mounton a /var/run directory.  (Deprecated)
 </summary>
@@ -81351,7 +81516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_pid_dirs" lineno="6482">
+<interface name="files_setattr_pid_dirs" lineno="6584">
 <summary>
 Set the attributes of the /var/run directory.  (Deprecated)
 </summary>
@@ -81361,7 +81526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_pids" lineno="6498">
+<interface name="files_search_pids" lineno="6600">
 <summary>
 Search the contents of runtime process
 ID directories (/var/run).  (Deprecated)
@@ -81372,7 +81537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_pids" lineno="6514">
+<interface name="files_dontaudit_search_pids" lineno="6616">
 <summary>
 Do not audit attempts to search
 the /var/run directory.  (Deprecated)
@@ -81383,7 +81548,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_pids" lineno="6530">
+<interface name="files_list_pids" lineno="6632">
 <summary>
 List the contents of the runtime process
 ID directories (/var/run).  (Deprecated)
@@ -81394,7 +81559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_pid_dirs" lineno="6545">
+<interface name="files_check_write_pid_dirs" lineno="6647">
 <summary>
 Check write access on /var/run directories.  (Deprecated)
 </summary>
@@ -81404,7 +81569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_pid_dirs" lineno="6560">
+<interface name="files_create_pid_dirs" lineno="6662">
 <summary>
 Create a /var/run directory.  (Deprecated)
 </summary>
@@ -81414,7 +81579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6576">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678">
 <summary>
 Do not audit attempts to get the attributes
 of the /var/run directory.
@@ -81425,7 +81590,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_runtime_dirs" lineno="6595">
+<interface name="files_mounton_runtime_dirs" lineno="6697">
 <summary>
 mounton a /var/run directory.
 </summary>
@@ -81435,7 +81600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_runtime_dirs" lineno="6613">
+<interface name="files_setattr_runtime_dirs" lineno="6715">
 <summary>
 Set the attributes of the /var/run directory.
 </summary>
@@ -81445,7 +81610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_runtime" lineno="6633">
+<interface name="files_search_runtime" lineno="6735">
 <summary>
 Search the contents of runtime process
 ID directories (/var/run).
@@ -81456,7 +81621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_runtime" lineno="6653">
+<interface name="files_dontaudit_search_runtime" lineno="6755">
 <summary>
 Do not audit attempts to search
 the /var/run directory.
@@ -81467,7 +81632,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_runtime" lineno="6673">
+<interface name="files_list_runtime" lineno="6775">
 <summary>
 List the contents of the runtime process
 ID directories (/var/run).
@@ -81478,7 +81643,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_runtime_dirs" lineno="6692">
+<interface name="files_check_write_runtime_dirs" lineno="6794">
 <summary>
 Check write access on /var/run directories.
 </summary>
@@ -81488,7 +81653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_runtime_dirs" lineno="6710">
+<interface name="files_create_runtime_dirs" lineno="6812">
 <summary>
 Create a /var/run directory.
 </summary>
@@ -81498,7 +81663,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_runtime_dirs" lineno="6728">
+<interface name="files_watch_runtime_dirs" lineno="6830">
 <summary>
 Watch /var/run directories.
 </summary>
@@ -81508,7 +81673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_pids" lineno="6746">
+<interface name="files_read_generic_pids" lineno="6848">
 <summary>
 Read generic process ID files.  (Deprecated)
 </summary>
@@ -81518,7 +81683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_generic_pid_pipes" lineno="6761">
+<interface name="files_write_generic_pid_pipes" lineno="6863">
 <summary>
 Write named generic process ID pipes.   (Deprecated)
 </summary>
@@ -81528,7 +81693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_pid_filetrans" lineno="6818">
+<interface name="files_pid_filetrans" lineno="6920">
 <summary>
 Create an object in the process ID directory, with a private type.  (Deprecated)
 </summary>
@@ -81580,7 +81745,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6838">
+<interface name="files_pid_filetrans_lock_dir" lineno="6940">
 <summary>
 Create a generic lock directory within the run directories.  (Deprecated)
 </summary>
@@ -81595,7 +81760,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_generic_pids" lineno="6853">
+<interface name="files_rw_generic_pids" lineno="6955">
 <summary>
 Read and write generic process ID files.  (Deprecated)
 </summary>
@@ -81605,7 +81770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6869">
+<interface name="files_dontaudit_getattr_all_pids" lineno="6971">
 <summary>
 Do not audit attempts to get the attributes of
 daemon runtime data files.  (Deprecated)
@@ -81616,7 +81781,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6884">
+<interface name="files_dontaudit_write_all_pids" lineno="6986">
 <summary>
 Do not audit attempts to write to daemon runtime data files.  (Deprecated)
 </summary>
@@ -81626,7 +81791,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="6899">
+<interface name="files_dontaudit_ioctl_all_pids" lineno="7001">
 <summary>
 Do not audit attempts to ioctl daemon runtime data files.  (Deprecated)
 </summary>
@@ -81636,7 +81801,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_pid_dirs" lineno="6915">
+<interface name="files_manage_all_pid_dirs" lineno="7017">
 <summary>
 manage all pidfile directories
 in the /var/run directory.  (Deprecated)
@@ -81647,7 +81812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_pids" lineno="6931">
+<interface name="files_read_all_pids" lineno="7033">
 <summary>
 Read all process ID files.  (Deprecated)
 </summary>
@@ -81658,7 +81823,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_exec_generic_pid_files" lineno="6946">
+<interface name="files_exec_generic_pid_files" lineno="7048">
 <summary>
 Execute generic programs in /var/run in the caller domain.  (Deprecated)
 </summary>
@@ -81668,7 +81833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_files" lineno="6961">
+<interface name="files_relabel_all_pid_files" lineno="7063">
 <summary>
 Relabel all pid files.  (Deprecated)
 </summary>
@@ -81678,7 +81843,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_pids" lineno="6977">
+<interface name="files_delete_all_pids" lineno="7079">
 <summary>
 Delete all process IDs.  (Deprecated)
 </summary>
@@ -81689,7 +81854,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_create_all_pid_sockets" lineno="6996">
+<interface name="files_create_all_pid_sockets" lineno="7098">
 <summary>
 Create all pid sockets.  (Deprecated)
 </summary>
@@ -81699,7 +81864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_pid_pipes" lineno="7011">
+<interface name="files_create_all_pid_pipes" lineno="7113">
 <summary>
 Create all pid named pipes.  (Deprecated)
 </summary>
@@ -81709,7 +81874,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_runtime_files" lineno="7026">
+<interface name="files_read_runtime_files" lineno="7128">
 <summary>
 Read generic runtime files.
 </summary>
@@ -81719,7 +81884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_runtime" lineno="7046">
+<interface name="files_exec_runtime" lineno="7148">
 <summary>
 Execute generic programs in /var/run in the caller domain.
 </summary>
@@ -81729,7 +81894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_runtime_files" lineno="7064">
+<interface name="files_rw_runtime_files" lineno="7166">
 <summary>
 Read and write generic runtime files.
 </summary>
@@ -81739,7 +81904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_runtime_symlinks" lineno="7084">
+<interface name="files_delete_runtime_symlinks" lineno="7186">
 <summary>
 Delete generic runtime symlinks.
 </summary>
@@ -81749,7 +81914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_runtime_pipes" lineno="7102">
+<interface name="files_write_runtime_pipes" lineno="7204">
 <summary>
 Write named generic runtime pipes.
 </summary>
@@ -81759,7 +81924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_dirs" lineno="7122">
+<interface name="files_delete_all_runtime_dirs" lineno="7224">
 <summary>
 Delete all runtime dirs.
 </summary>
@@ -81770,7 +81935,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_dirs" lineno="7140">
+<interface name="files_manage_all_runtime_dirs" lineno="7242">
 <summary>
 Create, read, write, and delete all runtime directories.
 </summary>
@@ -81780,7 +81945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="7158">
+<interface name="files_relabel_all_runtime_dirs" lineno="7260">
 <summary>
 Relabel all runtime directories.
 </summary>
@@ -81790,7 +81955,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7177">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279">
 <summary>
 Do not audit attempts to get the attributes of
 all runtime data files.
@@ -81801,7 +81966,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_runtime_files" lineno="7198">
+<interface name="files_read_all_runtime_files" lineno="7300">
 <summary>
 Read all runtime files.
 </summary>
@@ -81812,7 +81977,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7219">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321">
 <summary>
 Do not audit attempts to ioctl all runtime files.
 </summary>
@@ -81822,7 +81987,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7239">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7341">
 <summary>
 Do not audit attempts to write to all runtime files.
 </summary>
@@ -81832,7 +81997,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_files" lineno="7260">
+<interface name="files_delete_all_runtime_files" lineno="7362">
 <summary>
 Delete all runtime files.
 </summary>
@@ -81843,7 +82008,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_files" lineno="7279">
+<interface name="files_manage_all_runtime_files" lineno="7381">
 <summary>
 Create, read, write and delete all
 var_run (pid) files
@@ -81854,7 +82019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_files" lineno="7297">
+<interface name="files_relabel_all_runtime_files" lineno="7399">
 <summary>
 Relabel all runtime files.
 </summary>
@@ -81864,7 +82029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7316">
+<interface name="files_delete_all_runtime_symlinks" lineno="7418">
 <summary>
 Delete all runtime symlinks.
 </summary>
@@ -81875,7 +82040,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7335">
+<interface name="files_manage_all_runtime_symlinks" lineno="7437">
 <summary>
 Create, read, write and delete all
 var_run (pid) symbolic links.
@@ -81886,7 +82051,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7353">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7455">
 <summary>
 Relabel all runtime symbolic links.
 </summary>
@@ -81896,7 +82061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_pipes" lineno="7371">
+<interface name="files_create_all_runtime_pipes" lineno="7473">
 <summary>
 Create all runtime named pipes
 </summary>
@@ -81906,7 +82071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7390">
+<interface name="files_delete_all_runtime_pipes" lineno="7492">
 <summary>
 Delete all runtime named pipes
 </summary>
@@ -81916,7 +82081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_sockets" lineno="7409">
+<interface name="files_create_all_runtime_sockets" lineno="7511">
 <summary>
 Create all runtime sockets.
 </summary>
@@ -81926,7 +82091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7427">
+<interface name="files_delete_all_runtime_sockets" lineno="7529">
 <summary>
 Delete all runtime sockets.
 </summary>
@@ -81936,7 +82101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7445">
+<interface name="files_relabel_all_runtime_sockets" lineno="7547">
 <summary>
 Relabel all runtime named sockets.
 </summary>
@@ -81946,7 +82111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_runtime_filetrans" lineno="7505">
+<interface name="files_runtime_filetrans" lineno="7607">
 <summary>
 Create an object in the /run directory, with a private type.
 </summary>
@@ -81998,7 +82163,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7530">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7632">
 <summary>
 Create a generic lock directory within the run directories.
 </summary>
@@ -82013,7 +82178,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_spool_sockets" lineno="7548">
+<interface name="files_create_all_spool_sockets" lineno="7650">
 <summary>
 Create all spool sockets
 </summary>
@@ -82023,7 +82188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_spool_sockets" lineno="7566">
+<interface name="files_delete_all_spool_sockets" lineno="7668">
 <summary>
 Delete all spool sockets
 </summary>
@@ -82033,7 +82198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_pid_dirs" lineno="7584">
+<interface name="files_delete_all_pid_dirs" lineno="7686">
 <summary>
 Delete all process ID directories.  (Deprecated)
 </summary>
@@ -82043,7 +82208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_pids" lineno="7600">
+<interface name="files_manage_all_pids" lineno="7702">
 <summary>
 Create, read, write and delete all
 var_run (pid) content  (Deprecated)
@@ -82054,7 +82219,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_dirs" lineno="7617">
+<interface name="files_relabel_all_pid_dirs" lineno="7719">
 <summary>
 Relabel to/from all var_run (pid) directories  (Deprecated)
 </summary>
@@ -82064,7 +82229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="7632">
+<interface name="files_relabel_all_pid_sock_files" lineno="7734">
 <summary>
 Relabel to/from all var_run (pid) socket files  (Deprecated)
 </summary>
@@ -82074,7 +82239,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_pids" lineno="7647">
+<interface name="files_relabel_all_pids" lineno="7749">
 <summary>
 Relabel to/from all var_run (pid) files and directories  (Deprecated)
 </summary>
@@ -82084,7 +82249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_all_poly_members" lineno="7665">
+<interface name="files_mounton_all_poly_members" lineno="7767">
 <summary>
 Mount filesystems on all polyinstantiation
 member directories.
@@ -82095,7 +82260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_spool" lineno="7684">
+<interface name="files_search_spool" lineno="7786">
 <summary>
 Search the contents of generic spool
 directories (/var/spool).
@@ -82106,7 +82271,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_spool" lineno="7703">
+<interface name="files_dontaudit_search_spool" lineno="7805">
 <summary>
 Do not audit attempts to search generic
 spool directories.
@@ -82117,7 +82282,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_spool" lineno="7722">
+<interface name="files_list_spool" lineno="7824">
 <summary>
 List the contents of generic spool
 (/var/spool) directories.
@@ -82128,7 +82293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7741">
+<interface name="files_manage_generic_spool_dirs" lineno="7843">
 <summary>
 Create, read, write, and delete generic
 spool directories (/var/spool).
@@ -82139,7 +82304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_spool" lineno="7760">
+<interface name="files_read_generic_spool" lineno="7862">
 <summary>
 Read generic spool files.
 </summary>
@@ -82149,7 +82314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool" lineno="7780">
+<interface name="files_manage_generic_spool" lineno="7882">
 <summary>
 Create, read, write, and delete generic
 spool files.
@@ -82160,7 +82325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_spool_filetrans" lineno="7816">
+<interface name="files_spool_filetrans" lineno="7918">
 <summary>
 Create objects in the spool directory
 with a private type with a type transition.
@@ -82187,7 +82352,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_polyinstantiate_all" lineno="7836">
+<interface name="files_polyinstantiate_all" lineno="7938">
 <summary>
 Allow access to manage all polyinstantiated
 directories on the system.
@@ -82198,7 +82363,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unconfined" lineno="7890">
+<interface name="files_unconfined" lineno="7992">
 <summary>
 Unconfined access to files.
 </summary>
@@ -82208,7 +82373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7912">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="8014">
 <summary>
 Create, read, write, and delete symbolic links in
 /etc that are dynamically created on boot.
@@ -82220,7 +82385,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7930">
+<interface name="files_dontaudit_read_etc_runtime" lineno="8032">
 <summary>
 Do not audit attempts to read etc_runtime resources
 </summary>
@@ -82230,7 +82395,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_src" lineno="7948">
+<interface name="files_list_src" lineno="8050">
 <summary>
 List usr/src files
 </summary>
@@ -82240,7 +82405,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_read_src_files" lineno="7966">
+<interface name="files_read_src_files" lineno="8068">
 <summary>
 Read usr/src files
 </summary>
@@ -82250,7 +82415,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_manage_src_files" lineno="7984">
+<interface name="files_manage_src_files" lineno="8086">
 <summary>
 Manage /usr/src files
 </summary>
@@ -82260,7 +82425,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="8015">
+<interface name="files_lib_filetrans_kernel_modules" lineno="8117">
 <summary>
 Create a resource in the generic lib location
 with an automatic type transition towards the kernel modules
@@ -82282,7 +82447,7 @@ Optional name of the resource
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime" lineno="8033">
+<interface name="files_read_etc_runtime" lineno="8135">
 <summary>
 Read etc runtime resources
 </summary>
@@ -82292,7 +82457,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="8055">
+<interface name="files_relabel_all_non_security_file_types" lineno="8157">
 <summary>
 Allow relabel from and to non-security types
 </summary>
@@ -82303,7 +82468,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_non_security_file_types" lineno="8085">
+<interface name="files_manage_all_non_security_file_types" lineno="8187">
 <summary>
 Manage non-security-sensitive resource types
 </summary>
@@ -82314,7 +82479,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_all_pidfiles" lineno="8107">
+<interface name="files_relabel_all_pidfiles" lineno="8209">
 <summary>
 Allow relabeling from and to any pidfile associated type
 </summary>
@@ -82792,7 +82957,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_cgroup_dirs" lineno="783">
+<interface name="fs_ioctl_cgroup_dirs" lineno="783">
+<summary>
+Ioctl cgroup directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_delete_cgroup_dirs" lineno="802">
 <summary>
 Delete cgroup directories.
 </summary>
@@ -82802,7 +82977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_dirs" lineno="802">
+<interface name="fs_manage_cgroup_dirs" lineno="821">
 <summary>
 Manage cgroup directories.
 </summary>
@@ -82812,7 +82987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="822">
+<interface name="fs_relabel_cgroup_dirs" lineno="841">
 <summary>
 Relabel cgroup directories.
 </summary>
@@ -82822,7 +82997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cgroup_files" lineno="840">
+<interface name="fs_getattr_cgroup_files" lineno="859">
 <summary>
 Get attributes of cgroup files.
 </summary>
@@ -82832,7 +83007,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cgroup_files" lineno="860">
+<interface name="fs_read_cgroup_files" lineno="879">
 <summary>
 Read cgroup files.
 </summary>
@@ -82842,7 +83017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_watch_cgroup_files" lineno="881">
+<interface name="fs_watch_cgroup_files" lineno="900">
 <summary>
 Watch cgroup files.
 </summary>
@@ -82852,7 +83027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_create_cgroup_links" lineno="900">
+<interface name="fs_create_cgroup_links" lineno="919">
 <summary>
 Create cgroup lnk_files.
 </summary>
@@ -82862,7 +83037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_cgroup_files" lineno="920">
+<interface name="fs_write_cgroup_files" lineno="939">
 <summary>
 Write cgroup files.
 </summary>
@@ -82872,7 +83047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_cgroup_files" lineno="939">
+<interface name="fs_rw_cgroup_files" lineno="958">
 <summary>
 Read and write cgroup files.
 </summary>
@@ -82882,7 +83057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="961">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="980">
 <summary>
 Do not audit attempts to open,
 get attributes, read and write
@@ -82894,7 +83069,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_files" lineno="979">
+<interface name="fs_manage_cgroup_files" lineno="998">
 <summary>
 Manage cgroup files.
 </summary>
@@ -82904,7 +83079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="999">
+<interface name="fs_relabel_cgroup_symlinks" lineno="1018">
 <summary>
 Relabel cgroup symbolic links.
 </summary>
@@ -82914,7 +83089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cgroup" lineno="1017">
+<interface name="fs_mounton_cgroup" lineno="1036">
 <summary>
 Mount on cgroup directories.
 </summary>
@@ -82924,7 +83099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cgroup_filetrans" lineno="1051">
+<interface name="fs_cgroup_filetrans" lineno="1070">
 <summary>
 Create an object in a cgroup tmpfs filesystem, with a private
 type using a type transition.
@@ -82950,7 +83125,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1072">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091">
 <summary>
 Do not audit attempts to read
 dirs on a CIFS or SMB filesystem.
@@ -82961,7 +83136,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_cifs" lineno="1090">
+<interface name="fs_mount_cifs" lineno="1109">
 <summary>
 Mount a CIFS or SMB network filesystem.
 </summary>
@@ -82971,7 +83146,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_cifs" lineno="1109">
+<interface name="fs_remount_cifs" lineno="1128">
 <summary>
 Remount a CIFS or SMB network filesystem.
 This allows some mount options to be changed.
@@ -82982,7 +83157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_cifs" lineno="1127">
+<interface name="fs_unmount_cifs" lineno="1146">
 <summary>
 Unmount a CIFS or SMB network filesystem.
 </summary>
@@ -82992,7 +83167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cifs" lineno="1147">
+<interface name="fs_getattr_cifs" lineno="1166">
 <summary>
 Get the attributes of a CIFS or
 SMB network filesystem.
@@ -83004,7 +83179,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_cifs" lineno="1165">
+<interface name="fs_search_cifs" lineno="1184">
 <summary>
 Search directories on a CIFS or SMB filesystem.
 </summary>
@@ -83014,7 +83189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_cifs" lineno="1184">
+<interface name="fs_list_cifs" lineno="1203">
 <summary>
 List the contents of directories on a
 CIFS or SMB filesystem.
@@ -83025,7 +83200,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1203">
+<interface name="fs_dontaudit_list_cifs" lineno="1222">
 <summary>
 Do not audit attempts to list the contents
 of directories on a CIFS or SMB filesystem.
@@ -83036,7 +83211,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cifs" lineno="1221">
+<interface name="fs_mounton_cifs" lineno="1240">
 <summary>
 Mounton a CIFS filesystem.
 </summary>
@@ -83046,7 +83221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_files" lineno="1240">
+<interface name="fs_read_cifs_files" lineno="1259">
 <summary>
 Read files on a CIFS or SMB filesystem.
 </summary>
@@ -83057,7 +83232,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_read_all_inherited_image_files" lineno="1260">
+<interface name="fs_read_all_inherited_image_files" lineno="1279">
 <summary>
 Read all inherited filesystem image files.
 </summary>
@@ -83068,7 +83243,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_read_all_image_files" lineno="1279">
+<interface name="fs_read_all_image_files" lineno="1298">
 <summary>
 Read all filesystem image files.
 </summary>
@@ -83079,7 +83254,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_read_all_image_files" lineno="1298">
+<interface name="fs_mmap_read_all_image_files" lineno="1317">
 <summary>
 Mmap-read all filesystem image files.
 </summary>
@@ -83090,7 +83265,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_rw_all_image_files" lineno="1317">
+<interface name="fs_rw_all_image_files" lineno="1336">
 <summary>
 Read and write all filesystem image files.
 </summary>
@@ -83101,7 +83276,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_rw_all_image_files" lineno="1336">
+<interface name="fs_mmap_rw_all_image_files" lineno="1355">
 <summary>
 Mmap-Read-write all filesystem image files.
 </summary>
@@ -83112,7 +83287,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_write_all_image_files" lineno="1355">
+<interface name="fs_dontaudit_write_all_image_files" lineno="1374">
 <summary>
 Do not audit attempts to write all filesystem image files.
 </summary>
@@ -83123,7 +83298,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1375">
+<interface name="fs_getattr_noxattr_fs" lineno="1394">
 <summary>
 Get the attributes of filesystems that
 do not have extended attribute support.
@@ -83135,7 +83310,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_list_noxattr_fs" lineno="1393">
+<interface name="fs_list_noxattr_fs" lineno="1412">
 <summary>
 Read all noxattrfs directories.
 </summary>
@@ -83145,7 +83320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1412">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431">
 <summary>
 Do not audit attempts to list all
 noxattrfs directories.
@@ -83156,7 +83331,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1430">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1449">
 <summary>
 Create, read, write, and delete all noxattrfs directories.
 </summary>
@@ -83166,7 +83341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1448">
+<interface name="fs_read_noxattr_fs_files" lineno="1467">
 <summary>
 Read all noxattrfs files.
 </summary>
@@ -83176,7 +83351,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1468">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487">
 <summary>
 Do not audit attempts to read all
 noxattrfs files.
@@ -83187,7 +83362,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1486">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505">
 <summary>
 Dont audit attempts to write to noxattrfs files.
 </summary>
@@ -83197,7 +83372,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1504">
+<interface name="fs_manage_noxattr_fs_files" lineno="1523">
 <summary>
 Create, read, write, and delete all noxattrfs files.
 </summary>
@@ -83207,7 +83382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1523">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1542">
 <summary>
 Read all noxattrfs symbolic links.
 </summary>
@@ -83217,7 +83392,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1542">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561">
 <summary>
 Manage all noxattrfs symbolic links.
 </summary>
@@ -83227,7 +83402,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1562">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1581">
 <summary>
 Relabel all objects from filesystems that
 do not support extended attributes.
@@ -83238,7 +83413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1588">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1607">
 <summary>
 Do not audit attempts to read
 files on a CIFS or SMB filesystem.
@@ -83249,7 +83424,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_append_cifs_files" lineno="1608">
+<interface name="fs_append_cifs_files" lineno="1627">
 <summary>
 Append files
 on a CIFS filesystem.
@@ -83261,7 +83436,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1628">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1647">
 <summary>
 dontaudit Append files
 on a CIFS filesystem.
@@ -83273,7 +83448,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1647">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1666">
 <summary>
 Do not audit attempts to read or
 write files on a CIFS or SMB filesystem.
@@ -83284,7 +83459,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_symlinks" lineno="1665">
+<interface name="fs_read_cifs_symlinks" lineno="1684">
 <summary>
 Read symbolic links on a CIFS or SMB filesystem.
 </summary>
@@ -83294,7 +83469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1685">
+<interface name="fs_read_cifs_named_pipes" lineno="1704">
 <summary>
 Read named pipes
 on a CIFS or SMB network filesystem.
@@ -83305,7 +83480,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1704">
+<interface name="fs_read_cifs_named_sockets" lineno="1723">
 <summary>
 Read named sockets
 on a CIFS or SMB network filesystem.
@@ -83316,7 +83491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_cifs_files" lineno="1725">
+<interface name="fs_exec_cifs_files" lineno="1744">
 <summary>
 Execute files on a CIFS or SMB
 network filesystem, in the caller
@@ -83329,7 +83504,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_cifs_dirs" lineno="1746">
+<interface name="fs_manage_cifs_dirs" lineno="1765">
 <summary>
 Create, read, write, and delete directories
 on a CIFS or SMB network filesystem.
@@ -83341,7 +83516,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1766">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -83353,7 +83528,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_files" lineno="1786">
+<interface name="fs_manage_cifs_files" lineno="1805">
 <summary>
 Create, read, write, and delete files
 on a CIFS or SMB network filesystem.
@@ -83365,7 +83540,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1806">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1825">
 <summary>
 Do not audit attempts to create, read,
 write, and delete files
@@ -83377,7 +83552,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1825">
+<interface name="fs_manage_cifs_symlinks" lineno="1844">
 <summary>
 Create, read, write, and delete symbolic links
 on a CIFS or SMB network filesystem.
@@ -83388,7 +83563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1844">
+<interface name="fs_manage_cifs_named_pipes" lineno="1863">
 <summary>
 Create, read, write, and delete named pipes
 on a CIFS or SMB network filesystem.
@@ -83399,7 +83574,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1863">
+<interface name="fs_manage_cifs_named_sockets" lineno="1882">
 <summary>
 Create, read, write, and delete named sockets
 on a CIFS or SMB network filesystem.
@@ -83410,7 +83585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cifs_domtrans" lineno="1906">
+<interface name="fs_cifs_domtrans" lineno="1925">
 <summary>
 Execute a file on a CIFS or SMB filesystem
 in the specified domain.
@@ -83445,7 +83620,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_dirs" lineno="1926">
+<interface name="fs_manage_configfs_dirs" lineno="1945">
 <summary>
 Create, read, write, and delete dirs
 on a configfs filesystem.
@@ -83456,7 +83631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_files" lineno="1945">
+<interface name="fs_manage_configfs_files" lineno="1964">
 <summary>
 Create, read, write, and delete files
 on a configfs filesystem.
@@ -83467,7 +83642,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_dos_fs" lineno="1964">
+<interface name="fs_mount_dos_fs" lineno="1983">
 <summary>
 Mount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -83478,7 +83653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_dos_fs" lineno="1984">
+<interface name="fs_remount_dos_fs" lineno="2003">
 <summary>
 Remount a DOS filesystem, such as
 FAT32 or NTFS.  This allows
@@ -83490,7 +83665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_dos_fs" lineno="2003">
+<interface name="fs_unmount_dos_fs" lineno="2022">
 <summary>
 Unmount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -83501,7 +83676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_fs" lineno="2023">
+<interface name="fs_getattr_dos_fs" lineno="2042">
 <summary>
 Get the attributes of a DOS
 filesystem, such as FAT32 or NTFS.
@@ -83513,7 +83688,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="2042">
+<interface name="fs_relabelfrom_dos_fs" lineno="2061">
 <summary>
 Allow changing of the label of a
 DOS filesystem using the context= mount option.
@@ -83524,7 +83699,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_dirs" lineno="2060">
+<interface name="fs_getattr_dos_dirs" lineno="2079">
 <summary>
 Get attributes of directories on a dosfs filesystem.
 </summary>
@@ -83534,7 +83709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_dos" lineno="2078">
+<interface name="fs_search_dos" lineno="2097">
 <summary>
 Search dosfs filesystem.
 </summary>
@@ -83544,7 +83719,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_dos" lineno="2096">
+<interface name="fs_list_dos" lineno="2115">
 <summary>
 List dirs DOS filesystem.
 </summary>
@@ -83554,7 +83729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_dirs" lineno="2115">
+<interface name="fs_manage_dos_dirs" lineno="2134">
 <summary>
 Create, read, write, and delete dirs
 on a DOS filesystem.
@@ -83565,7 +83740,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_dos_files" lineno="2133">
+<interface name="fs_read_dos_files" lineno="2152">
 <summary>
 Read files on a DOS filesystem.
 </summary>
@@ -83575,7 +83750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mmap_read_dos_files" lineno="2151">
+<interface name="fs_mmap_read_dos_files" lineno="2170">
 <summary>
 Read and map files on a DOS filesystem.
 </summary>
@@ -83585,7 +83760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_files" lineno="2171">
+<interface name="fs_manage_dos_files" lineno="2190">
 <summary>
 Create, read, write, and delete files
 on a DOS filesystem.
@@ -83596,7 +83771,52 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_efivarfs" lineno="2189">
+<interface name="fs_list_ecryptfs" lineno="2208">
+<summary>
+Read symbolic links on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_ecryptfs_dirs" lineno="2229">
+<summary>
+Create, read, write, and delete directories
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_ecryptfs_files" lineno="2249">
+<summary>
+Create, read, write, and delete files
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268">
+<summary>
+Create, read, write, and delete named sockets
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_efivarfs" lineno="2286">
 <summary>
 Get the attributes of efivarfs filesystems.
 </summary>
@@ -83606,7 +83826,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_efivars" lineno="2207">
+<interface name="fs_list_efivars" lineno="2304">
 <summary>
 List dirs in efivarfs filesystem.
 </summary>
@@ -83616,7 +83836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_efivarfs_files" lineno="2227">
+<interface name="fs_read_efivarfs_files" lineno="2324">
 <summary>
 Read files in efivarfs
 - contains Linux Kernel configuration options for UEFI systems
@@ -83628,7 +83848,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_efivarfs_files" lineno="2247">
+<interface name="fs_manage_efivarfs_files" lineno="2344">
 <summary>
 Create, read, write, and delete files
 on a efivarfs filesystem.
@@ -83640,7 +83860,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_fusefs" lineno="2265">
+<interface name="fs_getattr_fusefs" lineno="2362">
 <summary>
 stat a FUSE filesystem
 </summary>
@@ -83650,7 +83870,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_fusefs" lineno="2283">
+<interface name="fs_mount_fusefs" lineno="2380">
 <summary>
 Mount a FUSE filesystem.
 </summary>
@@ -83660,7 +83880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_fusefs" lineno="2301">
+<interface name="fs_unmount_fusefs" lineno="2398">
 <summary>
 Unmount a FUSE filesystem.
 </summary>
@@ -83670,7 +83890,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_fusefs" lineno="2319">
+<interface name="fs_remount_fusefs" lineno="2416">
 <summary>
 Remount a FUSE filesystem.
 </summary>
@@ -83680,7 +83900,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_fusefs" lineno="2337">
+<interface name="fs_mounton_fusefs" lineno="2434">
 <summary>
 Mounton a FUSEFS filesystem.
 </summary>
@@ -83690,7 +83910,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_fusefs_entry_type" lineno="2356">
+<interface name="fs_fusefs_entry_type" lineno="2453">
 <summary>
 Make FUSEFS files an entrypoint for the
 specified domain.
@@ -83701,7 +83921,7 @@ The domain for which fusefs_t is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="fs_fusefs_domtrans" lineno="2389">
+<interface name="fs_fusefs_domtrans" lineno="2486">
 <summary>
 Execute FUSEFS files in a specified domain.
 </summary>
@@ -83726,7 +83946,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_fusefs" lineno="2409">
+<interface name="fs_search_fusefs" lineno="2506">
 <summary>
 Search directories
 on a FUSEFS filesystem.
@@ -83738,7 +83958,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2428">
+<interface name="fs_dontaudit_list_fusefs" lineno="2525">
 <summary>
 Do not audit attempts to list the contents
 of directories on a FUSEFS filesystem.
@@ -83749,7 +83969,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2448">
+<interface name="fs_manage_fusefs_dirs" lineno="2545">
 <summary>
 Create, read, write, and delete directories
 on a FUSEFS filesystem.
@@ -83761,7 +83981,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2468">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -83773,7 +83993,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_files" lineno="2487">
+<interface name="fs_read_fusefs_files" lineno="2584">
 <summary>
 Read, a FUSEFS filesystem.
 </summary>
@@ -83784,7 +84004,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_exec_fusefs_files" lineno="2506">
+<interface name="fs_exec_fusefs_files" lineno="2603">
 <summary>
 Execute files on a FUSEFS filesystem.
 </summary>
@@ -83795,7 +84015,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_fusefs_files" lineno="2526">
+<interface name="fs_manage_fusefs_files" lineno="2623">
 <summary>
 Create, read, write, and delete files
 on a FUSEFS filesystem.
@@ -83807,7 +84027,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2546">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -83819,7 +84039,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2564">
+<interface name="fs_read_fusefs_symlinks" lineno="2661">
 <summary>
 Read symbolic links on a FUSEFS filesystem.
 </summary>
@@ -83829,7 +84049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_fusefs_symlinks" lineno="2584">
+<interface name="fs_manage_fusefs_symlinks" lineno="2681">
 <summary>
 Manage symlinks on a FUSEFS filesystem.
 </summary>
@@ -83840,7 +84060,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2603">
+<interface name="fs_getattr_hugetlbfs" lineno="2700">
 <summary>
 Get the attributes of an hugetlbfs
 filesystem.
@@ -83851,7 +84071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_hugetlbfs" lineno="2621">
+<interface name="fs_list_hugetlbfs" lineno="2718">
 <summary>
 List hugetlbfs.
 </summary>
@@ -83861,7 +84081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2639">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="2736">
 <summary>
 Manage hugetlbfs dirs.
 </summary>
@@ -83871,7 +84091,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2657">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754">
 <summary>
 Read and write inherited hugetlbfs files.
 </summary>
@@ -83881,7 +84101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2675">
+<interface name="fs_rw_hugetlbfs_files" lineno="2772">
 <summary>
 Read and write hugetlbfs files.
 </summary>
@@ -83891,7 +84111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2693">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790">
 <summary>
 Read, map and write hugetlbfs files.
 </summary>
@@ -83901,7 +84121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_hugetlbfs" lineno="2712">
+<interface name="fs_associate_hugetlbfs" lineno="2809">
 <summary>
 Allow the type to associate to hugetlbfs filesystems.
 </summary>
@@ -83911,7 +84131,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_inotifyfs" lineno="2730">
+<interface name="fs_search_inotifyfs" lineno="2827">
 <summary>
 Search inotifyfs filesystem.
 </summary>
@@ -83921,7 +84141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_inotifyfs" lineno="2748">
+<interface name="fs_list_inotifyfs" lineno="2845">
 <summary>
 List inotifyfs filesystem.
 </summary>
@@ -83931,7 +84151,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2766">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="2863">
 <summary>
 Dontaudit List inotifyfs filesystem.
 </summary>
@@ -83941,7 +84161,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2800">
+<interface name="fs_hugetlbfs_filetrans" lineno="2897">
 <summary>
 Create an object in a hugetlbfs filesystem, with a private
 type using a type transition.
@@ -83967,7 +84187,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_iso9660_fs" lineno="2820">
+<interface name="fs_mount_iso9660_fs" lineno="2917">
 <summary>
 Mount an iso9660 filesystem, which
 is usually used on CDs.
@@ -83978,7 +84198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_iso9660_fs" lineno="2840">
+<interface name="fs_remount_iso9660_fs" lineno="2937">
 <summary>
 Remount an iso9660 filesystem, which
 is usually used on CDs.  This allows
@@ -83990,7 +84210,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2859">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="2956">
 <summary>
 Allow changing of the label of a
 filesystem with iso9660 type
@@ -84001,7 +84221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2878">
+<interface name="fs_unmount_iso9660_fs" lineno="2975">
 <summary>
 Unmount an iso9660 filesystem, which
 is usually used on CDs.
@@ -84012,7 +84232,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2898">
+<interface name="fs_getattr_iso9660_fs" lineno="2995">
 <summary>
 Get the attributes of an iso9660
 filesystem, which is usually used on CDs.
@@ -84024,7 +84244,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_iso9660_files" lineno="2917">
+<interface name="fs_getattr_iso9660_files" lineno="3014">
 <summary>
 Get the attributes of files on an iso9660
 filesystem, which is usually used on CDs.
@@ -84035,7 +84255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_iso9660_files" lineno="2937">
+<interface name="fs_read_iso9660_files" lineno="3034">
 <summary>
 Read files on an iso9660 filesystem, which
 is usually used on CDs.
@@ -84046,7 +84266,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfs" lineno="2957">
+<interface name="fs_mount_nfs" lineno="3054">
 <summary>
 Mount a NFS filesystem.
 </summary>
@@ -84056,7 +84276,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfs" lineno="2976">
+<interface name="fs_remount_nfs" lineno="3073">
 <summary>
 Remount a NFS filesystem.  This allows
 some mount options to be changed.
@@ -84067,7 +84287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfs" lineno="2994">
+<interface name="fs_unmount_nfs" lineno="3091">
 <summary>
 Unmount a NFS filesystem.
 </summary>
@@ -84077,7 +84297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfs" lineno="3013">
+<interface name="fs_getattr_nfs" lineno="3110">
 <summary>
 Get the attributes of a NFS filesystem.
 </summary>
@@ -84088,7 +84308,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_nfs" lineno="3031">
+<interface name="fs_search_nfs" lineno="3128">
 <summary>
 Search directories on a NFS filesystem.
 </summary>
@@ -84098,7 +84318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfs" lineno="3049">
+<interface name="fs_list_nfs" lineno="3146">
 <summary>
 List NFS filesystem.
 </summary>
@@ -84108,7 +84328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_nfs" lineno="3068">
+<interface name="fs_dontaudit_list_nfs" lineno="3165">
 <summary>
 Do not audit attempts to list the contents
 of directories on a NFS filesystem.
@@ -84119,7 +84339,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_nfs" lineno="3086">
+<interface name="fs_mounton_nfs" lineno="3183">
 <summary>
 Mounton a NFS filesystem.
 </summary>
@@ -84129,7 +84349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_files" lineno="3105">
+<interface name="fs_read_nfs_files" lineno="3202">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -84140,7 +84360,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="3125">
+<interface name="fs_dontaudit_read_nfs_files" lineno="3222">
 <summary>
 Do not audit attempts to read
 files on a NFS filesystem.
@@ -84151,7 +84371,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_nfs_files" lineno="3143">
+<interface name="fs_write_nfs_files" lineno="3240">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -84161,7 +84381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_nfs_files" lineno="3163">
+<interface name="fs_exec_nfs_files" lineno="3260">
 <summary>
 Execute files on a NFS filesystem.
 </summary>
@@ -84172,7 +84392,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_append_nfs_files" lineno="3184">
+<interface name="fs_append_nfs_files" lineno="3281">
 <summary>
 Append files
 on a NFS filesystem.
@@ -84184,7 +84404,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="3204">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3301">
 <summary>
 dontaudit Append files
 on a NFS filesystem.
@@ -84196,7 +84416,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="3223">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3320">
 <summary>
 Do not audit attempts to read or
 write files on a NFS filesystem.
@@ -84207,7 +84427,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_symlinks" lineno="3241">
+<interface name="fs_read_nfs_symlinks" lineno="3338">
 <summary>
 Read symbolic links on a NFS filesystem.
 </summary>
@@ -84217,7 +84437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3260">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357">
 <summary>
 Dontaudit read symbolic links on a NFS filesystem.
 </summary>
@@ -84227,7 +84447,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_sockets" lineno="3278">
+<interface name="fs_read_nfs_named_sockets" lineno="3375">
 <summary>
 Read named sockets on a NFS filesystem.
 </summary>
@@ -84237,7 +84457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_pipes" lineno="3297">
+<interface name="fs_read_nfs_named_pipes" lineno="3394">
 <summary>
 Read named pipes on a NFS network filesystem.
 </summary>
@@ -84248,7 +84468,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3316">
+<interface name="fs_getattr_rpc_dirs" lineno="3413">
 <summary>
 Get the attributes of directories of RPC
 file system pipes.
@@ -84259,7 +84479,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_rpc" lineno="3335">
+<interface name="fs_search_rpc" lineno="3432">
 <summary>
 Search directories of RPC file system pipes.
 </summary>
@@ -84269,7 +84489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_removable" lineno="3353">
+<interface name="fs_search_removable" lineno="3450">
 <summary>
 Search removable storage directories.
 </summary>
@@ -84279,7 +84499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_removable" lineno="3371">
+<interface name="fs_dontaudit_list_removable" lineno="3468">
 <summary>
 Do not audit attempts to list removable storage directories.
 </summary>
@@ -84289,7 +84509,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_files" lineno="3389">
+<interface name="fs_read_removable_files" lineno="3486">
 <summary>
 Read removable storage files.
 </summary>
@@ -84299,7 +84519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3407">
+<interface name="fs_dontaudit_read_removable_files" lineno="3504">
 <summary>
 Do not audit attempts to read removable storage files.
 </summary>
@@ -84309,7 +84529,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3425">
+<interface name="fs_dontaudit_write_removable_files" lineno="3522">
 <summary>
 Do not audit attempts to write removable storage files.
 </summary>
@@ -84319,7 +84539,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_symlinks" lineno="3443">
+<interface name="fs_read_removable_symlinks" lineno="3540">
 <summary>
 Read removable storage symbolic links.
 </summary>
@@ -84329,7 +84549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_blk_files" lineno="3461">
+<interface name="fs_read_removable_blk_files" lineno="3558">
 <summary>
 Read block nodes on removable filesystems.
 </summary>
@@ -84339,7 +84559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_removable_blk_files" lineno="3480">
+<interface name="fs_rw_removable_blk_files" lineno="3577">
 <summary>
 Read and write block nodes on removable filesystems.
 </summary>
@@ -84349,7 +84569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_rpc" lineno="3499">
+<interface name="fs_list_rpc" lineno="3596">
 <summary>
 Read directories of RPC file system pipes.
 </summary>
@@ -84359,7 +84579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_files" lineno="3517">
+<interface name="fs_read_rpc_files" lineno="3614">
 <summary>
 Read files of RPC file system pipes.
 </summary>
@@ -84369,7 +84589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_symlinks" lineno="3535">
+<interface name="fs_read_rpc_symlinks" lineno="3632">
 <summary>
 Read symbolic links of RPC file system pipes.
 </summary>
@@ -84379,7 +84599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_sockets" lineno="3553">
+<interface name="fs_read_rpc_sockets" lineno="3650">
 <summary>
 Read sockets of RPC file system pipes.
 </summary>
@@ -84389,7 +84609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_sockets" lineno="3571">
+<interface name="fs_rw_rpc_sockets" lineno="3668">
 <summary>
 Read and write sockets of RPC file system pipes.
 </summary>
@@ -84399,7 +84619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_dirs" lineno="3591">
+<interface name="fs_manage_nfs_dirs" lineno="3688">
 <summary>
 Create, read, write, and delete directories
 on a NFS filesystem.
@@ -84411,7 +84631,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3611">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -84423,7 +84643,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_files" lineno="3631">
+<interface name="fs_manage_nfs_files" lineno="3728">
 <summary>
 Create, read, write, and delete files
 on a NFS filesystem.
@@ -84435,7 +84655,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3651">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="3748">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -84447,7 +84667,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3671">
+<interface name="fs_manage_nfs_symlinks" lineno="3768">
 <summary>
 Create, read, write, and delete symbolic links
 on a NFS network filesystem.
@@ -84459,7 +84679,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3690">
+<interface name="fs_manage_nfs_named_pipes" lineno="3787">
 <summary>
 Create, read, write, and delete named pipes
 on a NFS filesystem.
@@ -84470,7 +84690,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3709">
+<interface name="fs_manage_nfs_named_sockets" lineno="3806">
 <summary>
 Create, read, write, and delete named sockets
 on a NFS filesystem.
@@ -84481,7 +84701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_nfs_domtrans" lineno="3752">
+<interface name="fs_nfs_domtrans" lineno="3849">
 <summary>
 Execute a file on a NFS filesystem
 in the specified domain.
@@ -84516,7 +84736,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfsd_fs" lineno="3771">
+<interface name="fs_mount_nfsd_fs" lineno="3868">
 <summary>
 Mount a NFS server pseudo filesystem.
 </summary>
@@ -84526,7 +84746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfsd_fs" lineno="3790">
+<interface name="fs_remount_nfsd_fs" lineno="3887">
 <summary>
 Mount a NFS server pseudo filesystem.
 This allows some mount options to be changed.
@@ -84537,7 +84757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3808">
+<interface name="fs_unmount_nfsd_fs" lineno="3905">
 <summary>
 Unmount a NFS server pseudo filesystem.
 </summary>
@@ -84547,7 +84767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3827">
+<interface name="fs_getattr_nfsd_fs" lineno="3924">
 <summary>
 Get the attributes of a NFS server
 pseudo filesystem.
@@ -84558,7 +84778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_nfsd_fs" lineno="3845">
+<interface name="fs_search_nfsd_fs" lineno="3942">
 <summary>
 Search NFS server directories.
 </summary>
@@ -84568,7 +84788,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfsd_fs" lineno="3863">
+<interface name="fs_list_nfsd_fs" lineno="3960">
 <summary>
 List NFS server directories.
 </summary>
@@ -84578,7 +84798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_watch_nfsd_dirs" lineno="3881">
+<interface name="fs_watch_nfsd_dirs" lineno="3978">
 <summary>
 Watch NFS server directories.
 </summary>
@@ -84588,7 +84808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_files" lineno="3899">
+<interface name="fs_getattr_nfsd_files" lineno="3996">
 <summary>
 Getattr files on an nfsd filesystem
 </summary>
@@ -84598,7 +84818,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_nfsd_fs" lineno="3917">
+<interface name="fs_rw_nfsd_fs" lineno="4014">
 <summary>
 Read and write NFS server files.
 </summary>
@@ -84608,7 +84828,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nsfs_files" lineno="3935">
+<interface name="fs_getattr_nsfs_files" lineno="4032">
+<summary>
+Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_nsfs_files" lineno="4050">
 <summary>
 Read nsfs inodes (e.g. /proc/pid/ns/uts)
 </summary>
@@ -84618,7 +84848,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nsfs" lineno="3953">
+<interface name="fs_getattr_nsfs" lineno="4068">
 <summary>
 Get the attributes of an nsfs filesystem.
 </summary>
@@ -84628,7 +84858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nsfs" lineno="3971">
+<interface name="fs_unmount_nsfs" lineno="4086">
 <summary>
 Unmount an nsfs filesystem.
 </summary>
@@ -84638,7 +84868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstorefs" lineno="3989">
+<interface name="fs_getattr_pstorefs" lineno="4104">
 <summary>
 Get the attributes of a pstore filesystem.
 </summary>
@@ -84648,7 +84878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstore_dirs" lineno="4008">
+<interface name="fs_getattr_pstore_dirs" lineno="4123">
 <summary>
 Get the attributes of directories
 of a pstore filesystem.
@@ -84659,7 +84889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_create_pstore_dirs" lineno="4027">
+<interface name="fs_create_pstore_dirs" lineno="4142">
 <summary>
 Create pstore directories.
 </summary>
@@ -84669,7 +84899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_pstore_dirs" lineno="4046">
+<interface name="fs_relabel_pstore_dirs" lineno="4161">
 <summary>
 Relabel to/from pstore_t directories.
 </summary>
@@ -84679,7 +84909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_pstore_dirs" lineno="4065">
+<interface name="fs_list_pstore_dirs" lineno="4180">
 <summary>
 List the directories
 of a pstore filesystem.
@@ -84690,7 +84920,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_pstore_files" lineno="4084">
+<interface name="fs_read_pstore_files" lineno="4199">
 <summary>
 Read pstore_t files
 </summary>
@@ -84700,7 +84930,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_pstore_files" lineno="4103">
+<interface name="fs_delete_pstore_files" lineno="4218">
 <summary>
 Delete the files
 of a pstore filesystem.
@@ -84711,7 +84941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_ramfs" lineno="4122">
+<interface name="fs_associate_ramfs" lineno="4237">
 <summary>
 Allow the type to associate to ramfs filesystems.
 </summary>
@@ -84721,7 +84951,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_ramfs" lineno="4140">
+<interface name="fs_mount_ramfs" lineno="4255">
 <summary>
 Mount a RAM filesystem.
 </summary>
@@ -84731,7 +84961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_ramfs" lineno="4159">
+<interface name="fs_remount_ramfs" lineno="4274">
 <summary>
 Remount a RAM filesystem.  This allows
 some mount options to be changed.
@@ -84742,7 +84972,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_ramfs" lineno="4177">
+<interface name="fs_unmount_ramfs" lineno="4292">
 <summary>
 Unmount a RAM filesystem.
 </summary>
@@ -84752,7 +84982,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_ramfs" lineno="4195">
+<interface name="fs_getattr_ramfs" lineno="4310">
 <summary>
 Get the attributes of a RAM filesystem.
 </summary>
@@ -84762,7 +84992,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_ramfs" lineno="4213">
+<interface name="fs_search_ramfs" lineno="4328">
 <summary>
 Search directories on a ramfs
 </summary>
@@ -84772,7 +85002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="4231">
+<interface name="fs_dontaudit_search_ramfs" lineno="4346">
 <summary>
 Dontaudit Search directories on a ramfs
 </summary>
@@ -84782,7 +85012,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_dirs" lineno="4250">
+<interface name="fs_manage_ramfs_dirs" lineno="4365">
 <summary>
 Create, read, write, and delete
 directories on a ramfs.
@@ -84793,7 +85023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="4268">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4383">
 <summary>
 Dontaudit read on a ramfs files.
 </summary>
@@ -84803,7 +85033,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4286">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401">
 <summary>
 Dontaudit read on a ramfs fifo_files.
 </summary>
@@ -84813,7 +85043,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_files" lineno="4305">
+<interface name="fs_manage_ramfs_files" lineno="4420">
 <summary>
 Create, read, write, and delete
 files on a ramfs filesystem.
@@ -84824,7 +85054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_pipes" lineno="4323">
+<interface name="fs_write_ramfs_pipes" lineno="4438">
 <summary>
 Write to named pipe on a ramfs filesystem.
 </summary>
@@ -84834,7 +85064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4342">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457">
 <summary>
 Do not audit attempts to write to named
 pipes on a ramfs filesystem.
@@ -84845,7 +85075,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_ramfs_pipes" lineno="4360">
+<interface name="fs_rw_ramfs_pipes" lineno="4475">
 <summary>
 Read and write a named pipe on a ramfs filesystem.
 </summary>
@@ -84855,7 +85085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_pipes" lineno="4379">
+<interface name="fs_manage_ramfs_pipes" lineno="4494">
 <summary>
 Create, read, write, and delete
 named pipes on a ramfs filesystem.
@@ -84866,7 +85096,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_sockets" lineno="4397">
+<interface name="fs_write_ramfs_sockets" lineno="4512">
 <summary>
 Write to named socket on a ramfs filesystem.
 </summary>
@@ -84876,7 +85106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_sockets" lineno="4416">
+<interface name="fs_manage_ramfs_sockets" lineno="4531">
 <summary>
 Create, read, write, and delete
 named sockets on a ramfs filesystem.
@@ -84887,7 +85117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_romfs" lineno="4434">
+<interface name="fs_mount_romfs" lineno="4549">
 <summary>
 Mount a ROM filesystem.
 </summary>
@@ -84897,7 +85127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_romfs" lineno="4453">
+<interface name="fs_remount_romfs" lineno="4568">
 <summary>
 Remount a ROM filesystem.  This allows
 some mount options to be changed.
@@ -84908,7 +85138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_romfs" lineno="4471">
+<interface name="fs_unmount_romfs" lineno="4586">
 <summary>
 Unmount a ROM filesystem.
 </summary>
@@ -84918,7 +85148,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_romfs" lineno="4490">
+<interface name="fs_getattr_romfs" lineno="4605">
 <summary>
 Get the attributes of a ROM
 filesystem.
@@ -84929,7 +85159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4508">
+<interface name="fs_mount_rpc_pipefs" lineno="4623">
 <summary>
 Mount a RPC pipe filesystem.
 </summary>
@@ -84939,7 +85169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4527">
+<interface name="fs_remount_rpc_pipefs" lineno="4642">
 <summary>
 Remount a RPC pipe filesystem.  This
 allows some mount option to be changed.
@@ -84950,7 +85180,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4545">
+<interface name="fs_unmount_rpc_pipefs" lineno="4660">
 <summary>
 Unmount a RPC pipe filesystem.
 </summary>
@@ -84960,7 +85190,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4564">
+<interface name="fs_getattr_rpc_pipefs" lineno="4679">
 <summary>
 Get the attributes of a RPC pipe
 filesystem.
@@ -84971,7 +85201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4582">
+<interface name="fs_rw_rpc_named_pipes" lineno="4697">
 <summary>
 Read and write RPC pipe filesystem named pipes.
 </summary>
@@ -84981,7 +85211,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_tmpfs" lineno="4600">
+<interface name="fs_mount_tmpfs" lineno="4715">
 <summary>
 Mount a tmpfs filesystem.
 </summary>
@@ -84991,7 +85221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_tmpfs" lineno="4618">
+<interface name="fs_remount_tmpfs" lineno="4733">
 <summary>
 Remount a tmpfs filesystem.
 </summary>
@@ -85001,7 +85231,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_tmpfs" lineno="4636">
+<interface name="fs_unmount_tmpfs" lineno="4751">
 <summary>
 Unmount a tmpfs filesystem.
 </summary>
@@ -85011,7 +85241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4654">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769">
 <summary>
 Do not audit getting the attributes of a tmpfs filesystem
 </summary>
@@ -85021,7 +85251,7 @@ Domain to not audit
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs" lineno="4674">
+<interface name="fs_getattr_tmpfs" lineno="4789">
 <summary>
 Get the attributes of a tmpfs
 filesystem.
@@ -85033,7 +85263,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_associate_tmpfs" lineno="4692">
+<interface name="fs_associate_tmpfs" lineno="4807">
 <summary>
 Allow the type to associate to tmpfs filesystems.
 </summary>
@@ -85043,7 +85273,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4710">
+<interface name="fs_relabelfrom_tmpfs" lineno="4825">
 <summary>
 Relabel from tmpfs filesystem.
 </summary>
@@ -85053,7 +85283,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4728">
+<interface name="fs_getattr_tmpfs_dirs" lineno="4843">
 <summary>
 Get the attributes of tmpfs directories.
 </summary>
@@ -85063,7 +85293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4747">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862">
 <summary>
 Do not audit attempts to get the attributes
 of tmpfs directories.
@@ -85074,7 +85304,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs" lineno="4765">
+<interface name="fs_mounton_tmpfs" lineno="4880">
 <summary>
 Mount on tmpfs directories.
 </summary>
@@ -85084,7 +85314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4783">
+<interface name="fs_mounton_tmpfs_files" lineno="4898">
 <summary>
 Mount on tmpfs files.
 </summary>
@@ -85094,7 +85324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4801">
+<interface name="fs_setattr_tmpfs_dirs" lineno="4916">
 <summary>
 Set the attributes of tmpfs directories.
 </summary>
@@ -85104,7 +85334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tmpfs" lineno="4819">
+<interface name="fs_search_tmpfs" lineno="4934">
 <summary>
 Search tmpfs directories.
 </summary>
@@ -85114,7 +85344,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_tmpfs" lineno="4837">
+<interface name="fs_list_tmpfs" lineno="4952">
 <summary>
 List the contents of generic tmpfs directories.
 </summary>
@@ -85124,7 +85354,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4856">
+<interface name="fs_dontaudit_list_tmpfs" lineno="4971">
 <summary>
 Do not audit attempts to list the
 contents of generic tmpfs directories.
@@ -85135,7 +85365,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4875">
+<interface name="fs_manage_tmpfs_dirs" lineno="4990">
 <summary>
 Create, read, write, and delete
 tmpfs directories
@@ -85146,7 +85376,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4894">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009">
 <summary>
 Do not audit attempts to write
 tmpfs directories
@@ -85157,7 +85387,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4912">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027">
 <summary>
 Relabel from tmpfs_t dir
 </summary>
@@ -85167,7 +85397,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="4930">
+<interface name="fs_relabel_tmpfs_dirs" lineno="5045">
 <summary>
 Relabel directory on tmpfs filesystems.
 </summary>
@@ -85177,7 +85407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_tmpfs_filetrans" lineno="4963">
+<interface name="fs_tmpfs_filetrans" lineno="5078">
 <summary>
 Create an object in a tmpfs filesystem, with a private
 type using a type transition.
@@ -85203,7 +85433,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4983">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098">
 <summary>
 Do not audit attempts to getattr
 generic tmpfs files.
@@ -85214,7 +85444,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5002">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117">
 <summary>
 Do not audit attempts to read or write
 generic tmpfs files.
@@ -85225,7 +85455,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="5020">
+<interface name="fs_delete_tmpfs_symlinks" lineno="5135">
 <summary>
 Delete tmpfs symbolic links.
 </summary>
@@ -85235,7 +85465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_auto_mountpoints" lineno="5039">
+<interface name="fs_manage_auto_mountpoints" lineno="5154">
 <summary>
 Create, read, write, and delete
 auto moutpoints.
@@ -85246,7 +85476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_files" lineno="5057">
+<interface name="fs_read_tmpfs_files" lineno="5172">
 <summary>
 Read generic tmpfs files.
 </summary>
@@ -85256,7 +85486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_files" lineno="5075">
+<interface name="fs_rw_tmpfs_files" lineno="5190">
 <summary>
 Read and write generic tmpfs files.
 </summary>
@@ -85266,7 +85496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_files" lineno="5093">
+<interface name="fs_relabel_tmpfs_files" lineno="5208">
 <summary>
 Relabel files on tmpfs filesystems.
 </summary>
@@ -85276,7 +85506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="5111">
+<interface name="fs_read_tmpfs_symlinks" lineno="5226">
 <summary>
 Read tmpfs link files.
 </summary>
@@ -85286,7 +85516,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5129">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244">
 <summary>
 Relabelfrom socket files on tmpfs filesystems.
 </summary>
@@ -85296,7 +85526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5147">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262">
 <summary>
 Relabelfrom tmpfs link files.
 </summary>
@@ -85306,7 +85536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="5165">
+<interface name="fs_rw_tmpfs_chr_files" lineno="5280">
 <summary>
 Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -85316,7 +85546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5184">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299">
 <summary>
 dontaudit Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -85326,7 +85556,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_chr_files" lineno="5203">
+<interface name="fs_relabel_tmpfs_chr_files" lineno="5318">
 <summary>
 Relabel character nodes on tmpfs filesystems.
 </summary>
@@ -85336,7 +85566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="5222">
+<interface name="fs_relabel_tmpfs_chr_file" lineno="5337">
 <summary>
 Relabel character nodes on tmpfs filesystems.
 </summary>
@@ -85346,7 +85576,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="5237">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5352">
 <summary>
 Read and write block nodes on tmpfs filesystems.
 </summary>
@@ -85356,7 +85586,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_blk_files" lineno="5256">
+<interface name="fs_relabel_tmpfs_blk_files" lineno="5371">
 <summary>
 Relabel block nodes on tmpfs filesystems.
 </summary>
@@ -85366,7 +85596,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="5275">
+<interface name="fs_relabel_tmpfs_blk_file" lineno="5390">
 <summary>
 Relabel block nodes on tmpfs filesystems.
 </summary>
@@ -85376,7 +85606,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_fifo_files" lineno="5290">
+<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405">
 <summary>
 Relabel named pipes on tmpfs filesystems.
 </summary>
@@ -85386,7 +85616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_files" lineno="5310">
+<interface name="fs_manage_tmpfs_files" lineno="5425">
 <summary>
 Read and write, create and delete generic
 files on tmpfs filesystems.
@@ -85397,7 +85627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="5329">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5444">
 <summary>
 Read and write, create and delete symbolic
 links on tmpfs filesystems.
@@ -85408,7 +85638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="5348">
+<interface name="fs_manage_tmpfs_sockets" lineno="5463">
 <summary>
 Read and write, create and delete socket
 files on tmpfs filesystems.
@@ -85419,7 +85649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="5367">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5482">
 <summary>
 Read and write, create and delete character
 nodes on tmpfs filesystems.
@@ -85430,7 +85660,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="5386">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5501">
 <summary>
 Read and write, create and delete block nodes
 on tmpfs filesystems.
@@ -85441,7 +85671,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs" lineno="5404">
+<interface name="fs_getattr_tracefs" lineno="5519">
 <summary>
 Get the attributes of a trace filesystem.
 </summary>
@@ -85451,7 +85681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="5422">
+<interface name="fs_getattr_tracefs_dirs" lineno="5537">
 <summary>
 Get attributes of dirs on tracefs filesystem.
 </summary>
@@ -85461,7 +85691,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tracefs" lineno="5440">
+<interface name="fs_search_tracefs" lineno="5555">
 <summary>
 search directories on a tracefs filesystem
 </summary>
@@ -85471,7 +85701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_files" lineno="5459">
+<interface name="fs_getattr_tracefs_files" lineno="5574">
 <summary>
 Get the attributes of files
 on a trace filesystem.
@@ -85482,7 +85712,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_xenfs" lineno="5477">
+<interface name="fs_mount_xenfs" lineno="5592">
 <summary>
 Mount a XENFS filesystem.
 </summary>
@@ -85492,7 +85722,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_xenfs" lineno="5495">
+<interface name="fs_search_xenfs" lineno="5610">
 <summary>
 Search the XENFS filesystem.
 </summary>
@@ -85502,7 +85732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5515">
+<interface name="fs_manage_xenfs_dirs" lineno="5630">
 <summary>
 Create, read, write, and delete directories
 on a XENFS filesystem.
@@ -85514,7 +85744,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5535">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -85526,7 +85756,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_files" lineno="5555">
+<interface name="fs_manage_xenfs_files" lineno="5670">
 <summary>
 Create, read, write, and delete files
 on a XENFS filesystem.
@@ -85538,7 +85768,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_xenfs_files" lineno="5573">
+<interface name="fs_mmap_xenfs_files" lineno="5688">
 <summary>
 Map files a XENFS filesystem.
 </summary>
@@ -85548,7 +85778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5593">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -85560,7 +85790,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_all_fs" lineno="5611">
+<interface name="fs_mount_all_fs" lineno="5726">
 <summary>
 Mount all filesystems.
 </summary>
@@ -85570,7 +85800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_all_fs" lineno="5630">
+<interface name="fs_remount_all_fs" lineno="5745">
 <summary>
 Remount all filesystems.  This
 allows some mount options to be changed.
@@ -85581,7 +85811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_all_fs" lineno="5648">
+<interface name="fs_unmount_all_fs" lineno="5763">
 <summary>
 Unmount all filesystems.
 </summary>
@@ -85591,7 +85821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_fs" lineno="5680">
+<interface name="fs_getattr_all_fs" lineno="5795">
 <summary>
 Get the attributes of all filesystems.
 </summary>
@@ -85615,7 +85845,7 @@ Domain allowed access.
 <infoflow type="read" weight="5"/>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5700">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="5815">
 <summary>
 Do not audit attempts to get the attributes
 all filesystems.
@@ -85626,7 +85856,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_get_all_fs_quotas" lineno="5719">
+<interface name="fs_get_all_fs_quotas" lineno="5834">
 <summary>
 Get the quotas of all filesystems.
 </summary>
@@ -85637,7 +85867,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_set_all_quotas" lineno="5738">
+<interface name="fs_set_all_quotas" lineno="5853">
 <summary>
 Set the quotas of all filesystems.
 </summary>
@@ -85648,7 +85878,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5756">
+<interface name="fs_relabelfrom_all_fs" lineno="5871">
 <summary>
 Relabelfrom all filesystems.
 </summary>
@@ -85658,7 +85888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_dirs" lineno="5775">
+<interface name="fs_getattr_all_dirs" lineno="5890">
 <summary>
 Get the attributes of all directories
 with a filesystem type.
@@ -85669,7 +85899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_all" lineno="5793">
+<interface name="fs_search_all" lineno="5908">
 <summary>
 Search all directories with a filesystem type.
 </summary>
@@ -85679,7 +85909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_all" lineno="5811">
+<interface name="fs_list_all" lineno="5926">
 <summary>
 List all directories with a filesystem type.
 </summary>
@@ -85689,7 +85919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_files" lineno="5830">
+<interface name="fs_getattr_all_files" lineno="5945">
 <summary>
 Get the attributes of all files with
 a filesystem type.
@@ -85700,7 +85930,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5849">
+<interface name="fs_dontaudit_getattr_all_files" lineno="5964">
 <summary>
 Do not audit attempts to get the attributes
 of all files with a filesystem type.
@@ -85711,7 +85941,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_symlinks" lineno="5868">
+<interface name="fs_getattr_all_symlinks" lineno="5983">
 <summary>
 Get the attributes of all symbolic links with
 a filesystem type.
@@ -85722,7 +85952,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5887">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002">
 <summary>
 Do not audit attempts to get the attributes
 of all symbolic links with a filesystem type.
@@ -85733,7 +85963,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_pipes" lineno="5906">
+<interface name="fs_getattr_all_pipes" lineno="6021">
 <summary>
 Get the attributes of all named pipes with
 a filesystem type.
@@ -85744,7 +85974,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="5925">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040">
 <summary>
 Do not audit attempts to get the attributes
 of all named pipes with a filesystem type.
@@ -85755,7 +85985,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_sockets" lineno="5944">
+<interface name="fs_getattr_all_sockets" lineno="6059">
 <summary>
 Get the attributes of all named sockets with
 a filesystem type.
@@ -85766,7 +85996,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="5963">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078">
 <summary>
 Do not audit attempts to get the attributes
 of all named sockets with a filesystem type.
@@ -85777,7 +86007,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_blk_files" lineno="5982">
+<interface name="fs_getattr_all_blk_files" lineno="6097">
 <summary>
 Get the attributes of all block device nodes with
 a filesystem type.
@@ -85788,7 +86018,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_chr_files" lineno="6001">
+<interface name="fs_getattr_all_chr_files" lineno="6116">
 <summary>
 Get the attributes of all character device nodes with
 a filesystem type.
@@ -85799,7 +86029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unconfined" lineno="6019">
+<interface name="fs_unconfined" lineno="6134">
 <summary>
 Unconfined access to filesystems
 </summary>
@@ -90282,7 +90512,27 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_getattr_all_ttys" lineno="1298">
+<interface name="term_watch_unallocated_ttys" lineno="1297">
+<summary>
+Watch unallocated ttys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_watch_reads_unallocated_ttys" lineno="1316">
+<summary>
+Watch reads on unallocated ttys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_getattr_all_ttys" lineno="1336">
 <summary>
 Get the attributes of all tty device nodes.
 </summary>
@@ -90293,7 +90543,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
+<interface name="term_dontaudit_getattr_all_ttys" lineno="1356">
 <summary>
 Do not audit attempts to get the
 attributes of any tty device nodes.
@@ -90304,7 +90554,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_setattr_all_ttys" lineno="1338">
+<interface name="term_setattr_all_ttys" lineno="1376">
 <summary>
 Set the attributes of all tty device nodes.
 </summary>
@@ -90315,7 +90565,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_relabel_all_ttys" lineno="1357">
+<interface name="term_relabel_all_ttys" lineno="1395">
 <summary>
 Relabel from and to all tty device nodes.
 </summary>
@@ -90325,7 +90575,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_write_all_ttys" lineno="1376">
+<interface name="term_write_all_ttys" lineno="1414">
 <summary>
 Write to all ttys.
 </summary>
@@ -90335,7 +90585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="term_use_all_ttys" lineno="1396">
+<interface name="term_use_all_ttys" lineno="1434">
 <summary>
 Read and write all ttys.
 </summary>
@@ -90346,7 +90596,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="term_dontaudit_use_all_ttys" lineno="1416">
+<interface name="term_dontaudit_use_all_ttys" lineno="1454">
 <summary>
 Do not audit attempts to read or write
 any ttys.
@@ -90357,7 +90607,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="term_use_virtio_console" lineno="1434">
+<interface name="term_use_virtio_console" lineno="1472">
 <summary>
 Read from and write virtio console.
 </summary>
@@ -91756,7 +92006,17 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_initrc_domtrans" lineno="249">
+<interface name="apache_exec" lineno="249">
+<summary>
+Execute httpd
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to execute it.
+</summary>
+</param>
+</interface>
+<interface name="apache_initrc_domtrans" lineno="267">
 <summary>
 Execute httpd server in the httpd domain.
 </summary>
@@ -91766,7 +92026,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_signal" lineno="267">
+<interface name="apache_signal" lineno="285">
 <summary>
 Send generic signals to httpd.
 </summary>
@@ -91776,7 +92036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_signull" lineno="285">
+<interface name="apache_signull" lineno="303">
 <summary>
 Send null signals to httpd.
 </summary>
@@ -91786,7 +92046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_sigchld" lineno="303">
+<interface name="apache_sigchld" lineno="321">
 <summary>
 Send child terminated signals to httpd.
 </summary>
@@ -91796,7 +92056,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_use_fds" lineno="322">
+<interface name="apache_use_fds" lineno="340">
 <summary>
 Inherit and use file descriptors
 from httpd.
@@ -91807,7 +92067,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_fifo_file" lineno="341">
+<interface name="apache_dontaudit_rw_fifo_file" lineno="359">
 <summary>
 Do not audit attempts to read and
 write httpd unnamed pipes.
@@ -91818,7 +92078,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_stream_sockets" lineno="360">
+<interface name="apache_dontaudit_rw_stream_sockets" lineno="378">
 <summary>
 Do not audit attempts to read and
 write httpd unix domain stream sockets.
@@ -91829,7 +92089,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_rw_stream_sockets" lineno="379">
+<interface name="apache_rw_stream_sockets" lineno="397">
 <summary>
 Read and write httpd unix domain
 stream sockets.
@@ -91840,7 +92100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_tcp_sockets" lineno="398">
+<interface name="apache_dontaudit_rw_tcp_sockets" lineno="416">
 <summary>
 Do not audit attempts to read and
 write httpd TCP sockets.
@@ -91851,7 +92111,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_reload" lineno="416">
+<interface name="apache_reload" lineno="434">
 <summary>
 Reload the httpd service (systemd).
 </summary>
@@ -91861,7 +92121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_ra_content" lineno="435">
+<interface name="apache_read_all_ra_content" lineno="453">
 <summary>
 Read all appendable content
 </summary>
@@ -91871,7 +92131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_append_all_ra_content" lineno="454">
+<interface name="apache_append_all_ra_content" lineno="472">
 <summary>
 Append to all appendable web content
 </summary>
@@ -91881,7 +92141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_rw_content" lineno="472">
+<interface name="apache_read_all_rw_content" lineno="490">
 <summary>
 Read all read/write content
 </summary>
@@ -91891,7 +92151,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_rw_content" lineno="491">
+<interface name="apache_manage_all_rw_content" lineno="509">
 <summary>
 Manage all read/write content
 </summary>
@@ -91901,7 +92161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_all_content" lineno="510">
+<interface name="apache_read_all_content" lineno="528">
 <summary>
 Read all web content.
 </summary>
@@ -91911,7 +92171,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_all_content" lineno="532">
+<interface name="apache_search_all_content" lineno="550">
 <summary>
 Search all apache content.
 </summary>
@@ -91921,7 +92181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_all_content" lineno="550">
+<interface name="apache_list_all_content" lineno="568">
 <summary>
 List all apache content.
 </summary>
@@ -91931,7 +92191,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_content" lineno="570">
+<interface name="apache_manage_all_content" lineno="588">
 <summary>
 Create, read, write, and delete
 all httpd content.
@@ -91943,7 +92203,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_setattr_cache_dirs" lineno="594">
+<interface name="apache_setattr_cache_dirs" lineno="612">
 <summary>
 Set attributes httpd cache directories.
 </summary>
@@ -91953,7 +92213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_cache" lineno="612">
+<interface name="apache_list_cache" lineno="630">
 <summary>
 List httpd cache directories.
 </summary>
@@ -91963,7 +92223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_rw_cache_files" lineno="630">
+<interface name="apache_rw_cache_files" lineno="648">
 <summary>
 Read and write httpd cache files.
 </summary>
@@ -91973,7 +92233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_cache_dirs" lineno="648">
+<interface name="apache_delete_cache_dirs" lineno="666">
 <summary>
 Delete httpd cache directories.
 </summary>
@@ -91983,7 +92243,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_cache_files" lineno="666">
+<interface name="apache_delete_cache_files" lineno="684">
 <summary>
 Delete httpd cache files.
 </summary>
@@ -91993,7 +92253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_config" lineno="685">
+<interface name="apache_read_config" lineno="703">
 <summary>
 Read httpd configuration files.
 </summary>
@@ -92004,7 +92264,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_search_config" lineno="706">
+<interface name="apache_search_config" lineno="724">
 <summary>
 Search httpd configuration directories.
 </summary>
@@ -92014,7 +92274,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_config" lineno="726">
+<interface name="apache_manage_config" lineno="744">
 <summary>
 Create, read, write, and delete
 httpd configuration files.
@@ -92025,7 +92285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_helper" lineno="748">
+<interface name="apache_domtrans_helper" lineno="766">
 <summary>
 Execute the Apache helper program
 with a domain transition.
@@ -92036,7 +92296,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_run_helper" lineno="775">
+<interface name="apache_run_helper" lineno="793">
 <summary>
 Execute the Apache helper program with
 a domain transition, and allow the
@@ -92054,7 +92314,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_read_log" lineno="795">
+<interface name="apache_read_log" lineno="813">
 <summary>
 Read httpd log files.
 </summary>
@@ -92065,7 +92325,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_append_log" lineno="816">
+<interface name="apache_append_log" lineno="834">
 <summary>
 Append httpd log files.
 </summary>
@@ -92075,7 +92335,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_append_log" lineno="837">
+<interface name="apache_dontaudit_append_log" lineno="855">
 <summary>
 Do not audit attempts to append
 httpd log files.
@@ -92086,7 +92346,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_log" lineno="856">
+<interface name="apache_manage_log" lineno="874">
 <summary>
 Create, read, write, and delete
 httpd log files.
@@ -92097,7 +92357,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_write_log" lineno="877">
+<interface name="apache_write_log" lineno="895">
 <summary>
 Write apache log files.
 </summary>
@@ -92107,7 +92367,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_search_modules" lineno="897">
+<interface name="apache_dontaudit_search_modules" lineno="915">
 <summary>
 Do not audit attempts to search
 httpd module directories.
@@ -92118,7 +92378,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_modules" lineno="915">
+<interface name="apache_list_modules" lineno="933">
 <summary>
 List httpd module directories.
 </summary>
@@ -92128,7 +92388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_exec_modules" lineno="933">
+<interface name="apache_exec_modules" lineno="951">
 <summary>
 Execute httpd module files.
 </summary>
@@ -92138,7 +92398,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_module_files" lineno="953">
+<interface name="apache_read_module_files" lineno="971">
 <summary>
 Read httpd module files.
 </summary>
@@ -92148,7 +92408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_rotatelogs" lineno="973">
+<interface name="apache_domtrans_rotatelogs" lineno="991">
 <summary>
 Execute a domain transition to
 run httpd_rotatelogs.
@@ -92159,7 +92419,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_list_sys_content" lineno="992">
+<interface name="apache_list_sys_content" lineno="1010">
 <summary>
 List httpd system content directories.
 </summary>
@@ -92169,7 +92429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_sys_content" lineno="1013">
+<interface name="apache_manage_sys_content" lineno="1031">
 <summary>
 Create, read, write, and delete
 httpd system content files.
@@ -92181,7 +92441,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_manage_sys_rw_content" lineno="1035">
+<interface name="apache_manage_sys_rw_content" lineno="1053">
 <summary>
 Create, read, write, and delete
 httpd system rw content.
@@ -92192,7 +92452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_sys_script" lineno="1057">
+<interface name="apache_domtrans_sys_script" lineno="1075">
 <summary>
 Execute all httpd scripts in the
 system script domain.
@@ -92203,7 +92463,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1080">
+<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1098">
 <summary>
 Do not audit attempts to read and
 write httpd system script unix
@@ -92215,7 +92475,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_domtrans_all_scripts" lineno="1099">
+<interface name="apache_domtrans_all_scripts" lineno="1117">
 <summary>
 Execute all user scripts in the user
 script domain.
@@ -92226,7 +92486,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apache_run_all_scripts" lineno="1124">
+<interface name="apache_run_all_scripts" lineno="1142">
 <summary>
 Execute all user scripts in the user
 script domain. Add user script domains
@@ -92243,7 +92503,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_squirrelmail_data" lineno="1143">
+<interface name="apache_read_squirrelmail_data" lineno="1161">
 <summary>
 Read httpd squirrelmail data files.
 </summary>
@@ -92253,7 +92513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_append_squirrelmail_data" lineno="1161">
+<interface name="apache_append_squirrelmail_data" lineno="1179">
 <summary>
 Append httpd squirrelmail data files.
 </summary>
@@ -92263,7 +92523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_squirrelmail_spool" lineno="1179">
+<interface name="apache_delete_squirrelmail_spool" lineno="1197">
 <summary>
 delete httpd squirrelmail spool files.
 </summary>
@@ -92273,7 +92533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_sys_content" lineno="1197">
+<interface name="apache_search_sys_content" lineno="1215">
 <summary>
 Search httpd system content.
 </summary>
@@ -92283,7 +92543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_sys_content" lineno="1216">
+<interface name="apache_read_sys_content" lineno="1234">
 <summary>
 Read httpd system content.
 </summary>
@@ -92293,7 +92553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_search_sys_scripts" lineno="1236">
+<interface name="apache_search_sys_scripts" lineno="1254">
 <summary>
 Search httpd system CGI directories.
 </summary>
@@ -92303,7 +92563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_manage_all_user_content" lineno="1256">
+<interface name="apache_manage_all_user_content" lineno="1274">
 <summary>
 Create, read, write, and delete all
 user httpd content.
@@ -92315,7 +92575,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apache_search_sys_script_state" lineno="1277">
+<interface name="apache_search_sys_script_state" lineno="1295">
 <summary>
 Search system script state directories.
 </summary>
@@ -92325,7 +92585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_read_tmp_files" lineno="1295">
+<interface name="apache_read_tmp_files" lineno="1313">
 <summary>
 Read httpd tmp files.
 </summary>
@@ -92335,7 +92595,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apache_dontaudit_write_tmp_files" lineno="1315">
+<interface name="apache_dontaudit_write_tmp_files" lineno="1333">
 <summary>
 Do not audit attempts to write
 httpd tmp files.
@@ -92346,7 +92606,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="apache_delete_lib_files" lineno="1333">
+<interface name="apache_delete_lib_files" lineno="1351">
 <summary>
 Delete httpd_var_lib_t files
 </summary>
@@ -92356,7 +92616,7 @@ Domain that can delete the files
 </summary>
 </param>
 </interface>
-<interface name="apache_cgi_domain" lineno="1364">
+<interface name="apache_cgi_domain" lineno="1382">
 <summary>
 Execute CGI in the specified domain.
 </summary>
@@ -92378,7 +92638,7 @@ Type of the executable to enter the cgi domain.
 </summary>
 </param>
 </interface>
-<interface name="apache_admin" lineno="1392">
+<interface name="apache_admin" lineno="1410">
 <summary>
 All of the rules required to
 administrate an apache environment.
@@ -92395,6 +92655,16 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
+<interface name="apache_rw_runtime_files" lineno="1462">
+<summary>
+rw httpd_runtime_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
 <tunable name="allow_httpd_anon_write" dftval="false">
 <desc>
 <p>
@@ -94992,7 +95262,7 @@ Role allowed access.
 </summary>
 </param>
 </template>
-<template name="container_system_role" lineno="187">
+<template name="container_system_role" lineno="175">
 <summary>
 Role access for system containers.
 </summary>
@@ -95018,7 +95288,7 @@ Role allowed access.
 </summary>
 </param>
 </template>
-<template name="container_user_role" lineno="229">
+<template name="container_user_role" lineno="217">
 <summary>
 Role access for user containers.
 </summary>
@@ -95044,7 +95314,33 @@ Role allowed access.
 </summary>
 </param>
 </template>
-<interface name="container_domtrans_generic_engine" lineno="307">
+<template name="container_unconfined_role" lineno="280">
+<summary>
+Unconfined role access for containers.
+</summary>
+<param name="role_prefix">
+<summary>
+The prefix of the user role (e.g., user
+is the prefix for user_r).
+</summary>
+</param>
+<param name="user_domain">
+<summary>
+User domain for the role.
+</summary>
+</param>
+<param name="user_exec_domain">
+<summary>
+User exec domain for execute and transition access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</template>
+<interface name="container_domtrans_generic_engine" lineno="319">
 <summary>
 Execute generic container engines in the
 container engine domain.
@@ -95055,7 +95351,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="container_run_generic_engine" lineno="333">
+<interface name="container_run_generic_engine" lineno="345">
 <summary>
 Execute generic container engines in the
 container engine domain, and allow the
@@ -95072,7 +95368,7 @@ The role to be allowed the container domain.
 </summary>
 </param>
 </interface>
-<interface name="container_engine_executable_file" lineno="353">
+<interface name="container_engine_executable_file" lineno="365">
 <summary>
 Make the specified type usable for files
 that are executables for container engines.
@@ -95083,7 +95379,7 @@ Type to be used for files.
 </summary>
 </param>
 </interface>
-<interface name="container_generic_engine_domtrans" lineno="380">
+<interface name="container_generic_engine_domtrans" lineno="392">
 <summary>
 Execute a generic container engine
 executable with an automatic transition
@@ -95100,7 +95396,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="container_engine_executable_entrypoint" lineno="401">
+<interface name="container_engine_executable_entrypoint" lineno="413">
 <summary>
 Allow the generic container engine
 executables to be an entrypoint
@@ -95112,7 +95408,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_engine_dbus_chat" lineno="420">
+<interface name="container_engine_dbus_chat" lineno="432">
 <summary>
 Send and receive messages from
 container engines over dbus.
@@ -95123,7 +95419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_runtime_named_socket_activation" lineno="443">
+<interface name="container_runtime_named_socket_activation" lineno="455">
 <summary>
 Allow the specified domain to be started
 by systemd socket activation using a
@@ -95136,7 +95432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_engine_tmp_files" lineno="462">
+<interface name="container_manage_engine_tmp_files" lineno="474">
 <summary>
 Allow the specified domain to manage
 container engine temporary files.
@@ -95147,7 +95443,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_engine_tmp_sock_files" lineno="482">
+<interface name="container_manage_engine_tmp_sock_files" lineno="494">
 <summary>
 Allow the specified domain to manage
 container engine temporary named sockets.
@@ -95158,7 +95454,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_engine_tmp_filetrans" lineno="514">
+<interface name="container_engine_tmp_filetrans" lineno="526">
 <summary>
 Allow the specified domain to create
 objects in generic temporary directories
@@ -95181,7 +95477,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_read_system_container_state" lineno="533">
+<interface name="container_read_system_container_state" lineno="545">
 <summary>
 Read the process state (/proc/pid)
 of all system containers.
@@ -95192,7 +95488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_read_user_container_state" lineno="552">
+<interface name="container_read_user_container_state" lineno="564">
 <summary>
 Read the process state (/proc/pid)
 of all user containers.
@@ -95203,7 +95499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_all_containers" lineno="572">
+<interface name="container_manage_all_containers" lineno="584">
 <summary>
 All of the permissions necessary
 for a container engine to manage
@@ -95215,7 +95511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_domtrans" lineno="592">
+<interface name="container_domtrans" lineno="604">
 <summary>
 Allow the specified domain to
 perform a type transition to
@@ -95227,7 +95523,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_system_containers" lineno="611">
+<interface name="container_stream_connect_system_containers" lineno="623">
 <summary>
 Connect to a system container domain
 over a unix stream socket.
@@ -95238,7 +95534,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_user_containers" lineno="633">
+<interface name="container_stream_connect_user_containers" lineno="645">
 <summary>
 Connect to a user container domain
 over a unix stream socket.
@@ -95249,7 +95545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_all_containers" lineno="655">
+<interface name="container_stream_connect_all_containers" lineno="667">
 <summary>
 Connect to a container domain
 over a unix stream socket.
@@ -95260,7 +95556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_signal_all_containers" lineno="678">
+<interface name="container_signal_all_containers" lineno="690">
 <summary>
 Allow the specified domain to
 send all signals to a container
@@ -95272,7 +95568,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="container_setattr_container_ptys" lineno="696">
+<interface name="container_setattr_container_ptys" lineno="708">
 <summary>
 Set the attributes of container ptys.
 </summary>
@@ -95282,7 +95578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_use_container_ptys" lineno="714">
+<interface name="container_use_container_ptys" lineno="726">
 <summary>
 Read and write container ptys.
 </summary>
@@ -95292,7 +95588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_mountpoint" lineno="733">
+<interface name="container_mountpoint" lineno="745">
 <summary>
 Make the specified type usable as a mountpoint
 for containers.
@@ -95303,7 +95599,29 @@ Type to be used as a mountpoint.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_config_files" lineno="752">
+<interface name="container_create_config_files" lineno="764">
+<summary>
+Allow the specified domain to
+create container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_write_config_files" lineno="783">
+<summary>
+Allow the specified domain to
+write container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_config_files" lineno="802">
 <summary>
 Allow the specified domain to
 manage container config files.
@@ -95314,7 +95632,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_file_root_filetrans" lineno="773">
+<interface name="container_file_root_filetrans" lineno="823">
 <summary>
 Allow the specified domain to
 create container files in the
@@ -95327,7 +95645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_dirs" lineno="792">
+<interface name="container_manage_dirs" lineno="842">
 <summary>
 Allow the specified domain to
 manage container file directories.
@@ -95338,7 +95656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_files" lineno="811">
+<interface name="container_manage_files" lineno="861">
 <summary>
 Allow the specified domain to
 manage container files.
@@ -95349,7 +95667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_lnk_files" lineno="830">
+<interface name="container_manage_lnk_files" lineno="880">
 <summary>
 Allow the specified domain to
 manage container lnk files.
@@ -95360,7 +95678,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_fifo_files" lineno="849">
+<interface name="container_manage_fifo_files" lineno="899">
 <summary>
 Allow the specified domain to
 manage container fifo files.
@@ -95371,7 +95689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_sock_files" lineno="868">
+<interface name="container_manage_sock_files" lineno="918">
 <summary>
 Allow the specified domain to
 manage container sock files.
@@ -95382,7 +95700,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_rw_chr_files" lineno="887">
+<interface name="container_rw_chr_files" lineno="937">
 <summary>
 Allow the specified domain to read
 and write container chr files.
@@ -95393,7 +95711,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_dontaudit_rw_chr_files" lineno="906">
+<interface name="container_dontaudit_rw_chr_files" lineno="956">
 <summary>
 Do not audit attempts to read
 and write container chr files.
@@ -95404,7 +95722,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_chr_files" lineno="925">
+<interface name="container_manage_chr_files" lineno="975">
 <summary>
 Allow the specified domain to
 manage container chr files.
@@ -95415,7 +95733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_config" lineno="944">
+<interface name="container_manage_home_config" lineno="994">
 <summary>
 Allow the specified domain to
 manage container config home content.
@@ -95426,7 +95744,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_config_home_filetrans" lineno="976">
+<interface name="container_config_home_filetrans" lineno="1026">
 <summary>
 Allow the specified domain to create
 objects in an xdg_config directory
@@ -95449,7 +95767,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_files" lineno="996">
+<interface name="container_manage_home_data_files" lineno="1046">
 <summary>
 Allow the specified domain to
 manage container data home files.
@@ -95460,7 +95778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_fifo_files" lineno="1016">
+<interface name="container_manage_home_data_fifo_files" lineno="1066">
 <summary>
 Allow the specified domain to
 manage container data home named
@@ -95472,7 +95790,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_sock_files" lineno="1036">
+<interface name="container_manage_home_data_sock_files" lineno="1086">
 <summary>
 Allow the specified domain to
 manage container data home named
@@ -95484,7 +95802,51 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_relabel_all_content" lineno="1056">
+<interface name="container_admin_all_files" lineno="1104">
+<summary>
+Administrate all container files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin_all_ro_files" lineno="1124">
+<summary>
+Administrate all container read-only files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin_all_user_runtime_content" lineno="1146">
+<summary>
+All of the rules necessary for a user
+to manage user container runtime data
+in their user runtime directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_all_home_content" lineno="1166">
+<summary>
+All of the rules necessary for a user
+to manage container data in their home
+directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_relabel_all_content" lineno="1210">
 <summary>
 Allow the specified domain to
 relabel container files and
@@ -95496,7 +95858,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_relabel_fs" lineno="1075">
+<interface name="container_remount_fs" lineno="1229">
+<summary>
+Allow the specified domain to
+remount container filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_relabel_fs" lineno="1248">
 <summary>
 Allow the specified domain to
 relabel container filesystems.
@@ -95507,7 +95880,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_getattr_fs" lineno="1095">
+<interface name="container_getattr_fs" lineno="1268">
 <summary>
 Allow the specified domain to
 get the attributes of container
@@ -95519,7 +95892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_search_runtime" lineno="1114">
+<interface name="container_search_runtime" lineno="1287">
 <summary>
 Allow the specified domain to search
 runtime container directories.
@@ -95530,7 +95903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_files" lineno="1134">
+<interface name="container_manage_runtime_files" lineno="1307">
 <summary>
 Allow the specified domain to manage
 runtime container files.
@@ -95541,7 +95914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_fifo_files" lineno="1153">
+<interface name="container_manage_runtime_fifo_files" lineno="1326">
 <summary>
 Allow the specified domain to manage
 runtime container named pipes.
@@ -95552,7 +95925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_sock_files" lineno="1172">
+<interface name="container_manage_runtime_sock_files" lineno="1345">
 <summary>
 Allow the specified domain to manage
 runtime container named sockets.
@@ -95563,7 +95936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_user_runtime_files" lineno="1191">
+<interface name="container_manage_user_runtime_files" lineno="1364">
 <summary>
 Allow the specified domain to manage
 user runtime container files.
@@ -95574,7 +95947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_rw_user_runtime_sock_files" lineno="1210">
+<interface name="container_rw_user_runtime_sock_files" lineno="1383">
 <summary>
 Allow the specified domain to read and
 write user runtime container named sockets.
@@ -95585,7 +95958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_search_var_lib" lineno="1229">
+<interface name="container_search_var_lib" lineno="1402">
 <summary>
 Allow the specified domain to search
 container directories in /var/lib.
@@ -95596,7 +95969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_files" lineno="1249">
+<interface name="container_manage_var_lib_files" lineno="1422">
 <summary>
 Allow the specified domain to manage
 container files in /var/lib.
@@ -95607,7 +95980,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_fifo_files" lineno="1268">
+<interface name="container_manage_var_lib_fifo_files" lineno="1441">
 <summary>
 Allow the specified domain to manage
 container named pipes in /var/lib.
@@ -95618,7 +95991,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_sock_files" lineno="1287">
+<interface name="container_manage_var_lib_sock_files" lineno="1460">
 <summary>
 Allow the specified domain to manage
 container named sockets in /var/lib.
@@ -95629,7 +96002,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_unlabeled_var_lib_filetrans" lineno="1318">
+<interface name="container_unlabeled_var_lib_filetrans" lineno="1491">
 <summary>
 Allow the specified domain to create
 objects in unlabeled directories with
@@ -95652,7 +96025,18 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_admin" lineno="1346">
+<interface name="container_start_units" lineno="1512">
+<summary>
+Allow the specified domain to start
+systemd units for containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin" lineno="1539">
 <summary>
 All of the rules required to
 administrate a container
@@ -95686,6 +96070,27 @@ Allow container engines to mount on all non-security files.
 </p>
 </desc>
 </tunable>
+<tunable name="container_manage_public_content" dftval="false">
+<desc>
+<p>
+Allow containers to manage all read-writable public content.
+</p>
+</desc>
+</tunable>
+<tunable name="container_read_public_content" dftval="false">
+<desc>
+<p>
+Allow containers to read all public content.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_ecryptfs" dftval="false">
+<desc>
+<p>
+Allow containers to use eCryptfs filesystems.
+</p>
+</desc>
+</tunable>
 <tunable name="container_use_nfs" dftval="false">
 <desc>
 <p>
@@ -96950,7 +97355,7 @@ User domain for the role
 </summary>
 </param>
 </template>
-<interface name="dbus_system_bus_client" lineno="140">
+<interface name="dbus_system_bus_client" lineno="137">
 <summary>
 Template for creating connections to
 the system bus.
@@ -96961,7 +97366,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_connect_all_session_bus" lineno="179">
+<interface name="dbus_connect_all_session_bus" lineno="176">
 <summary>
 Acquire service on all DBUS
 session busses.
@@ -96972,7 +97377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="dbus_connect_spec_session_bus" lineno="205">
+<template name="dbus_connect_spec_session_bus" lineno="202">
 <summary>
 Acquire service on specified
 DBUS session bus.
@@ -96989,7 +97394,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="dbus_all_session_bus_client" lineno="225">
+<interface name="dbus_all_session_bus_client" lineno="222">
 <summary>
 Creating connections to all
 DBUS session busses.
@@ -97000,7 +97405,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="dbus_spec_session_bus_client" lineno="257">
+<template name="dbus_spec_session_bus_client" lineno="254">
 <summary>
 Creating connections to specified
 DBUS session bus.
@@ -97017,7 +97422,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="dbus_send_all_session_bus" lineno="284">
+<interface name="dbus_send_all_session_bus" lineno="281">
 <summary>
 Send messages to all DBUS
 session busses.
@@ -97028,7 +97433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="dbus_send_spec_session_bus" lineno="310">
+<template name="dbus_send_spec_session_bus" lineno="307">
 <summary>
 Send messages to specified
 DBUS session busses.
@@ -97045,7 +97450,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="dbus_getattr_session_runtime_socket" lineno="330">
+<interface name="dbus_getattr_session_runtime_socket" lineno="327">
 <summary>
 Allow the specified domain to get the
 attributes of the session dbus sock file.
@@ -97056,7 +97461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_write_session_runtime_socket" lineno="349">
+<interface name="dbus_write_session_runtime_socket" lineno="346">
 <summary>
 Allow the specified domain to write to
 the session dbus sock file.
@@ -97067,7 +97472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_read_config" lineno="367">
+<interface name="dbus_read_config" lineno="364">
 <summary>
 Read dbus configuration content.
 </summary>
@@ -97077,7 +97482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_read_lib_files" lineno="386">
+<interface name="dbus_read_lib_files" lineno="383">
 <summary>
 Read system dbus lib files.
 </summary>
@@ -97087,7 +97492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_relabel_lib_dirs" lineno="406">
+<interface name="dbus_relabel_lib_dirs" lineno="403">
 <summary>
 Relabel system dbus lib directory.
 </summary>
@@ -97097,7 +97502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_manage_lib_files" lineno="426">
+<interface name="dbus_manage_lib_files" lineno="423">
 <summary>
 Create, read, write, and delete
 system dbus lib files.
@@ -97108,7 +97513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_all_session_domain" lineno="452">
+<interface name="dbus_all_session_domain" lineno="449">
 <summary>
 Allow a application domain to be
 started by the specified session bus.
@@ -97125,7 +97530,7 @@ entry point to this domain.
 </summary>
 </param>
 </interface>
-<template name="dbus_spec_session_domain" lineno="486">
+<template name="dbus_spec_session_domain" lineno="483">
 <summary>
 Allow a application domain to be
 started by the specified session bus.
@@ -97148,7 +97553,7 @@ entry point to this domain.
 </summary>
 </param>
 </template>
-<interface name="dbus_connect_system_bus" lineno="507">
+<interface name="dbus_connect_system_bus" lineno="504">
 <summary>
 Acquire service on the DBUS system bus.
 </summary>
@@ -97158,7 +97563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_send_system_bus" lineno="526">
+<interface name="dbus_send_system_bus" lineno="523">
 <summary>
 Send messages to the DBUS system bus.
 </summary>
@@ -97168,7 +97573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_system_bus_unconfined" lineno="545">
+<interface name="dbus_system_bus_unconfined" lineno="542">
 <summary>
 Unconfined access to DBUS system bus.
 </summary>
@@ -97178,7 +97583,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_system_domain" lineno="570">
+<interface name="dbus_system_domain" lineno="567">
 <summary>
 Create a domain for processes which
 can be started by the DBUS system bus.
@@ -97194,7 +97599,7 @@ Type of the program to be used as an entry point to this domain.
 </summary>
 </param>
 </interface>
-<interface name="dbus_use_system_bus_fds" lineno="610">
+<interface name="dbus_use_system_bus_fds" lineno="605">
 <summary>
 Use and inherit DBUS system bus
 file descriptors.
@@ -97205,7 +97610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="629">
+<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="624">
 <summary>
 Do not audit attempts to read and
 write DBUS system bus TCP sockets.
@@ -97216,7 +97621,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dbus_watch_system_bus_runtime_dirs" lineno="647">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="642">
 <summary>
 Watch system bus runtime directories.
 </summary>
@@ -97226,7 +97631,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_list_system_bus_runtime" lineno="665">
+<interface name="dbus_read_system_bus_runtime_files" lineno="660">
+<summary>
+Read system bus runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_list_system_bus_runtime" lineno="679">
 <summary>
 List system bus runtime directories.
 </summary>
@@ -97236,7 +97651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="683">
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="697">
 <summary>
 Watch system bus runtime named sockets.
 </summary>
@@ -97246,7 +97661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="701">
+<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="715">
 <summary>
 Read system bus runtime named sockets.
 </summary>
@@ -97256,7 +97671,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_unconfined" lineno="719">
+<interface name="dbus_unconfined" lineno="733">
 <summary>
 Unconfined access to DBUS.
 </summary>
@@ -97266,7 +97681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="749">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763">
 <summary>
 Create resources in /run or /var/run with the system_dbusd_runtime_t
 label. This method is deprecated in favor of the init_daemon_run_dir
@@ -97288,7 +97703,7 @@ Optional file name used for the resource
 </summary>
 </param>
 </interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="763">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777">
 <summary>
 Create directories with the system_dbusd_runtime_t label
 </summary>
@@ -97307,6 +97722,23 @@ over D-Bus.  This is needed by openvpn3-linux.
 </p>
 </desc>
 </tunable>
+<tunable name="dbus_broker_run_transient_units" dftval="false">
+<desc>
+<p>
+Allow dbus-daemon system bus to to run systemd transient
+units. This is used by dbus-broker for dbus-activated
+services when the unit file for the service does not exist.
+</p>
+</desc>
+</tunable>
+<tunable name="dbus_broker_system_bus" dftval="false">
+<desc>
+<p>
+Enable additional rules to support using dbus-broker
+as the dbus-daemon system bus.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="ddclient" filename="policy/modules/services/ddclient.if">
 <summary>Update dynamic IP address at DynDNS.org.</summary>
@@ -101404,7 +101836,27 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="mailman_exec" lineno="120">
+<interface name="mailman_stream_connect_cgi" lineno="120">
+<summary>
+Talk to mailman_cgi_t via Unix domain socket
+</summary>
+<param name="domain">
+<summary>
+Domain talking to mailman
+</summary>
+</param>
+</interface>
+<interface name="mailman_manage_runtime_files" lineno="139">
+<summary>
+Manage mailman runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain to manage the files
+</summary>
+</param>
+</interface>
+<interface name="mailman_exec" lineno="158">
 <summary>
 Execute mailman in the caller domain.
 </summary>
@@ -101414,7 +101866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_signal_cgi" lineno="139">
+<interface name="mailman_signal_cgi" lineno="177">
 <summary>
 Send generic signals to mailman cgi.
 </summary>
@@ -101424,7 +101876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_search_data" lineno="157">
+<interface name="mailman_search_data" lineno="195">
 <summary>
 Search mailman data directories.
 </summary>
@@ -101434,7 +101886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_read_data_files" lineno="176">
+<interface name="mailman_read_data_files" lineno="214">
 <summary>
 Read mailman data content.
 </summary>
@@ -101444,7 +101896,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_manage_data_files" lineno="198">
+<interface name="mailman_map_data_files" lineno="235">
+<summary>
+map mailman data content.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mailman_manage_data_files" lineno="254">
 <summary>
 Create, read, write, and delete
 mailman data files.
@@ -101455,7 +101917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_list_data" lineno="218">
+<interface name="mailman_list_data" lineno="274">
 <summary>
 List mailman data directories.
 </summary>
@@ -101465,7 +101927,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_read_data_symlinks" lineno="237">
+<interface name="mailman_read_data_symlinks" lineno="293">
 <summary>
 Read mailman data symbolic links.
 </summary>
@@ -101475,7 +101937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_read_log" lineno="255">
+<interface name="mailman_read_log" lineno="311">
 <summary>
 Read mailman log files.
 </summary>
@@ -101485,7 +101947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_append_log" lineno="274">
+<interface name="mailman_append_log" lineno="330">
 <summary>
 Append mailman log files.
 </summary>
@@ -101495,7 +101957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_manage_log" lineno="294">
+<interface name="mailman_manage_log" lineno="350">
 <summary>
 Create, read, write, and delete
 mailman log content.
@@ -101506,7 +101968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_read_archive" lineno="314">
+<interface name="mailman_read_archive" lineno="370">
 <summary>
 Read mailman archive content.
 </summary>
@@ -101516,7 +101978,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mailman_domtrans_queue" lineno="337">
+<interface name="mailman_domtrans_queue" lineno="393">
 <summary>
 Execute mailman_queue in the
 mailman_queue domain.
@@ -101527,6 +101989,34 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
+<interface name="mailman_manage_lockdir" lineno="412">
+<summary>
+Manage mailman lock dir
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to manage it.
+</summary>
+</param>
+</interface>
+</module>
+<module name="matrixd" filename="policy/modules/services/matrixd.if">
+<summary>matrix.org synapse reference server.</summary>
+<tunable name="matrix_allow_federation" dftval="true">
+<desc>
+<p>
+Determine whether Matrixd is allowed to federate
+(bind all UDP ports and connect to all TCP ports).
+</p>
+</desc>
+</tunable>
+<tunable name="matrix_postgresql_connect" dftval="false">
+<desc>
+<p>
+Determine whether Matrixd can connect to the Postgres database.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="mediawiki" filename="policy/modules/services/mediawiki.if">
 <summary>Open source wiki package written in PHP.</summary>
@@ -102588,7 +103078,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_spool_symlinks" lineno="835">
+<interface name="mta_read_spool_symlinks" lineno="836">
 <summary>
 Allow reading mail spool symlinks.
 </summary>
@@ -102598,7 +103088,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="854">
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="855">
 <summary>
 Do not audit attempts to read
 mail spool symlinks.
@@ -102609,7 +103099,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_getattr_spool" lineno="872">
+<interface name="mta_getattr_spool" lineno="873">
 <summary>
 Get attributes of mail spool content.
 </summary>
@@ -102619,7 +103109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="894">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="895">
 <summary>
 Do not audit attempts to get
 attributes of mail spool files.
@@ -102630,7 +103120,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_spool_filetrans" lineno="932">
+<interface name="mta_spool_filetrans" lineno="933">
 <summary>
 Create specified objects in the
 mail spool directory with a
@@ -102657,7 +103147,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_spool_files" lineno="951">
+<interface name="mta_read_spool_files" lineno="952">
 <summary>
 Read mail spool files.
 </summary>
@@ -102667,7 +103157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_spool" lineno="971">
+<interface name="mta_rw_spool" lineno="972">
 <summary>
 Read and write mail spool files.
 </summary>
@@ -102677,7 +103167,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_append_spool" lineno="992">
+<interface name="mta_append_spool" lineno="993">
 <summary>
 Create, read, and write mail spool files.
 </summary>
@@ -102687,7 +103177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_delete_spool" lineno="1013">
+<interface name="mta_delete_spool" lineno="1014">
 <summary>
 Delete mail spool files.
 </summary>
@@ -102697,7 +103187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_spool" lineno="1033">
+<interface name="mta_manage_spool" lineno="1034">
 <summary>
 Create, read, write, and delete
 mail spool content.
@@ -102708,7 +103198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_watch_spool" lineno="1055">
+<interface name="mta_watch_spool" lineno="1056">
 <summary>
 Watch mail spool content.
 </summary>
@@ -102718,7 +103208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_queue_filetrans" lineno="1090">
+<interface name="mta_queue_filetrans" lineno="1091">
 <summary>
 Create specified objects in the
 mail queue spool directory with a
@@ -102745,7 +103235,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_search_queue" lineno="1109">
+<interface name="mta_search_queue" lineno="1110">
 <summary>
 Search mail queue directories.
 </summary>
@@ -102755,7 +103245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_list_queue" lineno="1128">
+<interface name="mta_list_queue" lineno="1129">
 <summary>
 List mail queue directories.
 </summary>
@@ -102765,7 +103255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_queue" lineno="1147">
+<interface name="mta_read_queue" lineno="1148">
 <summary>
 Read mail queue files.
 </summary>
@@ -102775,7 +103265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1167">
+<interface name="mta_dontaudit_rw_queue" lineno="1168">
 <summary>
 Do not audit attempts to read and
 write mail queue content.
@@ -102786,7 +103276,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_queue" lineno="1187">
+<interface name="mta_manage_queue" lineno="1188">
 <summary>
 Create, read, write, and delete
 mail queue content.
@@ -102797,7 +103287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_sendmail_bin" lineno="1207">
+<interface name="mta_read_sendmail_bin" lineno="1208">
 <summary>
 Read sendmail binary.
 </summary>
@@ -102807,7 +103297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1226">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1227">
 <summary>
 Read and write unix domain stream
 sockets of all base mail domains.
@@ -103830,6 +104320,9 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="node_exporter" filename="policy/modules/services/node_exporter.if">
+<summary>Prometheus Node Exporter</summary>
+</module>
 <module name="nscd" filename="policy/modules/services/nscd.if">
 <summary>Name service cache daemon.</summary>
 <interface name="nscd_signal" lineno="13">
@@ -105351,7 +105844,22 @@ Role allowed access.
 </module>
 <module name="podman" filename="policy/modules/services/podman.if">
 <summary>Policy for podman</summary>
-<interface name="podman_domtrans" lineno="13">
+<template name="podman_conmon_domain_template" lineno="18">
+<summary>
+Template for conmon domains.
+</summary>
+<param name="prefix">
+<summary>
+Prefix for generated types.
+</summary>
+</param>
+<param name="source_domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</template>
+<interface name="podman_domtrans" lineno="55">
 <summary>
 Execute podman in the podman domain.
 </summary>
@@ -105361,7 +105869,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="podman_run" lineno="39">
+<interface name="podman_run" lineno="81">
 <summary>
 Execute podman in the podman domain,
 and allow the specified role the
@@ -105378,7 +105886,7 @@ The role to be allowed the podman domain.
 </summary>
 </param>
 </interface>
-<interface name="podman_domtrans_user" lineno="60">
+<interface name="podman_domtrans_user" lineno="102">
 <summary>
 Execute podman in the podman user
 domain (rootless podman).
@@ -105389,7 +105897,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="podman_run_user" lineno="87">
+<interface name="podman_run_user" lineno="129">
 <summary>
 Execute podman in the podman user
 domain, and allow the specified role
@@ -105407,9 +105915,9 @@ The role to be allowed the podman domain.
 </summary>
 </param>
 </interface>
-<interface name="podman_domtrans_conmon" lineno="107">
+<interface name="podman_domtrans_conmon" lineno="149">
 <summary>
-Execute conmon in the conmon domain.
+Execute conmon in the podman conmon domain.
 </summary>
 <param name="domain">
 <summary>
@@ -105417,11 +105925,11 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="podman_run_conmon" lineno="133">
+<interface name="podman_run_conmon" lineno="175">
 <summary>
-Execute conmon in the conmon domain,
-and allow the specified role the
-conmon domain.
+Execute conmon in the podman conmon
+domain, and allow the specified role
+the podman conmon domain.
 </summary>
 <param name="domain">
 <summary>
@@ -105434,10 +105942,10 @@ The role to be allowed the conmon domain.
 </summary>
 </param>
 </interface>
-<interface name="podman_domtrans_conmon_user" lineno="154">
+<interface name="podman_domtrans_conmon_user" lineno="196">
 <summary>
-Execute conmon in the conmon user
-domain (rootless podman).
+Execute conmon in the podman conmon
+user domain (rootless podman).
 </summary>
 <param name="domain">
 <summary>
@@ -105445,12 +105953,12 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="podman_run_conmon_user" lineno="181">
+<interface name="podman_run_conmon_user" lineno="223">
 <summary>
-Execute conmon in the conmon user
-domain, and allow the specified role
-the conmon user domain (rootless
-podman).
+Execute conmon in the podman conmon
+user domain, and allow the specified
+role the podman conmon user domain
+(rootless podman).
 </summary>
 <param name="domain">
 <summary>
@@ -105463,7 +105971,44 @@ The role to be allowed the conmon domain.
 </summary>
 </param>
 </interface>
-<template name="podman_user_role" lineno="218">
+<interface name="podman_spec_rangetrans_conmon" lineno="249">
+<summary>
+Make the specified domain perform a
+range transition when executing conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain to transition ranges.
+</summary>
+</param>
+<param name="range">
+<summary>
+MLS range to transition to.
+</summary>
+</param>
+</interface>
+<interface name="podman_rw_conmon_pipes" lineno="272">
+<summary>
+Read and write podman conmon unnamed pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="podman_use_conmon_fds" lineno="293">
+<summary>
+Allow the specified domain to inherit
+file descriptors from podman conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<template name="podman_user_role" lineno="330">
 <summary>
 Role access for rootless podman.
 </summary>
@@ -105490,7 +106035,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </template>
-<interface name="podman_admin" lineno="255">
+<interface name="podman_admin" lineno="367">
 <summary>
 All of the rules required to
 administrate a podman
@@ -105649,6 +106194,46 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="policykit_get_unit_status" lineno="260">
+<summary>
+Get the status of the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_start_unit" lineno="279">
+<summary>
+Start the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_stop_unit" lineno="298">
+<summary>
+Stop the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_reload_unit" lineno="317">
+<summary>
+Reload the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
 </module>
 <module name="portmap" filename="policy/modules/services/portmap.if">
 <summary>RPC port mapping service.</summary>
@@ -110653,7 +111238,7 @@ is the prefix for sshd_t).
 </summary>
 </param>
 </template>
-<template name="ssh_role_template" lineno="309">
+<template name="ssh_role_template" lineno="322">
 <summary>
 Role access for ssh
 </summary>
@@ -110679,7 +111264,7 @@ Role allowed access
 </summary>
 </param>
 </template>
-<interface name="ssh_sigchld" lineno="474">
+<interface name="ssh_sigchld" lineno="487">
 <summary>
 Send a SIGCHLD signal to the ssh server.
 </summary>
@@ -110689,7 +111274,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signal" lineno="492">
+<interface name="ssh_signal" lineno="505">
 <summary>
 Send a generic signal to the ssh server.
 </summary>
@@ -110699,7 +111284,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signull" lineno="510">
+<interface name="ssh_signull" lineno="523">
 <summary>
 Send a null signal to sshd processes.
 </summary>
@@ -110709,7 +111294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_pipes" lineno="528">
+<interface name="ssh_read_pipes" lineno="541">
 <summary>
 Read a ssh server unnamed pipe.
 </summary>
@@ -110719,7 +111304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_pipes" lineno="545">
+<interface name="ssh_rw_pipes" lineno="558">
 <summary>
 Read and write a ssh server unnamed pipe.
 </summary>
@@ -110729,7 +111314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_stream_sockets" lineno="563">
+<interface name="ssh_rw_stream_sockets" lineno="576">
 <summary>
 Read and write ssh server unix domain stream sockets.
 </summary>
@@ -110739,7 +111324,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_tcp_sockets" lineno="581">
+<interface name="ssh_rw_tcp_sockets" lineno="594">
 <summary>
 Read and write ssh server TCP sockets.
 </summary>
@@ -110749,7 +111334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="600">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613">
 <summary>
 Do not audit attempts to read and write
 ssh server TCP sockets.
@@ -110760,7 +111345,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec_sshd" lineno="618">
+<interface name="ssh_exec_sshd" lineno="631">
 <summary>
 Execute the ssh daemon in the caller domain.
 </summary>
@@ -110770,7 +111355,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans" lineno="637">
+<interface name="ssh_domtrans" lineno="650">
 <summary>
 Execute the ssh daemon sshd domain.
 </summary>
@@ -110780,7 +111365,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_client_domtrans" lineno="655">
+<interface name="ssh_client_domtrans" lineno="668">
 <summary>
 Execute the ssh client in the ssh client domain.
 </summary>
@@ -110790,7 +111375,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec" lineno="673">
+<interface name="ssh_exec" lineno="686">
 <summary>
 Execute the ssh client in the caller domain.
 </summary>
@@ -110800,7 +111385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_setattr_key_files" lineno="692">
+<interface name="ssh_setattr_key_files" lineno="705">
 <summary>
 Set the attributes of sshd key files.
 </summary>
@@ -110810,7 +111395,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_agent_exec" lineno="711">
+<interface name="ssh_agent_exec" lineno="724">
 <summary>
 Execute the ssh agent client in the caller domain.
 </summary>
@@ -110820,7 +111405,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_user_home_files" lineno="730">
+<interface name="ssh_setattr_home_dirs" lineno="743">
+<summary>
+Set the attributes of ssh home directory (~/.ssh)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_create_home_dirs" lineno="761">
+<summary>
+Create ssh home directory (~/.ssh)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_read_user_home_files" lineno="780">
 <summary>
 Read ssh home directory content
 </summary>
@@ -110830,7 +111435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans_keygen" lineno="751">
+<interface name="ssh_domtrans_keygen" lineno="801">
 <summary>
 Execute the ssh key generator in the ssh keygen domain.
 </summary>
@@ -110840,17 +111445,27 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="769">
+<interface name="ssh_read_server_keys" lineno="819">
 <summary>
 Read ssh server keys
 </summary>
 <param name="domain">
 <summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_dontaudit_read_server_keys" lineno="837">
+<summary>
+Do not audit denials on reading ssh server keys
+</summary>
+<param name="domain">
+<summary>
 Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_manage_home_files" lineno="787">
+<interface name="ssh_manage_home_files" lineno="855">
 <summary>
 Manage ssh home directory content
 </summary>
@@ -110860,7 +111475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_delete_tmp" lineno="806">
+<interface name="ssh_delete_tmp" lineno="874">
 <summary>
 Delete from the ssh temp files.
 </summary>
@@ -110870,7 +111485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_agent_tmp" lineno="825">
+<interface name="ssh_dontaudit_agent_tmp" lineno="893">
 <summary>
 dontaudit access to ssh agent tmp dirs
 </summary>
@@ -115841,7 +116456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_signal" lineno="76">
+<interface name="fstools_signal" lineno="77">
 <summary>
 Send signal to fsadm process
 </summary>
@@ -115851,7 +116466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_use_fds" lineno="94">
+<interface name="fstools_use_fds" lineno="95">
 <summary>
 Inherit fstools file descriptors.
 </summary>
@@ -115861,7 +116476,7 @@ The type of the process performing this action.
 </summary>
 </param>
 </interface>
-<interface name="fstools_read_pipes" lineno="112">
+<interface name="fstools_read_pipes" lineno="113">
 <summary>
 Read fstools unnamed pipes.
 </summary>
@@ -115871,7 +116486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_relabelto_entry_files" lineno="131">
+<interface name="fstools_relabelto_entry_files" lineno="132">
 <summary>
 Relabel a file to the type used by the
 filesystem tools programs.
@@ -115882,7 +116497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_manage_entry_files" lineno="150">
+<interface name="fstools_manage_entry_files" lineno="151">
 <summary>
 Create, read, write, and delete a file used by the
 filesystem tools programs.
@@ -115893,7 +116508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_write_log" lineno="168">
+<interface name="fstools_write_log" lineno="169">
 <summary>
 Write to fsadm_log_t
 </summary>
@@ -115903,7 +116518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_manage_runtime_files" lineno="187">
+<interface name="fstools_manage_runtime_files" lineno="188">
 <summary>
 Create, read, write, and delete filesystem tools
 runtime files.
@@ -115914,7 +116529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_getattr_swap_files" lineno="205">
+<interface name="fstools_getattr_swap_files" lineno="206">
 <summary>
 Getattr swapfile
 </summary>
@@ -115924,7 +116539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_dontaudit_getattr_swap_files" lineno="223">
+<interface name="fstools_dontaudit_getattr_swap_files" lineno="224">
 <summary>
 Ignore access to a swapfile.
 </summary>
@@ -115934,7 +116549,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fstools_relabelto_swap_files" lineno="241">
+<interface name="fstools_relabelto_swap_files" lineno="242">
 <summary>
 Relabel to swapfile.
 </summary>
@@ -115944,7 +116559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fstools_manage_swap_files" lineno="259">
+<interface name="fstools_manage_swap_files" lineno="260">
 <summary>
 Manage swapfile.
 </summary>
@@ -116244,7 +116859,7 @@ Type of the program to be used as an entry point to this domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_ranged_daemon_domain" lineno="431">
+<interface name="init_ranged_daemon_domain" lineno="433">
 <summary>
 Create a domain for long running processes
 (daemons/services) which are started by init scripts,
@@ -116286,7 +116901,7 @@ MLS/MCS range for the domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_abstract_socket_activation" lineno="462">
+<interface name="init_abstract_socket_activation" lineno="464">
 <summary>
 Abstract socket service activation (systemd).
 </summary>
@@ -116296,7 +116911,7 @@ The domain to be started by systemd socket activation.
 </summary>
 </param>
 </interface>
-<interface name="init_named_socket_activation" lineno="487">
+<interface name="init_named_socket_activation" lineno="489">
 <summary>
 Named socket service activation (systemd).
 </summary>
@@ -116311,7 +116926,7 @@ The domain socket file type.
 </summary>
 </param>
 </interface>
-<interface name="init_system_domain" lineno="538">
+<interface name="init_system_domain" lineno="540">
 <summary>
 Create a domain for short running processes
 which are started by init scripts.
@@ -116348,7 +116963,7 @@ Type of the program to be used as an entry point to this domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_ranged_system_domain" lineno="600">
+<interface name="init_ranged_system_domain" lineno="602">
 <summary>
 Create a domain for short running processes
 which are started by init scripts.
@@ -116391,7 +117006,7 @@ Range for the domain.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="init_dyntrans" lineno="631">
+<interface name="init_dyntrans" lineno="633">
 <summary>
 Allow domain dyntransition to init_t domain.
 </summary>
@@ -116401,7 +117016,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_pid_file" lineno="660">
+<interface name="init_daemon_pid_file" lineno="662">
 <summary>
 Mark the file type as a daemon pid file, allowing initrc_t
 to create it  (Deprecated)
@@ -116422,7 +117037,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_runtime_file" lineno="687">
+<interface name="init_daemon_runtime_file" lineno="689">
 <summary>
 Mark the file type as a daemon runtime file, allowing initrc_t
 to create it
@@ -116443,7 +117058,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_lock_file" lineno="720">
+<interface name="init_daemon_lock_file" lineno="722">
 <summary>
 Mark the file type as a daemon lock file, allowing initrc_t
 to create it
@@ -116464,7 +117079,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans" lineno="742">
+<interface name="init_domtrans" lineno="744">
 <summary>
 Execute init (/sbin/init) with a domain transition.
 </summary>
@@ -116474,7 +117089,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="766">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="768">
 <summary>
 Execute init (/sbin/init) with a domain transition
 to the provided domain.
@@ -116490,7 +117105,7 @@ The type to be used as a systemd --user domain.
 </summary>
 </param>
 </interface>
-<interface name="init_exec" lineno="794">
+<interface name="init_exec" lineno="796">
 <summary>
 Execute the init program in the caller domain.
 </summary>
@@ -116501,7 +117116,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_pgm_entrypoint" lineno="815">
+<interface name="init_pgm_entrypoint" lineno="817">
 <summary>
 Allow the init program to be an entrypoint
 for the specified domain.
@@ -116513,7 +117128,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_exec_rc" lineno="844">
+<interface name="init_exec_rc" lineno="846">
 <summary>
 Execute the rc application in the caller domain.
 </summary>
@@ -116534,7 +117149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid" lineno="863">
+<interface name="init_getpgid" lineno="865">
 <summary>
 Get the process group of init.
 </summary>
@@ -116544,7 +117159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal" lineno="881">
+<interface name="init_signal" lineno="883">
 <summary>
 Send init a generic signal.
 </summary>
@@ -116554,7 +117169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull" lineno="899">
+<interface name="init_signull" lineno="901">
 <summary>
 Send init a null signal.
 </summary>
@@ -116564,7 +117179,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld" lineno="917">
+<interface name="init_sigchld" lineno="919">
 <summary>
 Send init a SIGCHLD signal.
 </summary>
@@ -116574,7 +117189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_setsched" lineno="935">
+<interface name="init_setsched" lineno="937">
 <summary>
 Set the nice level of init.
 </summary>
@@ -116584,7 +117199,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect" lineno="953">
+<interface name="init_stream_connect" lineno="955">
 <summary>
 Connect to init with a unix socket.
 </summary>
@@ -116594,7 +117209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_unix_stream_socket_connectto" lineno="974">
+<interface name="init_unix_stream_socket_connectto" lineno="976">
 <summary>
 Connect to init with a unix socket.
 Without any additional permissions.
@@ -116605,7 +117220,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_fds" lineno="1032">
+<interface name="init_use_fds" lineno="1034">
 <summary>
 Inherit and use file descriptors from init.
 </summary>
@@ -116655,7 +117270,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="1"/>
 </interface>
-<interface name="init_dontaudit_use_fds" lineno="1051">
+<interface name="init_dontaudit_use_fds" lineno="1053">
 <summary>
 Do not audit attempts to inherit file
 descriptors from init.
@@ -116666,7 +117281,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dgram_send" lineno="1070">
+<interface name="init_dgram_send" lineno="1072">
 <summary>
 Send messages to init unix datagram sockets.
 </summary>
@@ -116677,7 +117292,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1090">
+<interface name="init_rw_inherited_stream_socket" lineno="1092">
 <summary>
 Read and write to inherited init unix streams.
 </summary>
@@ -116687,7 +117302,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_stream_sockets" lineno="1109">
+<interface name="init_rw_stream_sockets" lineno="1111">
 <summary>
 Allow the specified domain to read/write to
 init with unix domain stream sockets.
@@ -116698,7 +117313,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_system" lineno="1127">
+<interface name="init_dontaudit_search_keys" lineno="1129">
+<summary>
+Do not audit attempts to search init keys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_system" lineno="1147">
 <summary>
 start service (systemd).
 </summary>
@@ -116708,7 +117333,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_system" lineno="1145">
+<interface name="init_stop_system" lineno="1165">
 <summary>
 stop service (systemd).
 </summary>
@@ -116718,7 +117343,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_system_status" lineno="1163">
+<interface name="init_get_system_status" lineno="1183">
 <summary>
 Get all service status (systemd).
 </summary>
@@ -116728,7 +117353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_enable" lineno="1181">
+<interface name="init_enable" lineno="1201">
 <summary>
 Enable all systemd services (systemd).
 </summary>
@@ -116738,7 +117363,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_disable" lineno="1199">
+<interface name="init_disable" lineno="1219">
 <summary>
 Disable all services (systemd).
 </summary>
@@ -116748,7 +117373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reload" lineno="1217">
+<interface name="init_reload" lineno="1237">
 <summary>
 Reload all services (systemd).
 </summary>
@@ -116758,7 +117383,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reboot_system" lineno="1235">
+<interface name="init_reboot_system" lineno="1255">
 <summary>
 Reboot the system (systemd).
 </summary>
@@ -116768,7 +117393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_shutdown_system" lineno="1253">
+<interface name="init_shutdown_system" lineno="1273">
 <summary>
 Shutdown (halt) the system (systemd).
 </summary>
@@ -116778,7 +117403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_status" lineno="1271">
+<interface name="init_service_status" lineno="1291">
 <summary>
 Allow specified domain to get init status
 </summary>
@@ -116788,7 +117413,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_start" lineno="1290">
+<interface name="init_service_start" lineno="1310">
 <summary>
 Allow specified domain to get init start
 </summary>
@@ -116798,7 +117423,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat" lineno="1310">
+<interface name="init_dbus_chat" lineno="1330">
 <summary>
 Send and receive messages from
 systemd over dbus.
@@ -116809,7 +117434,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_run_bpf" lineno="1330">
+<interface name="init_run_bpf" lineno="1350">
 <summary>
 Run init BPF programs.
 </summary>
@@ -116819,7 +117444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_var_lib_links" lineno="1349">
+<interface name="init_read_var_lib_links" lineno="1369">
 <summary>
 read/follow symlinks under /var/lib/systemd/
 </summary>
@@ -116829,7 +117454,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_var_lib_dirs" lineno="1368">
+<interface name="init_search_var_lib_dirs" lineno="1388">
+<summary>
+Search /var/lib/systemd/ dirs
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_list_var_lib_dirs" lineno="1407">
 <summary>
 List /var/lib/systemd/ dir
 </summary>
@@ -116839,7 +117474,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1386">
+<interface name="init_relabel_var_lib_dirs" lineno="1425">
 <summary>
 Relabel dirs in /var/lib/systemd/.
 </summary>
@@ -116849,7 +117484,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_var_lib_files" lineno="1404">
+<interface name="init_manage_var_lib_files" lineno="1443">
 <summary>
 Manage files in /var/lib/systemd/.
 </summary>
@@ -116859,7 +117494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_var_lib_filetrans" lineno="1439">
+<interface name="init_var_lib_filetrans" lineno="1478">
 <summary>
 Create files in /var/lib/systemd
 with an automatic type transition.
@@ -116885,7 +117520,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_search_pids" lineno="1458">
+<interface name="init_search_pids" lineno="1497">
 <summary>
 Allow search  directory in the /run/systemd directory.  (Deprecated)
 </summary>
@@ -116895,7 +117530,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_pids" lineno="1473">
+<interface name="init_list_pids" lineno="1512">
 <summary>
 Allow listing of the /run/systemd directory.  (Deprecated)
 </summary>
@@ -116905,7 +117540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_pid_symlinks" lineno="1488">
+<interface name="init_manage_pid_symlinks" lineno="1527">
 <summary>
 Create symbolic links in the /run/systemd directory.  (Deprecated)
 </summary>
@@ -116915,7 +117550,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_pid_files" lineno="1503">
+<interface name="init_create_pid_files" lineno="1542">
 <summary>
 Create files in the /run/systemd directory.  (Deprecated)
 </summary>
@@ -116925,7 +117560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_pid_files" lineno="1518">
+<interface name="init_write_pid_files" lineno="1557">
 <summary>
 Write files in the /run/systemd directory.  (Deprecated)
 </summary>
@@ -116935,7 +117570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_pid_dirs" lineno="1534">
+<interface name="init_manage_pid_dirs" lineno="1573">
 <summary>
 Create, read, write, and delete
 directories in the /run/systemd directory.  (Deprecated)
@@ -116946,7 +117581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_pid_filetrans" lineno="1564">
+<interface name="init_pid_filetrans" lineno="1603">
 <summary>
 Create files in an init PID directory.  (Deprecated)
 </summary>
@@ -116971,7 +117606,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_search_runtime" lineno="1579">
+<interface name="init_search_runtime" lineno="1618">
 <summary>
 Search init runtime directories, e.g. /run/systemd.
 </summary>
@@ -116981,7 +117616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_runtime" lineno="1597">
+<interface name="init_list_runtime" lineno="1636">
 <summary>
 List init runtime directories, e.g. /run/systemd.
 </summary>
@@ -116991,7 +117626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_runtime_dirs" lineno="1617">
+<interface name="init_manage_runtime_dirs" lineno="1656">
 <summary>
 Create, read, write, and delete
 directories in the /run/systemd directory.
@@ -117002,7 +117637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_runtime_filetrans" lineno="1650">
+<interface name="init_runtime_filetrans" lineno="1689">
 <summary>
 Create files in an init runtime directory with a private type.
 </summary>
@@ -117027,7 +117662,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_write_runtime_files" lineno="1669">
+<interface name="init_write_runtime_files" lineno="1708">
 <summary>
 Write init runtime files, e.g. in /run/systemd.
 </summary>
@@ -117037,7 +117672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_runtime_files" lineno="1687">
+<interface name="init_create_runtime_files" lineno="1726">
 <summary>
 Create init runtime files, e.g. in /run/systemd.
 </summary>
@@ -117047,7 +117682,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_runtime_symlinks" lineno="1705">
+<interface name="init_manage_runtime_symlinks" lineno="1744">
 <summary>
 Create init runtime symbolic links, e.g. in /run/systemd.
 </summary>
@@ -117057,7 +117692,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_initctl" lineno="1723">
+<interface name="init_getattr_initctl" lineno="1762">
 <summary>
 Get the attributes of initctl.
 </summary>
@@ -117067,7 +117702,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1744">
+<interface name="init_dontaudit_getattr_initctl" lineno="1783">
 <summary>
 Do not audit attempts to get the
 attributes of initctl.
@@ -117078,7 +117713,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_initctl" lineno="1762">
+<interface name="init_write_initctl" lineno="1801">
 <summary>
 Write to initctl.
 </summary>
@@ -117088,7 +117723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_telinit" lineno="1783">
+<interface name="init_telinit" lineno="1822">
 <summary>
 Use telinit (Read and write initctl).
 </summary>
@@ -117099,7 +117734,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_initctl" lineno="1816">
+<interface name="init_rw_initctl" lineno="1855">
 <summary>
 Read and write initctl.
 </summary>
@@ -117109,7 +117744,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1837">
+<interface name="init_dontaudit_rw_initctl" lineno="1876">
 <summary>
 Do not audit attempts to read and
 write initctl.
@@ -117120,7 +117755,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_entry_type" lineno="1856">
+<interface name="init_script_file_entry_type" lineno="1895">
 <summary>
 Make init scripts an entry point for
 the specified domain.
@@ -117131,7 +117766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_spec_domtrans_script" lineno="1879">
+<interface name="init_spec_domtrans_script" lineno="1918">
 <summary>
 Execute init scripts with a specified domain transition.
 </summary>
@@ -117141,7 +117776,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_script" lineno="1906">
+<interface name="init_domtrans_script" lineno="1945">
 <summary>
 Execute init scripts with an automatic domain transition.
 </summary>
@@ -117151,7 +117786,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_labeled_script" lineno="1941">
+<interface name="init_domtrans_labeled_script" lineno="1980">
 <summary>
 Execute labelled init scripts with an automatic domain transition.
 </summary>
@@ -117161,7 +117796,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_domtrans" lineno="1987">
+<interface name="init_script_file_domtrans" lineno="2026">
 <summary>
 Execute a init script in a specified domain.
 </summary>
@@ -117186,7 +117821,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="init_kill_scripts" lineno="2006">
+<interface name="init_kill_scripts" lineno="2045">
 <summary>
 Send a kill signal to init scripts.
 </summary>
@@ -117196,7 +117831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_script_service" lineno="2024">
+<interface name="init_manage_script_service" lineno="2063">
 <summary>
 Allow manage service for initrc_exec_t scripts
 </summary>
@@ -117206,7 +117841,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_labeled_script_domtrans" lineno="2049">
+<interface name="init_labeled_script_domtrans" lineno="2088">
 <summary>
 Transition to the init script domain
 on a specified labeled init script.
@@ -117222,7 +117857,7 @@ Labeled init script file.
 </summary>
 </param>
 </interface>
-<interface name="init_all_labeled_script_domtrans" lineno="2071">
+<interface name="init_all_labeled_script_domtrans" lineno="2110">
 <summary>
 Transition to the init script domain
 for all labeled init script types
@@ -117233,7 +117868,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_get_script_status" lineno="2089">
+<interface name="init_get_script_status" lineno="2128">
 <summary>
 Allow getting service status of initrc_exec_t scripts
 </summary>
@@ -117243,7 +117878,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_service" lineno="2129">
+<interface name="init_startstop_service" lineno="2168">
 <summary>
 Allow the role to start and stop
 labeled services.
@@ -117274,7 +117909,7 @@ Systemd unit file type.
 </summary>
 </param>
 </interface>
-<interface name="init_run_daemon" lineno="2185">
+<interface name="init_run_daemon" lineno="2224">
 <summary>
 Start and stop daemon programs directly.
 </summary>
@@ -117296,7 +117931,7 @@ The role to be performing this action.
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_all_script_services" lineno="2207">
+<interface name="init_startstop_all_script_services" lineno="2246">
 <summary>
 Start and stop init_script_file_type services
 </summary>
@@ -117306,7 +117941,7 @@ domain that can start and stop the services
 </summary>
 </param>
 </interface>
-<interface name="init_read_state" lineno="2226">
+<interface name="init_read_state" lineno="2265">
 <summary>
 Read the process state (/proc/pid) of init.
 </summary>
@@ -117316,7 +117951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_state" lineno="2246">
+<interface name="init_dontaudit_read_state" lineno="2285">
 <summary>
 Dontaudit read the process state (/proc/pid) of init.
 </summary>
@@ -117326,7 +117961,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_ptrace" lineno="2267">
+<interface name="init_ptrace" lineno="2306">
 <summary>
 Ptrace init
 </summary>
@@ -117337,7 +117972,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_getattr" lineno="2286">
+<interface name="init_getattr" lineno="2325">
 <summary>
 get init process stats
 </summary>
@@ -117348,7 +117983,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_read_script_pipes" lineno="2304">
+<interface name="init_read_script_pipes" lineno="2343">
 <summary>
 Read an init script unnamed pipe.
 </summary>
@@ -117358,7 +117993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_script_pipes" lineno="2322">
+<interface name="init_write_script_pipes" lineno="2361">
 <summary>
 Write an init script unnamed pipe.
 </summary>
@@ -117368,7 +118003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_files" lineno="2340">
+<interface name="init_getattr_script_files" lineno="2379">
 <summary>
 Get the attribute of init script entrypoint files.
 </summary>
@@ -117378,7 +118013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_files" lineno="2359">
+<interface name="init_read_script_files" lineno="2398">
 <summary>
 Read init scripts.
 </summary>
@@ -117388,7 +118023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_script_files" lineno="2378">
+<interface name="init_exec_script_files" lineno="2417">
 <summary>
 Execute init scripts in the caller domain.
 </summary>
@@ -117398,7 +118033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_all_script_files" lineno="2397">
+<interface name="init_getattr_all_script_files" lineno="2436">
 <summary>
 Get the attribute of all init script entrypoint files.
 </summary>
@@ -117408,7 +118043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_all_script_files" lineno="2416">
+<interface name="init_read_all_script_files" lineno="2455">
 <summary>
 Read all init script files.
 </summary>
@@ -117418,7 +118053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2440">
+<interface name="init_dontaudit_read_all_script_files" lineno="2479">
 <summary>
 Dontaudit read all init script files.
 </summary>
@@ -117428,7 +118063,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_all_script_files" lineno="2458">
+<interface name="init_exec_all_script_files" lineno="2497">
 <summary>
 Execute all init scripts in the caller domain.
 </summary>
@@ -117438,7 +118073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_state" lineno="2477">
+<interface name="init_read_script_state" lineno="2516">
 <summary>
 Read the process state (/proc/pid) of the init scripts.
 </summary>
@@ -117448,7 +118083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_fds" lineno="2496">
+<interface name="init_use_script_fds" lineno="2535">
 <summary>
 Inherit and use init script file descriptors.
 </summary>
@@ -117458,7 +118093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2515">
+<interface name="init_dontaudit_use_script_fds" lineno="2554">
 <summary>
 Do not audit attempts to inherit
 init script file descriptors.
@@ -117469,7 +118104,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_script_keys" lineno="2533">
+<interface name="init_search_script_keys" lineno="2572">
 <summary>
 Search init script keys.
 </summary>
@@ -117479,7 +118114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid_script" lineno="2551">
+<interface name="init_getpgid_script" lineno="2590">
 <summary>
 Get the process group ID of init scripts.
 </summary>
@@ -117489,7 +118124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld_script" lineno="2569">
+<interface name="init_sigchld_script" lineno="2608">
 <summary>
 Send SIGCHLD signals to init scripts.
 </summary>
@@ -117499,7 +118134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal_script" lineno="2587">
+<interface name="init_signal_script" lineno="2626">
 <summary>
 Send generic signals to init scripts.
 </summary>
@@ -117509,7 +118144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull_script" lineno="2605">
+<interface name="init_signull_script" lineno="2644">
 <summary>
 Send null signals to init scripts.
 </summary>
@@ -117519,7 +118154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_pipes" lineno="2623">
+<interface name="init_rw_script_pipes" lineno="2662">
 <summary>
 Read and write init script unnamed pipes.
 </summary>
@@ -117529,7 +118164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect_script" lineno="2642">
+<interface name="init_stream_connect_script" lineno="2681">
 <summary>
 Allow the specified domain to connect to
 init scripts with a unix socket.
@@ -117540,7 +118175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_stream_sockets" lineno="2661">
+<interface name="init_rw_script_stream_sockets" lineno="2700">
 <summary>
 Allow the specified domain to read/write to
 init scripts with a unix domain stream sockets.
@@ -117551,7 +118186,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2680">
+<interface name="init_dontaudit_stream_connect_script" lineno="2719">
 <summary>
 Dont audit the specified domain connecting to
 init scripts with a unix domain stream socket.
@@ -117562,7 +118197,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_send_script" lineno="2697">
+<interface name="init_dbus_send_script" lineno="2736">
 <summary>
 Send messages to init scripts over dbus.
 </summary>
@@ -117572,7 +118207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat_script" lineno="2717">
+<interface name="init_dbus_chat_script" lineno="2756">
 <summary>
 Send and receive messages from
 init scripts over dbus.
@@ -117583,7 +118218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_ptys" lineno="2746">
+<interface name="init_use_script_ptys" lineno="2785">
 <summary>
 Read and write the init script pty.
 </summary>
@@ -117602,7 +118237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_inherited_script_ptys" lineno="2765">
+<interface name="init_use_inherited_script_ptys" lineno="2804">
 <summary>
 Read and write inherited init script ptys.
 </summary>
@@ -117612,7 +118247,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2787">
+<interface name="init_dontaudit_use_script_ptys" lineno="2826">
 <summary>
 Do not audit attempts to read and
 write the init script pty.
@@ -117623,7 +118258,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_status_files" lineno="2806">
+<interface name="init_getattr_script_status_files" lineno="2845">
 <summary>
 Get the attributes of init script
 status files.
@@ -117634,7 +118269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2825">
+<interface name="init_dontaudit_read_script_status_files" lineno="2864">
 <summary>
 Do not audit attempts to read init script
 status files.
@@ -117645,7 +118280,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_run" lineno="2844">
+<interface name="init_search_run" lineno="2883">
 <summary>
 Search the /run/systemd directory.
 </summary>
@@ -117655,7 +118290,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_tmp_files" lineno="2863">
+<interface name="init_read_script_tmp_files" lineno="2902">
 <summary>
 Read init script temporary data.
 </summary>
@@ -117665,7 +118300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2882">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2921">
 <summary>
 Read and write init script inherited temporary data.
 </summary>
@@ -117675,7 +118310,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_tmp_files" lineno="2900">
+<interface name="init_rw_script_tmp_files" lineno="2939">
 <summary>
 Read and write init script temporary data.
 </summary>
@@ -117685,7 +118320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_script_tmp_filetrans" lineno="2935">
+<interface name="init_script_tmp_filetrans" lineno="2974">
 <summary>
 Create files in a init script
 temporary data directory.
@@ -117711,7 +118346,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_utmp" lineno="2954">
+<interface name="init_getattr_utmp" lineno="2993">
 <summary>
 Get the attributes of init script process id files.
 </summary>
@@ -117721,7 +118356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_utmp" lineno="2972">
+<interface name="init_read_utmp" lineno="3011">
 <summary>
 Read utmp.
 </summary>
@@ -117731,7 +118366,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_write_utmp" lineno="2991">
+<interface name="init_dontaudit_write_utmp" lineno="3030">
 <summary>
 Do not audit attempts to write utmp.
 </summary>
@@ -117741,7 +118376,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_utmp" lineno="3009">
+<interface name="init_write_utmp" lineno="3048">
 <summary>
 Write to utmp.
 </summary>
@@ -117751,7 +118386,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_lock_utmp" lineno="3029">
+<interface name="init_dontaudit_lock_utmp" lineno="3068">
 <summary>
 Do not audit attempts to lock
 init script pid files.
@@ -117762,7 +118397,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_utmp" lineno="3047">
+<interface name="init_rw_utmp" lineno="3086">
 <summary>
 Read and write utmp.
 </summary>
@@ -117772,7 +118407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_utmp" lineno="3066">
+<interface name="init_dontaudit_rw_utmp" lineno="3105">
 <summary>
 Do not audit attempts to read and write utmp.
 </summary>
@@ -117782,7 +118417,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_utmp" lineno="3084">
+<interface name="init_manage_utmp" lineno="3123">
 <summary>
 Create, read, write, and delete utmp.
 </summary>
@@ -117792,7 +118427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_watch_utmp" lineno="3103">
+<interface name="init_watch_utmp" lineno="3142">
 <summary>
 Add a watch on utmp.
 </summary>
@@ -117802,7 +118437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_utmp" lineno="3121">
+<interface name="init_relabel_utmp" lineno="3160">
 <summary>
 Relabel utmp.
 </summary>
@@ -117812,7 +118447,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_runtime_filetrans_utmp" lineno="3140">
+<interface name="init_runtime_filetrans_utmp" lineno="3179">
 <summary>
 Create files in /var/run with the
 utmp file type.
@@ -117823,7 +118458,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_runtime_dirs" lineno="3158">
+<interface name="init_create_runtime_dirs" lineno="3197">
 <summary>
 Create a directory in the /run/systemd directory.
 </summary>
@@ -117833,7 +118468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_files" lineno="3177">
+<interface name="init_read_runtime_files" lineno="3216">
 <summary>
 Read init_runtime_t files
 </summary>
@@ -117843,7 +118478,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_rename_runtime_files" lineno="3195">
+<interface name="init_rename_runtime_files" lineno="3234">
 <summary>
 Rename init_runtime_t files
 </summary>
@@ -117853,7 +118488,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_setattr_runtime_files" lineno="3213">
+<interface name="init_setattr_runtime_files" lineno="3252">
 <summary>
 Setattr init_runtime_t files
 </summary>
@@ -117863,7 +118498,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_delete_runtime_files" lineno="3231">
+<interface name="init_delete_runtime_files" lineno="3270">
 <summary>
 Delete init_runtime_t files
 </summary>
@@ -117873,7 +118508,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_write_runtime_socket" lineno="3250">
+<interface name="init_write_runtime_socket" lineno="3289">
 <summary>
 Allow the specified domain to write to
 init sock file.
@@ -117884,7 +118519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_pipes" lineno="3268">
+<interface name="init_read_runtime_pipes" lineno="3307">
 <summary>
 Read init unnamed pipes.
 </summary>
@@ -117894,7 +118529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_symlinks" lineno="3286">
+<interface name="init_read_runtime_symlinks" lineno="3325">
 <summary>
 read systemd unit symlinks (usually under /run/systemd/units/)
 </summary>
@@ -117904,7 +118539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3304">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3343">
 <summary>
 Allow the specified domain to connect to daemon with a tcp socket
 </summary>
@@ -117914,7 +118549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3322">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3361">
 <summary>
 Allow the specified domain to connect to daemon with a udp socket
 </summary>
@@ -117924,7 +118559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_status_files" lineno="3341">
+<interface name="init_read_script_status_files" lineno="3380">
 <summary>
 Allow reading the init script state files
 </summary>
@@ -117934,7 +118569,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_relabelto_script_state" lineno="3359">
+<interface name="init_relabelto_script_state" lineno="3398">
 <summary>
 Label to init script status files
 </summary>
@@ -117944,7 +118579,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_script_readable_type" lineno="3378">
+<interface name="init_script_readable_type" lineno="3417">
 <summary>
 Mark as a readable type for the initrc_t domain
 </summary>
@@ -117954,7 +118589,7 @@ Type that initrc_t needs read access to
 </summary>
 </param>
 </interface>
-<interface name="init_search_units" lineno="3396">
+<interface name="init_search_units" lineno="3435">
 <summary>
 Search systemd unit dirs.
 </summary>
@@ -117964,7 +118599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_unit_dirs" lineno="3421">
+<interface name="init_list_unit_dirs" lineno="3460">
 <summary>
 List systemd unit dirs.
 </summary>
@@ -117974,7 +118609,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_generic_units_files" lineno="3441">
+<interface name="init_getattr_generic_units_files" lineno="3480">
+<summary>
+Get the attributes of systemd unit files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_read_generic_units_files" lineno="3498">
 <summary>
 Read systemd unit files
 </summary>
@@ -117984,7 +118629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_generic_units_symlinks" lineno="3459">
+<interface name="init_read_generic_units_symlinks" lineno="3516">
 <summary>
 Read systemd unit links
 </summary>
@@ -117994,7 +118639,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_generic_units_status" lineno="3477">
+<interface name="init_get_generic_units_status" lineno="3534">
 <summary>
 Get status of generic systemd units.
 </summary>
@@ -118004,7 +118649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_generic_units" lineno="3496">
+<interface name="init_start_generic_units" lineno="3553">
 <summary>
 Start generic systemd units.
 </summary>
@@ -118014,7 +118659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_generic_units" lineno="3515">
+<interface name="init_stop_generic_units" lineno="3572">
 <summary>
 Stop generic systemd units.
 </summary>
@@ -118024,7 +118669,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_generic_units" lineno="3534">
+<interface name="init_reload_generic_units" lineno="3591">
 <summary>
 Reload generic systemd units.
 </summary>
@@ -118034,7 +118679,47 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_all_units_status" lineno="3553">
+<interface name="init_get_transient_units_status" lineno="3610">
+<summary>
+Get status of transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_transient_units" lineno="3629">
+<summary>
+Start transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_stop_transient_units" lineno="3648">
+<summary>
+Stop transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="init_reload_transient_units" lineno="3667">
+<summary>
+Reload transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_get_all_units_status" lineno="3687">
 <summary>
 Get status of all systemd units.
 </summary>
@@ -118044,7 +118729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_all_units" lineno="3572">
+<interface name="init_manage_all_units" lineno="3706">
 <summary>
 All perms on all systemd units.
 </summary>
@@ -118054,7 +118739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_all_units" lineno="3592">
+<interface name="init_start_all_units" lineno="3726">
 <summary>
 Start all systemd units.
 </summary>
@@ -118064,7 +118749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_all_units" lineno="3611">
+<interface name="init_stop_all_units" lineno="3745">
 <summary>
 Stop all systemd units.
 </summary>
@@ -118074,7 +118759,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_all_units" lineno="3630">
+<interface name="init_reload_all_units" lineno="3764">
 <summary>
 Reload all systemd units.
 </summary>
@@ -118084,7 +118769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_all_unit_files" lineno="3649">
+<interface name="init_manage_all_unit_files" lineno="3783">
 <summary>
 Manage systemd unit dirs and the files in them
 </summary>
@@ -118094,7 +118779,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_linkable_keyring" lineno="3670">
+<interface name="init_linkable_keyring" lineno="3804">
 <summary>
 Associate the specified domain to be a domain whose
 keyring init should be allowed to link.
@@ -118105,7 +118790,7 @@ Domain whose keyring init should be allowed to link.
 </summary>
 </param>
 </interface>
-<interface name="init_admin" lineno="3688">
+<interface name="init_admin" lineno="3822">
 <summary>
 Allow unconfined access to send instructions to init
 </summary>
@@ -118115,7 +118800,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_getrlimit" lineno="3720">
+<interface name="init_getrlimit" lineno="3854">
 <summary>
 Allow getting init_t rlimit
 </summary>
@@ -118412,7 +119097,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="iptables_run" lineno="43">
+<interface name="iptables_run" lineno="41">
 <summary>
 Execute iptables in the iptables domain, and
 allow the specified role the iptables domain.
@@ -118429,7 +119114,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="iptables_exec" lineno="62">
+<interface name="iptables_exec" lineno="60">
 <summary>
 Execute iptables in the caller domain.
 </summary>
@@ -118439,7 +119124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_initrc_domtrans" lineno="82">
+<interface name="iptables_initrc_domtrans" lineno="80">
 <summary>
 Execute iptables init scripts in
 the init script domain.
@@ -118450,7 +119135,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="iptables_setattr_config" lineno="100">
+<interface name="iptables_setattr_config" lineno="98">
 <summary>
 Set the attributes of iptables config files.
 </summary>
@@ -118460,7 +119145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_read_config" lineno="119">
+<interface name="iptables_read_config" lineno="117">
 <summary>
 Read iptables config files.
 </summary>
@@ -118470,7 +119155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_etc_filetrans_config" lineno="140">
+<interface name="iptables_etc_filetrans_config" lineno="138">
 <summary>
 Create files in /etc with the type used for
 the iptables config files.
@@ -118481,7 +119166,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_manage_config" lineno="158">
+<interface name="iptables_manage_config" lineno="156">
 <summary>
 Manage iptables config files.
 </summary>
@@ -118491,7 +119176,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_dontaudit_read_pids" lineno="177">
+<interface name="iptables_dontaudit_read_pids" lineno="175">
 <summary>
 dontaudit reading iptables_runtime_t  (Deprecated)
 </summary>
@@ -118501,7 +119186,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
+<interface name="iptables_dontaudit_read_runtime_files" lineno="190">
 <summary>
 Do not audit reading iptables runtime files.
 </summary>
@@ -118511,7 +119196,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="iptables_startstop" lineno="210">
+<interface name="iptables_startstop" lineno="208">
 <summary>
 Allow specified domain to start and stop iptables service
 </summary>
@@ -118521,7 +119206,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_status" lineno="229">
+<interface name="iptables_status" lineno="227">
 <summary>
 Allow specified domain to get status of iptables service
 </summary>
@@ -118531,7 +119216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_admin" lineno="256">
+<interface name="iptables_admin" lineno="254">
 <summary>
 All of the rules required to
 administrate an iptables
@@ -118743,7 +119428,24 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_lib_dirs" lineno="246">
+<interface name="libs_dontaudit_manage_lib_dirs" lineno="253">
+<summary>
+Do not audit attempts to manage to library directories.
+</summary>
+<desc>
+<p>
+Do not audit attempts to manage to library directories.
+Typically this is used to quiet attempts to recompile
+python byte code.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="libs_manage_lib_dirs" lineno="271">
 <summary>
 Create, read, write, and delete library directories.
 </summary>
@@ -118753,7 +119455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_dontaudit_setattr_lib_files" lineno="264">
+<interface name="libs_dontaudit_setattr_lib_files" lineno="289">
 <summary>
 dontaudit attempts to setattr on library files
 </summary>
@@ -118763,7 +119465,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="libs_read_lib_files" lineno="283">
+<interface name="libs_read_lib_files" lineno="308">
 <summary>
 Read files in the library directories, such
 as static libraries.
@@ -118774,7 +119476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_exec_lib_files" lineno="304">
+<interface name="libs_exec_lib_files" lineno="329">
 <summary>
 Execute library scripts in the caller domain.
 </summary>
@@ -118784,7 +119486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_lib_files" lineno="327">
+<interface name="libs_manage_lib_files" lineno="352">
 <summary>
 Create, read, write, and delete generic
 files in library directories.
@@ -118795,7 +119497,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabelto_lib_files" lineno="345">
+<interface name="libs_dontaudit_manage_lib_files" lineno="371">
+<summary>
+Do not audit attempts to create, read, write,
+and delete generic files in library directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="libs_relabelto_lib_files" lineno="389">
 <summary>
 Relabel files to the type used in library directories.
 </summary>
@@ -118805,7 +119518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_lib_files" lineno="365">
+<interface name="libs_relabel_lib_files" lineno="409">
 <summary>
 Relabel to and from the type used
 for generic lib files.
@@ -118816,7 +119529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_delete_lib_symlinks" lineno="384">
+<interface name="libs_delete_lib_symlinks" lineno="428">
 <summary>
 Delete generic symlinks in library directories.
 </summary>
@@ -118826,7 +119539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_lib_symlinks" lineno="402">
+<interface name="libs_manage_lib_symlinks" lineno="446">
 <summary>
 Manage generic symlinks in library directories.
 </summary>
@@ -118836,7 +119549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_shared_libs" lineno="421">
+<interface name="libs_manage_shared_libs" lineno="465">
 <summary>
 Create, read, write, and delete shared libraries.
 </summary>
@@ -118846,7 +119559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_use_shared_libs" lineno="439">
+<interface name="libs_use_shared_libs" lineno="483">
 <summary>
 Load and execute functions from shared libraries.
 </summary>
@@ -118856,7 +119569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_legacy_use_shared_libs" lineno="462">
+<interface name="libs_legacy_use_shared_libs" lineno="506">
 <summary>
 Load and execute functions from shared libraries,
 with legacy support.
@@ -118867,7 +119580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_shared_libs" lineno="483">
+<interface name="libs_relabel_shared_libs" lineno="527">
 <summary>
 Relabel to and from the type used for
 shared libraries.
@@ -118878,7 +119591,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="516">
+<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560">
 <summary>
 Create an object in etc with a type transition to
 the ld_so_cache_t type
@@ -118901,7 +119614,7 @@ Name of the resource created for which a type transition occurs
 </summary>
 </param>
 </interface>
-<interface name="libs_lib_filetrans" lineno="550">
+<interface name="libs_lib_filetrans" lineno="594">
 <summary>
 Create an object in the generic lib location with a type transition
 to the provided type
@@ -118927,7 +119640,7 @@ Name of the resource created for which a type transition should occur
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_lib_dirs" lineno="571">
+<interface name="libs_relabel_lib_dirs" lineno="615">
 <summary>
 Relabel to and from the type used
 for generic lib directories.
@@ -122118,7 +122831,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="627">
+<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627">
+<summary>
+Create, read, write, and delete dhcp client runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_domtrans_ifconfig" lineno="645">
 <summary>
 Execute ifconfig in the ifconfig domain.
 </summary>
@@ -122128,7 +122851,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_run_ifconfig" lineno="654">
+<interface name="sysnet_run_ifconfig" lineno="672">
 <summary>
 Execute ifconfig in the ifconfig domain, and
 allow the specified role the ifconfig domain,
@@ -122146,7 +122869,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_exec_ifconfig" lineno="674">
+<interface name="sysnet_exec_ifconfig" lineno="692">
 <summary>
 Execute ifconfig in the caller domain.
 </summary>
@@ -122156,7 +122879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_signal_ifconfig" lineno="694">
+<interface name="sysnet_signal_ifconfig" lineno="712">
 <summary>
 Send a generic signal to ifconfig.
 </summary>
@@ -122167,7 +122890,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_signull_ifconfig" lineno="713">
+<interface name="sysnet_signull_ifconfig" lineno="731">
 <summary>
 Send null signals to ifconfig.
 </summary>
@@ -122178,7 +122901,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_create_netns_dirs" lineno="732">
+<interface name="sysnet_create_netns_dirs" lineno="750">
 <summary>
 Create the /run/netns directory with
 an automatic type transition.
@@ -122189,7 +122912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_netns_filetrans" lineno="766">
+<interface name="sysnet_netns_filetrans" lineno="784">
 <summary>
 Create an object in the /run/netns
 directory with a private type.
@@ -122215,7 +122938,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_read_dhcp_config" lineno="787">
+<interface name="sysnet_read_dhcp_config" lineno="805">
 <summary>
 Read the DHCP configuration files.
 </summary>
@@ -122225,7 +122948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_search_dhcp_state" lineno="807">
+<interface name="sysnet_search_dhcp_state" lineno="825">
 <summary>
 Search the DHCP state data directory.
 </summary>
@@ -122235,7 +122958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="851">
+<interface name="sysnet_dhcp_state_filetrans" lineno="869">
 <summary>
 Create DHCP state data.
 </summary>
@@ -122270,7 +122993,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dns_name_resolve" lineno="871">
+<interface name="sysnet_dns_name_resolve" lineno="889">
 <summary>
 Perform a DNS name resolution.
 </summary>
@@ -122281,7 +123004,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_use_ldap" lineno="921">
+<interface name="sysnet_use_ldap" lineno="940">
 <summary>
 Connect and use a LDAP server.
 </summary>
@@ -122291,7 +123014,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_use_portmap" lineno="948">
+<interface name="sysnet_use_portmap" lineno="967">
 <summary>
 Connect and use remote port mappers.
 </summary>
@@ -122301,7 +123024,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="982">
+<interface name="sysnet_dhcpc_script_entry" lineno="1001">
 <summary>
 Make the specified program domain
 accessable from the DHCP hooks/scripts.
@@ -122353,7 +123076,7 @@ The type for the user pty
 </summary>
 </param>
 </template>
-<template name="systemd_user_daemon_domain" lineno="205">
+<template name="systemd_user_daemon_domain" lineno="221">
 <summary>
 Allow the specified domain to be started as a daemon by the
 specified systemd user instance.
@@ -122374,7 +123097,7 @@ Domain to allow the systemd user domain to run.
 </summary>
 </param>
 </template>
-<interface name="systemd_user_activated_sock_file" lineno="226">
+<interface name="systemd_user_activated_sock_file" lineno="242">
 <summary>
 Associate the specified file type to be a type whose sock files
 can be managed by systemd user instances for socket activation.
@@ -122385,7 +123108,7 @@ File type to be associated.
 </summary>
 </param>
 </interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="251">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="267">
 <summary>
 Associate the specified domain to be a domain whose unix stream
 sockets and sock files can be managed by systemd user instances
@@ -122402,7 +123125,7 @@ File type of the domain's sock files to be associated.
 </summary>
 </param>
 </interface>
-<template name="systemd_user_send_systemd_notify" lineno="277">
+<template name="systemd_user_send_systemd_notify" lineno="293">
 <summary>
 Allow the target domain the permissions necessary
 to use systemd notify when started by the specified
@@ -122419,7 +123142,7 @@ Domain to be allowed systemd notify permissions.
 </summary>
 </param>
 </template>
-<template name="systemd_user_app_status" lineno="305">
+<template name="systemd_user_app_status" lineno="321">
 <summary>
 Allow the target domain to be monitored and have its output
 captured by the specified systemd user instance domain.
@@ -122435,7 +123158,7 @@ Domain to allow the systemd user instance to monitor.
 </summary>
 </param>
 </template>
-<template name="systemd_read_user_manager_state" lineno="345">
+<template name="systemd_read_user_manager_state" lineno="361">
 <summary>
 Read the process state (/proc/pid) of
 the specified systemd user instance.
@@ -122451,7 +123174,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_start" lineno="369">
+<template name="systemd_user_manager_system_start" lineno="385">
 <summary>
 Send a start request to the specified
 systemd user instance system object.
@@ -122467,7 +123190,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_stop" lineno="393">
+<template name="systemd_user_manager_system_stop" lineno="409">
 <summary>
 Send a stop request to the specified
 systemd user instance system object.
@@ -122483,7 +123206,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_status" lineno="417">
+<template name="systemd_user_manager_system_status" lineno="433">
 <summary>
 Get the status of the specified
 systemd user instance system object.
@@ -122499,7 +123222,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_dbus_chat" lineno="441">
+<template name="systemd_user_manager_dbus_chat" lineno="457">
 <summary>
 Send and receive messages from the
 specified systemd user instance over dbus.
@@ -122515,7 +123238,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="systemd_search_conf_home_content" lineno="462">
+<interface name="systemd_search_conf_home_content" lineno="478">
 <summary>
 Allow the specified domain to search systemd config home
 content.
@@ -122526,7 +123249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_conf_home_content" lineno="481">
+<interface name="systemd_manage_conf_home_content" lineno="497">
 <summary>
 Allow the specified domain to manage systemd config home
 content.
@@ -122537,7 +123260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_conf_home_content" lineno="502">
+<interface name="systemd_relabel_conf_home_content" lineno="518">
 <summary>
 Allow the specified domain to relabel systemd config home
 content.
@@ -122548,7 +123271,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_data_home_content" lineno="523">
+<interface name="systemd_search_data_home_content" lineno="539">
 <summary>
 Allow the specified domain to search systemd data home
 content.
@@ -122559,7 +123282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_data_home_content" lineno="542">
+<interface name="systemd_manage_data_home_content" lineno="558">
 <summary>
 Allow the specified domain to manage systemd data home
 content.
@@ -122570,7 +123293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_data_home_content" lineno="563">
+<interface name="systemd_relabel_data_home_content" lineno="579">
 <summary>
 Allow the specified domain to relabel systemd data home
 content.
@@ -122581,7 +123304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime" lineno="584">
+<interface name="systemd_search_user_runtime" lineno="600">
 <summary>
 Allow the specified domain to search systemd user runtime
 content.
@@ -122592,7 +123315,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_files" lineno="602">
+<interface name="systemd_read_user_runtime_files" lineno="618">
 <summary>
 Allow the specified domain to read systemd user runtime files.
 </summary>
@@ -122602,7 +123325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="620">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="636">
 <summary>
 Allow the specified domain to read systemd user runtime lnk files.
 </summary>
@@ -122612,7 +123335,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_user_runtime_socket" lineno="639">
+<interface name="systemd_write_user_runtime_socket" lineno="655">
 <summary>
 Allow the specified domain to write to
 the systemd user runtime named socket.
@@ -122623,7 +123346,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_unit_files" lineno="658">
+<interface name="systemd_read_user_unit_files" lineno="674">
+<summary>
+Allow the specified domain to read system-wide systemd
+user unit files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_user_units_files" lineno="690">
 <summary>
 Allow the specified domain to read system-wide systemd
 user unit files.
@@ -122634,7 +123368,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_units" lineno="678">
+<interface name="systemd_read_user_runtime_units" lineno="710">
+<summary>
+Allow the specified domain to read systemd user runtime unit files.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_user_runtime_units_files" lineno="725">
 <summary>
 Allow the specified domain to read systemd user runtime unit files.
 </summary>
@@ -122644,7 +123388,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="698">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="745">
 <summary>
 Allow the specified domain to search systemd user runtime unit
 directories.
@@ -122655,7 +123399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="717">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="764">
 <summary>
 Allow the specified domain to list the contents of systemd
 user runtime unit directories.
@@ -122666,7 +123410,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_user_runtime_units" lineno="735">
+<interface name="systemd_status_user_runtime_units" lineno="782">
+<summary>
+Allow the specified domain to get the status of systemd user runtime units.  (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_get_user_runtime_units_status" lineno="797">
 <summary>
 Allow the specified domain to get the status of systemd user runtime units.
 </summary>
@@ -122676,7 +123430,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_runtime_units" lineno="754">
+<interface name="systemd_start_user_runtime_units" lineno="816">
 <summary>
 Allow the specified domain to start systemd user runtime units.
 </summary>
@@ -122686,7 +123440,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_runtime_units" lineno="773">
+<interface name="systemd_stop_user_runtime_units" lineno="835">
 <summary>
 Allow the specified domain to stop systemd user runtime units.
 </summary>
@@ -122696,7 +123450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_runtime_units" lineno="792">
+<interface name="systemd_reload_user_runtime_units" lineno="854">
 <summary>
 Allow the specified domain to reload systemd user runtime units.
 </summary>
@@ -122706,7 +123460,79 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_log_parse_environment" lineno="812">
+<interface name="systemd_read_user_transient_units_files" lineno="873">
+<summary>
+Allow the specified domain to read systemd user transient unit files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_search_user_transient_unit_dirs" lineno="893">
+<summary>
+Allow the specified domain to search systemd user transient unit
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_list_user_transient_unit_dirs" lineno="912">
+<summary>
+Allow the specified domain to list the contents of systemd
+user transient unit directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_get_user_transient_units_status" lineno="930">
+<summary>
+Allow the specified domain to get the status of systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_start_user_transient_units" lineno="949">
+<summary>
+Allow the specified domain to start systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_stop_user_transient_units" lineno="968">
+<summary>
+Allow the specified domain to stop systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_reload_user_transient_units" lineno="987">
+<summary>
+Allow the specified domain to reload systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_log_parse_environment" lineno="1007">
 <summary>
 Make the specified type usable as an
 log parse environment type.
@@ -122717,7 +123543,7 @@ Type to be used as a log parse environment type.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_nss" lineno="832">
+<interface name="systemd_use_nss" lineno="1027">
 <summary>
 Allow domain to use systemd's Name Service Switch (NSS) module.
 This module provides UNIX user and group name resolution for dynamic users
@@ -122729,7 +123555,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_PrivateDevices" lineno="859">
+<interface name="systemd_PrivateDevices" lineno="1054">
 <summary>
 Allow domain to be used as a systemd service with a unit
 that uses PrivateDevices=yes in section [Service].
@@ -122740,7 +123566,17 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_hwdb" lineno="876">
+<interface name="systemd_rw_homework_semaphores" lineno="1071">
+<summary>
+Read and write systemd-homework semaphores.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_hwdb" lineno="1089">
 <summary>
 Allow domain to read udev hwdb file
 </summary>
@@ -122750,7 +123586,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_map_hwdb" lineno="894">
+<interface name="systemd_map_hwdb" lineno="1107">
 <summary>
 Allow domain to map udev hwdb file
 </summary>
@@ -122760,7 +123596,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_pids" lineno="912">
+<interface name="systemd_read_logind_pids" lineno="1125">
 <summary>
 Read systemd_login PID files.  (Deprecated)
 </summary>
@@ -122770,7 +123606,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="927">
+<interface name="systemd_manage_logind_pid_pipes" lineno="1140">
 <summary>
 Manage systemd_login PID pipes.  (Deprecated)
 </summary>
@@ -122780,7 +123616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="942">
+<interface name="systemd_write_logind_pid_pipes" lineno="1155">
 <summary>
 Write systemd_login named pipe.  (Deprecated)
 </summary>
@@ -122790,7 +123626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="957">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1170">
 <summary>
 Watch systemd-logind runtime dirs.
 </summary>
@@ -122800,7 +123636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_runtime_files" lineno="976">
+<interface name="systemd_read_logind_runtime_files" lineno="1189">
 <summary>
 Read systemd-logind runtime files.
 </summary>
@@ -122810,7 +123646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="996">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1209">
 <summary>
 Manage systemd-logind runtime pipes.
 </summary>
@@ -122820,7 +123656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1015">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1228">
 <summary>
 Write systemd-logind runtime named pipe.
 </summary>
@@ -122830,7 +123666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_logind_fds" lineno="1036">
+<interface name="systemd_use_logind_fds" lineno="1249">
 <summary>
 Use inherited systemd
 logind file descriptors.
@@ -122841,7 +123677,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1054">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1267">
 <summary>
 Watch logind sessions dirs.
 </summary>
@@ -122851,7 +123687,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1073">
+<interface name="systemd_read_logind_sessions_files" lineno="1286">
 <summary>
 Read logind sessions files.
 </summary>
@@ -122861,7 +123697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1094">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307">
 <summary>
 Write inherited logind sessions pipes.
 </summary>
@@ -122871,7 +123707,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1114">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327">
 <summary>
 Write inherited logind inhibit pipes.
 </summary>
@@ -122881,7 +123717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_logind" lineno="1135">
+<interface name="systemd_dbus_chat_logind" lineno="1348">
 <summary>
 Send and receive messages from
 systemd logind over dbus.
@@ -122892,7 +123728,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_logind" lineno="1155">
+<interface name="systemd_status_logind" lineno="1368">
 <summary>
 Get the system status information from systemd_login
 </summary>
@@ -122902,7 +123738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_signull_logind" lineno="1174">
+<interface name="systemd_signull_logind" lineno="1387">
 <summary>
 Send systemd_login a null signal.
 </summary>
@@ -122912,7 +123748,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1192">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405">
 <summary>
 Manage systemd userdb runtime directories.
 </summary>
@@ -122922,7 +123758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1210">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423">
 <summary>
 Manage socket files under /run/systemd/userdb .
 </summary>
@@ -122932,7 +123768,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_userdb" lineno="1228">
+<interface name="systemd_stream_connect_userdb" lineno="1441">
 <summary>
 Connect to /run/systemd/userdb/io.systemd.DynamicUser .
 </summary>
@@ -122942,7 +123778,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_machines" lineno="1249">
+<interface name="systemd_read_machines" lineno="1463">
 <summary>
 Allow reading /run/systemd/machines
 </summary>
@@ -122952,7 +123788,7 @@ Domain that can access the machines files
 </summary>
 </param>
 </interface>
-<interface name="systemd_connect_machined" lineno="1268">
+<interface name="systemd_connect_machined" lineno="1482">
 <summary>
 Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
 </summary>
@@ -122962,7 +123798,7 @@ Domain that can access the socket
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_machined" lineno="1287">
+<interface name="systemd_dbus_chat_machined" lineno="1501">
 <summary>
 Send and receive messages from
 systemd machined over dbus.
@@ -122973,7 +123809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1308">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1522">
 <summary>
 Send and receive messages from
 systemd hostnamed over dbus.
@@ -122984,7 +123820,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1328">
+<interface name="systemd_use_passwd_agent_fds" lineno="1542">
 <summary>
 allow systemd_passwd_agent to inherit fds
 </summary>
@@ -122994,7 +123830,7 @@ Domain that owns the fds
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_passwd_agent" lineno="1351">
+<interface name="systemd_run_passwd_agent" lineno="1565">
 <summary>
 allow systemd_passwd_agent to be run by admin
 </summary>
@@ -123009,7 +123845,7 @@ role that it runs in
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent" lineno="1372">
+<interface name="systemd_use_passwd_agent" lineno="1586">
 <summary>
 Allow a systemd_passwd_agent_t process to interact with a daemon
 that needs a password from the sysadmin.
@@ -123020,7 +123856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1396">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610">
 <summary>
 Transition to systemd_passwd_runtime_t when creating dirs
 </summary>
@@ -123030,9 +123866,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1417">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631">
 <summary>
-Transition to systemd_userdb_runtime_t when
+Transition to systemd_userdbd_runtime_t when
 creating the userdb directory inside an init runtime
 directory.
 </summary>
@@ -123042,7 +123878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1435">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649">
 <summary>
 Allow to domain to create systemd-passwd symlink
 </summary>
@@ -123052,7 +123888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1453">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667">
 <summary>
 Allow a domain to watch systemd-passwd runtime dirs.
 </summary>
@@ -123062,7 +123898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_all_units" lineno="1471">
+<interface name="systemd_manage_all_units" lineno="1685">
 <summary>
 manage systemd unit dirs and the files in them  (Deprecated)
 </summary>
@@ -123072,7 +123908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_journal_dirs" lineno="1486">
+<interface name="systemd_list_journal_dirs" lineno="1700">
 <summary>
 Allow domain to list the contents of systemd_journal_t dirs
 </summary>
@@ -123082,7 +123918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_journal_files" lineno="1504">
+<interface name="systemd_read_journal_files" lineno="1718">
 <summary>
 Allow domain to read systemd_journal_t files
 </summary>
@@ -123092,7 +123928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_journal_files" lineno="1523">
+<interface name="systemd_manage_journal_files" lineno="1737">
 <summary>
 Allow domain to create/manage systemd_journal_t files
 </summary>
@@ -123102,7 +123938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_journal_dirs" lineno="1543">
+<interface name="systemd_watch_journal_dirs" lineno="1757">
 <summary>
 Allow domain to add a watch on systemd_journal_t directories
 </summary>
@@ -123112,7 +123948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1561">
+<interface name="systemd_relabelto_journal_dirs" lineno="1775">
 <summary>
 Relabel to systemd-journald directory type.
 </summary>
@@ -123122,7 +123958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_files" lineno="1580">
+<interface name="systemd_relabelto_journal_files" lineno="1794">
 <summary>
 Relabel to systemd-journald file type.
 </summary>
@@ -123132,7 +123968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_units" lineno="1600">
+<interface name="systemd_read_networkd_units" lineno="1814">
 <summary>
 Allow domain to read systemd_networkd_t unit files
 </summary>
@@ -123142,7 +123978,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_networkd_units" lineno="1620">
+<interface name="systemd_manage_networkd_units" lineno="1834">
 <summary>
 Allow domain to create/manage systemd_networkd_t unit files
 </summary>
@@ -123152,7 +123988,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_enabledisable_networkd" lineno="1640">
+<interface name="systemd_enabledisable_networkd" lineno="1854">
 <summary>
 Allow specified domain to enable systemd-networkd units
 </summary>
@@ -123162,7 +123998,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_startstop_networkd" lineno="1659">
+<interface name="systemd_startstop_networkd" lineno="1873">
 <summary>
 Allow specified domain to start systemd-networkd units
 </summary>
@@ -123172,7 +124008,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1679">
+<interface name="systemd_dbus_chat_networkd" lineno="1893">
 <summary>
 Send and receive messages from
 systemd networkd over dbus.
@@ -123183,7 +124019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_networkd" lineno="1699">
+<interface name="systemd_status_networkd" lineno="1913">
 <summary>
 Allow specified domain to get status of systemd-networkd
 </summary>
@@ -123193,7 +124029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1718">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932">
 <summary>
 Relabel systemd_networkd tun socket.
 </summary>
@@ -123203,7 +124039,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1736">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950">
 <summary>
 Read/Write from systemd_networkd netlink route socket.
 </summary>
@@ -123213,7 +124049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_networkd_runtime" lineno="1754">
+<interface name="systemd_list_networkd_runtime" lineno="1968">
 <summary>
 Allow domain to list dirs under /run/systemd/netif
 </summary>
@@ -123223,7 +124059,7 @@ domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="1773">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987">
 <summary>
 Watch directories under /run/systemd/netif
 </summary>
@@ -123233,7 +124069,7 @@ Domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_runtime" lineno="1792">
+<interface name="systemd_read_networkd_runtime" lineno="2006">
 <summary>
 Allow domain to read files generated by systemd_networkd
 </summary>
@@ -123243,7 +124079,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_state" lineno="1811">
+<interface name="systemd_read_logind_state" lineno="2025">
 <summary>
 Allow systemd_logind_t to read process state for cgroup file
 </summary>
@@ -123253,7 +124089,19 @@ Domain systemd_logind_t may access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_manager_units" lineno="1831">
+<interface name="systemd_create_logind_linger_dir" lineno="2046">
+<summary>
+Allow the specified domain to create
+the systemd-logind linger directory with
+the correct context.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_start_user_manager_units" lineno="2066">
 <summary>
 Allow the specified domain to start systemd
 user manager units (systemd --user).
@@ -123264,7 +124112,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_manager_units" lineno="1851">
+<interface name="systemd_stop_user_manager_units" lineno="2086">
 <summary>
 Allow the specified domain to stop systemd
 user manager units (systemd --user).
@@ -123275,7 +124123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_manager_units" lineno="1871">
+<interface name="systemd_reload_user_manager_units" lineno="2106">
 <summary>
 Allow the specified domain to reload systemd
 user manager units (systemd --user).
@@ -123286,7 +124134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_user_manager_units" lineno="1891">
+<interface name="systemd_get_user_manager_units_status" lineno="2126">
 <summary>
 Get the status of systemd user manager
 units (systemd --user).
@@ -123297,7 +124145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_power_units" lineno="1910">
+<interface name="systemd_start_power_units" lineno="2145">
 <summary>
 Allow specified domain to start power units
 </summary>
@@ -123307,7 +124155,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_power_units" lineno="1929">
+<interface name="systemd_status_power_units" lineno="2164">
 <summary>
 Get the system status information about power units
 </summary>
@@ -123317,7 +124165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="1948">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2183">
 <summary>
 Allows connections to the systemd-socket-proxyd's socket.
 </summary>
@@ -123327,7 +124175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="1967">
+<interface name="systemd_tmpfiles_conf_file" lineno="2202">
 <summary>
 Make the specified type usable for
 systemd tmpfiles config files.
@@ -123338,7 +124186,7 @@ Type to be used for systemd tmpfiles config files.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_creator" lineno="1988">
+<interface name="systemd_tmpfiles_creator" lineno="2223">
 <summary>
 Allow the specified domain to create
 the tmpfiles config directory with
@@ -123350,7 +124198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2024">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259">
 <summary>
 Create an object in the systemd tmpfiles config
 directory, with a private type
@@ -123377,7 +124225,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2043">
+<interface name="systemd_list_tmpfiles_conf" lineno="2278">
 <summary>
 Allow domain to list systemd tmpfiles config directory
 </summary>
@@ -123387,7 +124235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2061">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296">
 <summary>
 Allow domain to relabel to systemd tmpfiles config directory
 </summary>
@@ -123397,7 +124245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2079">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314">
 <summary>
 Allow domain to relabel to systemd tmpfiles config files
 </summary>
@@ -123407,7 +124255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2097">
+<interface name="systemd_tmpfilesd_managed" lineno="2332">
 <summary>
 Allow systemd_tmpfiles_t to manage filesystem objects
 </summary>
@@ -123417,7 +124265,18 @@ Type of object to manage
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2124">
+<interface name="systemd_stream_connect_resolved" lineno="2359">
+<summary>
+Connect to systemd resolved over
+/run/systemd/resolve/io.systemd.Resolve .
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_dbus_chat_resolved" lineno="2380">
 <summary>
 Send and receive messages from
 systemd resolved over dbus.
@@ -123428,7 +124287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_resolved_runtime" lineno="2144">
+<interface name="systemd_read_resolved_runtime" lineno="2400">
 <summary>
 Allow domain to read resolv.conf file generated by systemd_resolved
 </summary>
@@ -123438,7 +124297,17 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2162">
+<interface name="systemd_exec_systemctl" lineno="2422">
+<summary>
+Execute the systemctl program.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_getattr_updated_runtime" lineno="2453">
 <summary>
 Allow domain to getattr on .updated file (generated by systemd-update-done
 </summary>
@@ -123448,7 +124317,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_all_user_keys" lineno="2180">
+<interface name="systemd_search_all_user_keys" lineno="2471">
 <summary>
 Search keys for the all systemd --user domains.
 </summary>
@@ -123458,7 +124327,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_all_user_keys" lineno="2198">
+<interface name="systemd_create_all_user_keys" lineno="2489">
 <summary>
 Create keys for the all systemd --user domains.
 </summary>
@@ -123468,7 +124337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_all_user_keys" lineno="2216">
+<interface name="systemd_write_all_user_keys" lineno="2507">
 <summary>
 Write keys for the all systemd --user domains.
 </summary>
@@ -123478,7 +124347,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_domtrans_sysusers" lineno="2235">
+<interface name="systemd_domtrans_sysusers" lineno="2526">
 <summary>
 Execute systemd-sysusers in the
 systemd sysusers domain.
@@ -123489,7 +124358,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_sysusers" lineno="2260">
+<interface name="systemd_run_sysusers" lineno="2551">
 <summary>
 Run systemd-sysusers with a domain transition.
 </summary>
@@ -123505,7 +124374,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2280">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2571">
 <summary>
 receive and use a systemd_machined_devpts_t file handle
 </summary>
@@ -123523,6 +124392,13 @@ Enable support for systemd-tmpfiles to manage all non-security files.
 </p>
 </desc>
 </tunable>
+<tunable name="systemd_networkd_dhcp_server" dftval="false">
+<desc>
+<p>
+Allow systemd-networkd to run its DHCPd server component
+</p>
+</desc>
+</tunable>
 <tunable name="systemd_nspawn_labeled_namespace" dftval="false">
 <desc>
 <p>
@@ -124675,7 +125551,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_login_user_template" lineno="954">
+<template name="userdom_login_user_template" lineno="958">
 <summary>
 The template for creating a login user.
 </summary>
@@ -124693,7 +125569,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_restricted_user_template" lineno="1077">
+<template name="userdom_restricted_user_template" lineno="1081">
 <summary>
 The template for creating a unprivileged login user.
 </summary>
@@ -124711,7 +125587,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1118">
+<template name="userdom_restricted_xwindows_user_template" lineno="1122">
 <summary>
 The template for creating a unprivileged xwindows login user.
 </summary>
@@ -124732,7 +125608,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_unpriv_user_template" lineno="1201">
+<template name="userdom_unpriv_user_template" lineno="1205">
 <summary>
 The template for creating a unprivileged user roughly
 equivalent to a regular linux user.
@@ -124755,7 +125631,7 @@ is the prefix for user_t).
 </summary>
 </param>
 </template>
-<template name="userdom_admin_user_template" lineno="1321">
+<template name="userdom_admin_user_template" lineno="1325">
 <summary>
 The template for creating an administrative user.
 </summary>
@@ -124784,7 +125660,7 @@ is the prefix for sysadm_t).
 </summary>
 </param>
 </template>
-<interface name="userdom_security_admin_template" lineno="1501">
+<interface name="userdom_security_admin_template" lineno="1505">
 <summary>
 Allow user to run as a secadm
 </summary>
@@ -124810,7 +125686,7 @@ The role  of the object to create.
 </summary>
 </param>
 </interface>
-<template name="userdom_xdg_user_template" lineno="1604">
+<template name="userdom_xdg_user_template" lineno="1608">
 <summary>
 Allow user to interact with xdg content types
 </summary>
@@ -124831,7 +125707,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="userdom_user_application_type" lineno="1653">
+<interface name="userdom_user_application_type" lineno="1657">
 <summary>
 Make the specified type usable as
 a user application domain type.
@@ -124842,7 +125718,7 @@ Type to be used as a user application domain.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_application_domain" lineno="1674">
+<interface name="userdom_user_application_domain" lineno="1678">
 <summary>
 Make the specified type usable as
 a user application domain.
@@ -124858,7 +125734,7 @@ Type to be used as the domain entry point.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content" lineno="1691">
+<interface name="userdom_user_home_content" lineno="1695">
 <summary>
 Make the specified type usable in a
 user home directory.
@@ -124870,7 +125746,7 @@ user home directory.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_file" lineno="1717">
+<interface name="userdom_user_tmp_file" lineno="1721">
 <summary>
 Make the specified type usable as a
 user temporary file.
@@ -124882,7 +125758,7 @@ temporary directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmpfs_file" lineno="1734">
+<interface name="userdom_user_tmpfs_file" lineno="1738">
 <summary>
 Make the specified type usable as a
 user tmpfs file.
@@ -124894,7 +125770,7 @@ tmpfs directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1749">
+<interface name="userdom_attach_admin_tun_iface" lineno="1753">
 <summary>
 Allow domain to attach to TUN devices created by administrative users.
 </summary>
@@ -124904,7 +125780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ptys" lineno="1768">
+<interface name="userdom_setattr_user_ptys" lineno="1772">
 <summary>
 Set the attributes of a user pty.
 </summary>
@@ -124914,7 +125790,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_pty" lineno="1786">
+<interface name="userdom_create_user_pty" lineno="1790">
 <summary>
 Create a user pty.
 </summary>
@@ -124924,7 +125800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1804">
+<interface name="userdom_getattr_user_home_dirs" lineno="1808">
 <summary>
 Get the attributes of user home directories.
 </summary>
@@ -124934,7 +125810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1823">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827">
 <summary>
 Do not audit attempts to get the attributes of user home directories.
 </summary>
@@ -124944,7 +125820,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_dirs" lineno="1841">
+<interface name="userdom_search_user_home_dirs" lineno="1845">
 <summary>
 Search user home directories.
 </summary>
@@ -124954,7 +125830,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1868">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872">
 <summary>
 Do not audit attempts to search user home directories.
 </summary>
@@ -124972,7 +125848,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_list_user_home_dirs" lineno="1886">
+<interface name="userdom_list_user_home_dirs" lineno="1890">
 <summary>
 List user home directories.
 </summary>
@@ -124982,7 +125858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1905">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909">
 <summary>
 Do not audit attempts to list user home subdirectories.
 </summary>
@@ -124992,7 +125868,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_home_dirs" lineno="1923">
+<interface name="userdom_create_user_home_dirs" lineno="1927">
 <summary>
 Create user home directories.
 </summary>
@@ -125002,7 +125878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1941">
+<interface name="userdom_manage_user_home_dirs" lineno="1945">
 <summary>
 Manage user home directories.
 </summary>
@@ -125012,7 +125888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1959">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1963">
 <summary>
 Relabel to user home directories.
 </summary>
@@ -125022,7 +125898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1983">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="1987">
 <summary>
 Create directories in the home dir root with
 the user home directory type.
@@ -125038,7 +125914,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_domtrans" lineno="2020">
+<interface name="userdom_user_home_domtrans" lineno="2024">
 <summary>
 Do a domain transition to the specified
 domain when executing a program in the
@@ -125067,7 +125943,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="2040">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="2044">
 <summary>
 Do not audit attempts to search user home content directories.
 </summary>
@@ -125077,7 +125953,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_home_content" lineno="2058">
+<interface name="userdom_list_all_user_home_content" lineno="2062">
 <summary>
 List all users home content directories.
 </summary>
@@ -125087,7 +125963,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_home_content" lineno="2077">
+<interface name="userdom_list_user_home_content" lineno="2081">
 <summary>
 List contents of users home directory.
 </summary>
@@ -125097,7 +125973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="2096">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2100">
 <summary>
 Create, read, write, and delete directories
 in a user home subdirectory.
@@ -125108,7 +125984,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="2115">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119">
 <summary>
 Delete all user home content directories.
 </summary>
@@ -125118,7 +125994,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="2135">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2139">
 <summary>
 Delete directories in a user home subdirectory.
 </summary>
@@ -125128,7 +126004,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2153">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157">
 <summary>
 Set attributes of all user home content directories.
 </summary>
@@ -125138,7 +126014,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2173">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177">
 <summary>
 Do not audit attempts to set the
 attributes of user home files.
@@ -125149,7 +126025,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_home_content_files" lineno="2191">
+<interface name="userdom_map_user_home_content_files" lineno="2195">
 <summary>
 Map user home files.
 </summary>
@@ -125159,7 +126035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2209">
+<interface name="userdom_mmap_user_home_content_files" lineno="2213">
 <summary>
 Mmap user home files.
 </summary>
@@ -125169,7 +126045,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_files" lineno="2228">
+<interface name="userdom_read_user_home_content_files" lineno="2232">
 <summary>
 Read user home files.
 </summary>
@@ -125179,7 +126055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2247">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251">
 <summary>
 Do not audit attempts to read user home files.
 </summary>
@@ -125189,7 +126065,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_user_home_content" lineno="2266">
+<interface name="userdom_read_all_user_home_content" lineno="2270">
 <summary>
 Read all user home content, including application-specific resources.
 </summary>
@@ -125199,7 +126075,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2288">
+<interface name="userdom_manage_all_user_home_content" lineno="2292">
 <summary>
 Manage all user home content, including application-specific resources.
 </summary>
@@ -125209,7 +126085,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_all_user_home_content_files" lineno="2310">
+<interface name="userdom_map_all_user_home_content_files" lineno="2314">
 <summary>
 Map all user home content, including application-specific resources.
 </summary>
@@ -125219,7 +126095,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2328">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332">
 <summary>
 Do not audit attempts to append user home files.
 </summary>
@@ -125229,7 +126105,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2346">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350">
 <summary>
 Do not audit attempts to write user home files.
 </summary>
@@ -125239,7 +126115,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2364">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2368">
 <summary>
 Delete all user home content files.
 </summary>
@@ -125249,7 +126125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2384">
+<interface name="userdom_delete_user_home_content_files" lineno="2388">
 <summary>
 Delete files in a user home subdirectory.
 </summary>
@@ -125259,7 +126135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_generic_user_home_dirs" lineno="2402">
+<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406">
 <summary>
 Relabel generic user home dirs.
 </summary>
@@ -125269,7 +126145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_generic_user_home_files" lineno="2420">
+<interface name="userdom_relabel_generic_user_home_files" lineno="2424">
 <summary>
 Relabel generic user home files.
 </summary>
@@ -125279,7 +126155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2438">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442">
 <summary>
 Do not audit attempts to relabel user home files.
 </summary>
@@ -125289,7 +126165,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2456">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2460">
 <summary>
 Read user home subdirectory symbolic links.
 </summary>
@@ -125299,7 +126175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2476">
+<interface name="userdom_exec_user_home_content_files" lineno="2480">
 <summary>
 Execute user home files.
 </summary>
@@ -125310,7 +126186,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2503">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507">
 <summary>
 Do not audit attempts to execute user home files.
 </summary>
@@ -125320,7 +126196,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2522">
+<interface name="userdom_manage_user_home_content_files" lineno="2526">
 <summary>
 Create, read, write, and delete files
 in a user home subdirectory.
@@ -125331,7 +126207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2543">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547">
 <summary>
 Do not audit attempts to create, read, write, and delete directories
 in a user home subdirectory.
@@ -125342,7 +126218,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2562">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2566">
 <summary>
 Create, read, write, and delete symbolic links
 in a user home subdirectory.
@@ -125353,7 +126229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2582">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586">
 <summary>
 Delete all user home content symbolic links.
 </summary>
@@ -125363,7 +126239,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2602">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2606">
 <summary>
 Delete symbolic links in a user home directory.
 </summary>
@@ -125373,7 +126249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2621">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2625">
 <summary>
 Create, read, write, and delete named pipes
 in a user home subdirectory.
@@ -125384,7 +126260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2642">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2646">
 <summary>
 Create, read, write, and delete named sockets
 in a user home subdirectory.
@@ -125395,7 +126271,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2679">
+<interface name="userdom_user_home_dir_filetrans" lineno="2683">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -125422,7 +126298,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2716">
+<interface name="userdom_user_home_content_filetrans" lineno="2720">
 <summary>
 Create objects in a directory located
 in a user home directory with an
@@ -125450,7 +126326,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2747">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751">
 <summary>
 Automatically use the user_cert_t label for selected resources
 created in a users home directory
@@ -125471,7 +126347,7 @@ Name of the resource that is being created
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2777">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -125493,7 +126369,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_exec_user_bin_files" lineno="2796">
+<interface name="userdom_exec_user_bin_files" lineno="2800">
 <summary>
 Execute user executable files.
 </summary>
@@ -125503,7 +126379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_bin" lineno="2816">
+<interface name="userdom_manage_user_bin" lineno="2820">
 <summary>
 Manage user executable files.
 </summary>
@@ -125513,7 +126389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_certs" lineno="2838">
+<interface name="userdom_read_user_certs" lineno="2842">
 <summary>
 Read user SSL certificates.
 </summary>
@@ -125524,7 +126400,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2861">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2865">
 <summary>
 Do not audit attempts to manage
 the user SSL certificates.
@@ -125536,7 +126412,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_manage_user_certs" lineno="2881">
+<interface name="userdom_manage_user_certs" lineno="2885">
 <summary>
 Manage user SSL certificates.
 </summary>
@@ -125546,7 +126422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2902">
+<interface name="userdom_write_user_tmp_sockets" lineno="2906">
 <summary>
 Write to user temporary named sockets.
 </summary>
@@ -125556,7 +126432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_tmp" lineno="2922">
+<interface name="userdom_list_user_tmp" lineno="2926">
 <summary>
 List user temporary directories.
 </summary>
@@ -125566,7 +126442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2944">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2948">
 <summary>
 Do not audit attempts to list user
 temporary directories.
@@ -125577,7 +126453,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2962">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2966">
 <summary>
 Delete users temporary directories.
 </summary>
@@ -125587,7 +126463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2981">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985">
 <summary>
 Do not audit attempts to manage users
 temporary directories.
@@ -125598,7 +126474,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_files" lineno="2999">
+<interface name="userdom_read_user_tmp_files" lineno="3003">
 <summary>
 Read user temporary files.
 </summary>
@@ -125608,7 +126484,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmp_files" lineno="3020">
+<interface name="userdom_map_user_tmp_files" lineno="3024">
 <summary>
 Map user temporary files.
 </summary>
@@ -125618,7 +126494,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3039">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043">
 <summary>
 Do not audit attempts to read users
 temporary files.
@@ -125629,7 +126505,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3058">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062">
 <summary>
 Do not audit attempts to append users
 temporary files.
@@ -125640,7 +126516,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmp_files" lineno="3076">
+<interface name="userdom_rw_user_tmp_files" lineno="3080">
 <summary>
 Read and write user temporary files.
 </summary>
@@ -125650,7 +126526,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_files" lineno="3097">
+<interface name="userdom_delete_user_tmp_files" lineno="3101">
 <summary>
 Delete users temporary files.
 </summary>
@@ -125660,7 +126536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3116">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120">
 <summary>
 Do not audit attempts to manage users
 temporary files.
@@ -125671,7 +126547,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="3134">
+<interface name="userdom_read_user_tmp_symlinks" lineno="3138">
 <summary>
 Read user temporary symbolic links.
 </summary>
@@ -125681,7 +126557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="3155">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3159">
 <summary>
 Delete users temporary symbolic links.
 </summary>
@@ -125691,7 +126567,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="3174">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3178">
 <summary>
 Create, read, write, and delete user
 temporary directories.
@@ -125702,7 +126578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="3194">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198">
 <summary>
 Delete users temporary named pipes.
 </summary>
@@ -125712,7 +126588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_files" lineno="3213">
+<interface name="userdom_manage_user_tmp_files" lineno="3217">
 <summary>
 Create, read, write, and delete user
 temporary files.
@@ -125723,7 +126599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="3233">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237">
 <summary>
 Delete users temporary named sockets.
 </summary>
@@ -125733,7 +126609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3252">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3256">
 <summary>
 Create, read, write, and delete user
 temporary symbolic links.
@@ -125744,7 +126620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3273">
+<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277">
 <summary>
 Do not audit attempts to read and write
 temporary pipes.
@@ -125755,7 +126631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3292">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3296">
 <summary>
 Create, read, write, and delete user
 temporary named pipes.
@@ -125766,7 +126642,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3313">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3317">
 <summary>
 Create, read, write, and delete user
 temporary named sockets.
@@ -125777,7 +126653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3350">
+<interface name="userdom_user_tmp_filetrans" lineno="3354">
 <summary>
 Create objects in a user temporary directory
 with an automatic type transition to
@@ -125804,7 +126680,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3382">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386">
 <summary>
 Create objects in the temporary directory
 with an automatic type transition to
@@ -125826,7 +126702,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3400">
+<interface name="userdom_map_user_tmpfs_files" lineno="3404">
 <summary>
 Map user tmpfs files.
 </summary>
@@ -125836,7 +126712,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3418">
+<interface name="userdom_read_user_tmpfs_files" lineno="3422">
 <summary>
 Read user tmpfs files.
 </summary>
@@ -125846,7 +126722,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3438">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442">
 <summary>
 dontaudit Read attempts of user tmpfs files.
 </summary>
@@ -125856,7 +126732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3457">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461">
 <summary>
 relabel to/from user tmpfs dirs
 </summary>
@@ -125866,7 +126742,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3476">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3480">
 <summary>
 relabel to/from user tmpfs files
 </summary>
@@ -125876,7 +126752,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_content" lineno="3498">
+<interface name="userdom_user_runtime_content" lineno="3502">
 <summary>
 Make the specified type usable in
 the directory /run/user/%{USERID}/.
@@ -125888,7 +126764,7 @@ user_runtime_content_dir_t.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime" lineno="3518">
+<interface name="userdom_search_user_runtime" lineno="3522">
 <summary>
 Search users runtime directories.
 </summary>
@@ -125898,7 +126774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime_root" lineno="3537">
+<interface name="userdom_search_user_runtime_root" lineno="3541">
 <summary>
 Search user runtime root directories.
 </summary>
@@ -125908,7 +126784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3557">
+<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561">
 <summary>
 Do not audit attempts to search
 user runtime root directories.
@@ -125919,7 +126795,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3576">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580">
 <summary>
 Create, read, write, and delete user
 runtime root dirs.
@@ -125930,7 +126806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3595">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599">
 <summary>
 Relabel to and from user runtime root dirs.
 </summary>
@@ -125940,7 +126816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3614">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3618">
 <summary>
 Create, read, write, and delete user
 runtime dirs.
@@ -125951,7 +126827,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3634">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3638">
 <summary>
 Mount a filesystem on user runtime dir
 directories.
@@ -125962,7 +126838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3652">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656">
 <summary>
 Relabel to user runtime directories.
 </summary>
@@ -125972,7 +126848,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3670">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674">
 <summary>
 Relabel from user runtime directories.
 </summary>
@@ -125982,7 +126858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3688">
+<interface name="userdom_delete_user_runtime_files" lineno="3692">
 <summary>
 delete user runtime files
 </summary>
@@ -125992,7 +126868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_all_user_runtime" lineno="3707">
+<interface name="userdom_search_all_user_runtime" lineno="3711">
 <summary>
 Search users runtime directories.
 </summary>
@@ -126002,7 +126878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_runtime" lineno="3726">
+<interface name="userdom_list_all_user_runtime" lineno="3730">
 <summary>
 List user runtime directories.
 </summary>
@@ -126012,7 +126888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3745">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749">
 <summary>
 delete user runtime directories
 </summary>
@@ -126022,7 +126898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3763">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3767">
 <summary>
 delete user runtime files
 </summary>
@@ -126032,7 +126908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3781">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785">
 <summary>
 delete user runtime symlink files
 </summary>
@@ -126042,7 +126918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3799">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803">
 <summary>
 delete user runtime fifo files
 </summary>
@@ -126052,7 +126928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3817">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821">
 <summary>
 delete user runtime socket files
 </summary>
@@ -126062,7 +126938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3835">
+<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839">
 <summary>
 delete user runtime blk files
 </summary>
@@ -126072,7 +126948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3853">
+<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857">
 <summary>
 delete user runtime chr files
 </summary>
@@ -126082,7 +126958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3883">
+<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887">
 <summary>
 Create objects in the pid directory
 with an automatic type transition to
@@ -126104,7 +126980,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3910">
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914">
 <summary>
 Create objects in the runtime directory
 with an automatic type transition to
@@ -126126,7 +127002,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3946">
+<interface name="userdom_user_runtime_filetrans" lineno="3950">
 <summary>
 Create objects in a user runtime
 directory with an automatic type
@@ -126154,7 +127030,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3977">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981">
 <summary>
 Create objects in the user runtime directory
 with an automatic type transition to
@@ -126176,7 +127052,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4007">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -126198,7 +127074,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="4038">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -126220,7 +127096,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="4056">
+<interface name="userdom_rw_user_tmpfs_files" lineno="4060">
 <summary>
 Read and write user tmpfs files.
 </summary>
@@ -126230,7 +127106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="4077">
+<interface name="userdom_delete_user_tmpfs_files" lineno="4081">
 <summary>
 Delete user tmpfs files.
 </summary>
@@ -126240,7 +127116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="4096">
+<interface name="userdom_manage_user_tmpfs_files" lineno="4100">
 <summary>
 Create, read, write, and delete user tmpfs files.
 </summary>
@@ -126250,7 +127126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_ttys" lineno="4116">
+<interface name="userdom_getattr_user_ttys" lineno="4120">
 <summary>
 Get the attributes of a user domain tty.
 </summary>
@@ -126260,7 +127136,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4134">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138">
 <summary>
 Do not audit attempts to get the attributes of a user domain tty.
 </summary>
@@ -126270,7 +127146,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ttys" lineno="4152">
+<interface name="userdom_setattr_user_ttys" lineno="4156">
 <summary>
 Set the attributes of a user domain tty.
 </summary>
@@ -126280,7 +127156,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4170">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174">
 <summary>
 Do not audit attempts to set the attributes of a user domain tty.
 </summary>
@@ -126290,7 +127166,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ttys" lineno="4188">
+<interface name="userdom_use_user_ttys" lineno="4192">
 <summary>
 Read and write a user domain tty.
 </summary>
@@ -126300,7 +127176,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ptys" lineno="4206">
+<interface name="userdom_use_user_ptys" lineno="4210">
 <summary>
 Read and write a user domain pty.
 </summary>
@@ -126310,7 +127186,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="4241">
+<interface name="userdom_use_inherited_user_terminals" lineno="4245">
 <summary>
 Read and write a user TTYs and PTYs.
 </summary>
@@ -126336,7 +127212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_use_user_terminals" lineno="4282">
+<interface name="userdom_use_user_terminals" lineno="4286">
 <summary>
 Read, write and open a user TTYs and PTYs.
 </summary>
@@ -126368,7 +127244,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="4298">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4302">
 <summary>
 Do not audit attempts to read and write
 a user domain tty and pty.
@@ -126379,7 +127255,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="4319">
+<interface name="userdom_spec_domtrans_all_users" lineno="4323">
 <summary>
 Execute a shell in all user domains.  This
 is an explicit transition, requiring the
@@ -126391,7 +127267,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4342">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346">
 <summary>
 Execute an Xserver session in all user domains.  This
 is an explicit transition, requiring the
@@ -126403,7 +127279,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4365">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369">
 <summary>
 Execute a shell in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -126415,7 +127291,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4388">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392">
 <summary>
 Execute an Xserver session in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -126427,7 +127303,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4409">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413">
 <summary>
 Read and write unpriviledged user SysV sempaphores.
 </summary>
@@ -126437,7 +127313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4427">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431">
 <summary>
 Manage unpriviledged user SysV sempaphores.
 </summary>
@@ -126447,7 +127323,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4446">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450">
 <summary>
 Read and write unpriviledged user SysV shared
 memory segments.
@@ -126458,7 +127334,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4465">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469">
 <summary>
 Manage unpriviledged user SysV shared
 memory segments.
@@ -126469,7 +127345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4485">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489">
 <summary>
 Execute bin_t in the unprivileged user domains. This
 is an explicit transition, requiring the
@@ -126481,7 +127357,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4508">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512">
 <summary>
 Execute all entrypoint files in unprivileged user
 domains. This is an explicit transition, requiring the
@@ -126493,7 +127369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_content" lineno="4529">
+<interface name="userdom_search_user_home_content" lineno="4533">
 <summary>
 Search users home directories.
 </summary>
@@ -126503,7 +127379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signull_unpriv_users" lineno="4548">
+<interface name="userdom_signull_unpriv_users" lineno="4552">
 <summary>
 Send signull to unprivileged user domains.
 </summary>
@@ -126513,7 +127389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_unpriv_users" lineno="4566">
+<interface name="userdom_signal_unpriv_users" lineno="4570">
 <summary>
 Send general signals to unprivileged user domains.
 </summary>
@@ -126523,7 +127399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4584">
+<interface name="userdom_use_unpriv_users_fds" lineno="4588">
 <summary>
 Inherit the file descriptors from unprivileged user domains.
 </summary>
@@ -126533,7 +127409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4612">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616">
 <summary>
 Do not audit attempts to inherit the file descriptors
 from unprivileged user domains.
@@ -126553,7 +127429,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4630">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4634">
 <summary>
 Do not audit attempts to use user ptys.
 </summary>
@@ -126563,7 +127439,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4648">
+<interface name="userdom_relabelto_user_ptys" lineno="4652">
 <summary>
 Relabel files to unprivileged user pty types.
 </summary>
@@ -126573,7 +127449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4667">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671">
 <summary>
 Do not audit attempts to relabel files from
 user pty types.
@@ -126584,7 +127460,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_files" lineno="4685">
+<interface name="userdom_write_user_tmp_files" lineno="4689">
 <summary>
 Write all users files in /tmp
 </summary>
@@ -126594,7 +127470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4704">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708">
 <summary>
 Do not audit attempts to write users
 temporary files.
@@ -126605,7 +127481,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4722">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4726">
 <summary>
 Do not audit attempts to use user ttys.
 </summary>
@@ -126615,7 +127491,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_state" lineno="4740">
+<interface name="userdom_read_all_users_state" lineno="4744">
 <summary>
 Read the process state of all user domains.
 </summary>
@@ -126625,7 +127501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_all_users" lineno="4760">
+<interface name="userdom_getattr_all_users" lineno="4764">
 <summary>
 Get the attributes of all user domains.
 </summary>
@@ -126635,7 +127511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_all_users_fds" lineno="4778">
+<interface name="userdom_use_all_users_fds" lineno="4782">
 <summary>
 Inherit the file descriptors from all user domains
 </summary>
@@ -126645,7 +127521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4797">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801">
 <summary>
 Do not audit attempts to inherit the file
 descriptors from any user domains.
@@ -126656,7 +127532,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_all_users" lineno="4815">
+<interface name="userdom_signal_all_users" lineno="4819">
 <summary>
 Send general signals to all user domains.
 </summary>
@@ -126666,7 +127542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_sigchld_all_users" lineno="4833">
+<interface name="userdom_sigchld_all_users" lineno="4837">
 <summary>
 Send a SIGCHLD signal to all user domains.
 </summary>
@@ -126676,7 +127552,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_keys" lineno="4851">
+<interface name="userdom_read_all_users_keys" lineno="4855">
 <summary>
 Read keys for all user domains.
 </summary>
@@ -126686,7 +127562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_all_users_keys" lineno="4869">
+<interface name="userdom_write_all_users_keys" lineno="4873">
 <summary>
 Write keys for all user domains.
 </summary>
@@ -126696,7 +127572,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_all_users_keys" lineno="4887">
+<interface name="userdom_rw_all_users_keys" lineno="4891">
 <summary>
 Read and write keys for all user domains.
 </summary>
@@ -126706,7 +127582,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_all_users_keys" lineno="4905">
+<interface name="userdom_create_all_users_keys" lineno="4909">
 <summary>
 Create keys for all user domains.
 </summary>
@@ -126716,7 +127592,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_users_keys" lineno="4923">
+<interface name="userdom_manage_all_users_keys" lineno="4927">
 <summary>
 Manage keys for all user domains.
 </summary>
@@ -126726,7 +127602,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dbus_send_all_users" lineno="4941">
+<interface name="userdom_dbus_send_all_users" lineno="4945">
 <summary>
 Send a dbus message to all user domains.
 </summary>
@@ -126736,7 +127612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4963">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4967">
 <summary>
 Create, read, write, and delete user
 temporary character files.
@@ -126747,7 +127623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_certs" lineno="4984">
+<interface name="userdom_relabel_user_certs" lineno="4988">
 <summary>
 Allow relabeling resources to user_cert_t
 </summary>
@@ -126757,7 +127633,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5007">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011">
 <summary>
 Do not audit attempts to read and write
 unserdomain stream.

diff --git a/policy/booleans.conf b/policy/booleans.conf
index 900fa523..d2fac33a 100644
--- a/policy/booleans.conf
+++ b/policy/booleans.conf
@@ -1193,6 +1193,21 @@ container_manage_cgroup = false
 # 
 container_mounton_non_security = false
 
+#
+# Allow containers to manage all read-writable public content.
+# 
+container_manage_public_content = false
+
+#
+# Allow containers to read all public content.
+# 
+container_read_public_content = false
+
+#
+# Allow containers to use eCryptfs filesystems.
+# 
+container_use_ecryptfs = false
+
 #
 # Allow containers to use NFS filesystems.
 # 
@@ -1264,6 +1279,19 @@ allow_httpd_cvs_script_anon_write = false
 # 
 dbus_pass_tuntap_fd = false
 
+#
+# Allow dbus-daemon system bus to to run systemd transient
+# units. This is used by dbus-broker for dbus-activated
+# services when the unit file for the service does not exist.
+# 
+dbus_broker_run_transient_units = false
+
+#
+# Enable additional rules to support using dbus-broker
+# as the dbus-daemon system bus.
+# 
+dbus_broker_system_bus = false
+
 #
 # Determine whether DHCP daemon
 # can use LDAP backends.
@@ -1472,6 +1500,17 @@ allow_kerberos = false
 # 
 use_lpd_server = false
 
+#
+# Determine whether Matrixd is allowed to federate
+# (bind all UDP ports and connect to all TCP ports).
+# 
+matrix_allow_federation = true
+
+#
+# Determine whether Matrixd can connect to the Postgres database.
+# 
+matrix_postgresql_connect = false
+
 #
 # Determine whether the script domain can
 # modify public files used for public file
@@ -2038,6 +2077,11 @@ dhcpc_manage_samba = false
 # 
 systemd_tmpfiles_manage_all = false
 
+#
+# Allow systemd-networkd to run its DHCPd server component
+# 
+systemd_networkd_dhcp_server = false
+
 #
 # Allow systemd-nspawn to create a labelled namespace with the same types
 # as parent environment

diff --git a/policy/modules.conf b/policy/modules.conf
index f94f6cc4..2487c0f7 100644
--- a/policy/modules.conf
+++ b/policy/modules.conf
@@ -214,6 +214,13 @@ cfengine = module
 # 
 chkrootkit = module
 
+# Layer: admin
+# Module: cloudinit
+#
+# Init scripts for cloud VMs
+# 
+cloudinit = module
+
 # Layer: admin
 # Module: consoletype
 #
@@ -1811,6 +1818,13 @@ lsm = module
 # 
 mailman = module
 
+# Layer: services
+# Module: matrixd
+#
+# matrix.org synapse reference server.
+# 
+matrixd = module
+
 # Layer: services
 # Module: mediawiki
 #
@@ -1951,6 +1965,13 @@ networkmanager = module
 # 
 nis = module
 
+# Layer: services
+# Module: node_exporter
+#
+# Prometheus Node Exporter
+# 
+node_exporter = module
+
 # Layer: services
 # Module: nscd
 #

diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
index a0cb0bed..5d3edc20 100644
--- a/policy/modules/kernel/corenetwork.if
+++ b/policy/modules/kernel/corenetwork.if
@@ -914,6 +914,24 @@ interface(`corenet_tcp_bind_generic_node',`
 	allow $1 node_t:tcp_socket node_bind;
 ')
 
+########################################
+## <summary>
+##	Do not audit denials on binding TCP sockets to generic nodes.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain to not audit.
+##	</summary>
+## </param>
+#
+interface(`corenet_dontaudit_tcp_bind_generic_node',`
+	gen_require(`
+		type node_t;
+	')
+
+	dontaudit $1 node_t:tcp_socket node_bind;
+')
+
 ########################################
 ## <summary>
 ##	Bind UDP sockets to generic nodes.

diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
index 7632e589..e2c7dc6c 100644
--- a/policy/modules/kernel/corenetwork.te
+++ b/policy/modules/kernel/corenetwork.te
@@ -684,6 +684,7 @@ portcon tcp 488 gen_context(system_u:object_r:http_port_t,s0)
 portcon tcp 8008 gen_context(system_u:object_r:http_port_t,s0)
 portcon tcp 8009 gen_context(system_u:object_r:http_port_t,s0)
 portcon tcp 8443 gen_context(system_u:object_r:http_port_t,s0)
+portcon tcp 8448 gen_context(system_u:object_r:http_port_t,s0)
  #8443 is mod_nss default port
 
 type http_cache_port_t, port_type, defined_port_type;


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/
@ 2022-12-13 20:55 Kenton Groombridge
  0 siblings, 0 replies; 3+ messages in thread
From: Kenton Groombridge @ 2022-12-13 20:55 UTC (permalink / raw
  To: gentoo-commits

commit:     c9ea1d5713d9a33466145fc78970b80a398065fb
Author:     Kenton Groombridge <concord <AT> gentoo <DOT> org>
AuthorDate: Tue Dec 13 19:33:04 2022 +0000
Commit:     Kenton Groombridge <concord <AT> gentoo <DOT> org>
CommitDate: Tue Dec 13 19:33:04 2022 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=c9ea1d57

Update generated policy and doc files

Signed-off-by: Kenton Groombridge <concord <AT> gentoo.org>

 doc/policy.xml                       | 34579 +++++++++------------------------
 policy/booleans.conf                 |    70 +
 policy/modules.conf                  |    44 +
 policy/modules/kernel/corenetwork.if | 24892 +-----------------------
 policy/modules/kernel/corenetwork.te |    19 +
 5 files changed, 9368 insertions(+), 50236 deletions(-)

diff --git a/doc/policy.xml b/doc/policy.xml
index 6dd4831a2..ed1c8ef5d 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -1353,6 +1353,96 @@ Role allowed access.
 </param>
 </interface>
 </module>
+<module name="fapolicyd" filename="policy/modules/admin/fapolicyd.if">
+<summary>
+The fapolicyd software framework controls the execution of applications based
+on a user-defined policy. This is one of the most efficient ways to prevent
+running untrusted and possibly malicious applications on the system.
+</summary>
+<interface name="fapolicyd_mmap_read_config_files" lineno="17">
+<summary>
+Read fapolicyd config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_domtrans_fagenrules" lineno="35">
+<summary>
+Execute fagenrules in the fagenrules_t domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_run_fagenrules" lineno="62">
+<summary>
+Execute fagenrules in the fagenrules domain,
+and allow the specified roles the
+fagenurles domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fapolicyd_domtrans_cli" lineno="82">
+<summary>
+Execute fapolicyd-cli in the fapolicyc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_run_cli" lineno="109">
+<summary>
+Execute fapoliyd-cli in the fapolicyc domain,
+and allow the specified roles the
+fapolicyc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fapolicyd_admin" lineno="135">
+<summary>
+All of the rules required to
+administrate an fapolicyd environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
 <module name="firstboot" filename="policy/modules/admin/firstboot.if">
 <summary>Initial system configuration utility.</summary>
 <interface name="firstboot_domtrans" lineno="13">
@@ -1642,28 +1732,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_read_pid_files" lineno="95">
-<summary>
-Read kismet pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_manage_pid_files" lineno="111">
-<summary>
-Create, read, write, and delete
-kismet pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_read_runtime_files" lineno="126">
+<interface name="kismet_read_runtime_files" lineno="95">
 <summary>
 Read kismet runtime files.
 </summary>
@@ -1673,7 +1742,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_runtime_files" lineno="146">
+<interface name="kismet_manage_runtime_files" lineno="115">
 <summary>
 Create, read, write, and delete
 kismet runtime files.
@@ -1684,7 +1753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_search_lib" lineno="165">
+<interface name="kismet_search_lib" lineno="134">
 <summary>
 Search kismet lib directories.
 </summary>
@@ -1694,7 +1763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_read_lib_files" lineno="184">
+<interface name="kismet_read_lib_files" lineno="153">
 <summary>
 Read kismet lib files.
 </summary>
@@ -1704,7 +1773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_lib_files" lineno="205">
+<interface name="kismet_manage_lib_files" lineno="174">
 <summary>
 Create, read, write, and delete
 kismet lib files.
@@ -1715,7 +1784,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_lib" lineno="225">
+<interface name="kismet_manage_lib" lineno="194">
 <summary>
 Create, read, write, and delete
 kismet lib content.
@@ -1726,7 +1795,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_read_log" lineno="247">
+<interface name="kismet_read_log" lineno="216">
 <summary>
 Read kismet log files.
 </summary>
@@ -1737,7 +1806,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kismet_append_log" lineno="266">
+<interface name="kismet_append_log" lineno="235">
 <summary>
 Append kismet log files.
 </summary>
@@ -1747,7 +1816,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_manage_log" lineno="286">
+<interface name="kismet_manage_log" lineno="255">
 <summary>
 Create, read, write, and delete
 kismet log content.
@@ -1758,7 +1827,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kismet_admin" lineno="314">
+<interface name="kismet_admin" lineno="283">
 <summary>
 All of the rules required to
 administrate an kismet environment.
@@ -3212,49 +3281,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="rpm_read_pid_files" lineno="538">
-<summary>
-Read rpm pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpm_manage_pid_files" lineno="553">
-<summary>
-Create, read, write, and delete
-rpm pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpm_pid_filetrans_rpm_pid" lineno="579">
-<summary>
-Create specified objects in pid directories
-with the rpm pid file type.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="rpm_manage_runtime_files" lineno="594">
+<interface name="rpm_manage_runtime_files" lineno="539">
 <summary>
 Create, read, write, and delete
 rpm runtime files.
@@ -3265,7 +3292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpm_admin" lineno="620">
+<interface name="rpm_admin" lineno="565">
 <summary>
 All of the rules required to
 administrate an rpm environment.
@@ -3384,18 +3411,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samhain_manage_pid_files" lineno="187">
-<summary>
-Create, read, write, and delete
-samhain pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="samhain_admin" lineno="208">
+<interface name="samhain_admin" lineno="193">
 <summary>
 All of the rules required to
 administrate the samhain environment.
@@ -3425,17 +3441,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="sblim_read_pid_files" lineno="32">
-<summary>
-Read gatherd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sblim_admin" lineno="53">
+<interface name="sblim_admin" lineno="39">
 <summary>
 All of the rules required to
 administrate an sblim environment.
@@ -3817,7 +3823,7 @@ Role allowed access
 </summary>
 </param>
 </template>
-<interface name="sudo_sigchld" lineno="220">
+<interface name="sudo_sigchld" lineno="232">
 <summary>
 Send a SIGCHLD signal to the sudo domain.
 </summary>
@@ -7485,17 +7491,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_delete_pid_sock_file" lineno="293">
-<summary>
-Unlink qemu socket  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="qemu_delete_runtime_sock_files" lineno="308">
+<interface name="qemu_delete_runtime_sock_files" lineno="293">
 <summary>
 Unlink qemu runtime sockets.
 </summary>
@@ -7505,7 +7501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_domtrans_unconfined" lineno="327">
+<interface name="qemu_domtrans_unconfined" lineno="312">
 <summary>
 Execute a domain transition to
 run qemu unconfined.
@@ -7516,7 +7512,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="qemu_manage_tmp_dirs" lineno="347">
+<interface name="qemu_manage_tmp_dirs" lineno="332">
 <summary>
 Create, read, write, and delete
 qemu temporary directories.
@@ -7527,7 +7523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_manage_tmp_files" lineno="367">
+<interface name="qemu_manage_tmp_files" lineno="352">
 <summary>
 Create, read, write, and delete
 qemu temporary files.
@@ -7538,7 +7534,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qemu_spec_domtrans" lineno="401">
+<interface name="qemu_spec_domtrans" lineno="386">
 <summary>
 Execute qemu in a specified domain.
 </summary>
@@ -7563,7 +7559,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="qemu_entry_type" lineno="421">
+<interface name="qemu_entry_type" lineno="406">
 <summary>
 Make qemu executable files an
 entrypoint for the specified domain.
@@ -7574,7 +7570,7 @@ The domain for which qemu_exec_t is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="qemu_rw_pid_sock_files" lineno="441">
+<interface name="qemu_rw_pid_sock_files" lineno="426">
 <summary>
 Read/write to qemu socket files in /var/run
 </summary>
@@ -7702,6 +7698,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="screen_dontaudit_getattr_sock_file" lineno="134">
+<summary>
+Do not audit attempts to get the attributes
+of the screen runtime named socket.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
 </module>
 <module name="seunshare" filename="policy/modules/apps/seunshare.if">
 <summary>Filesystem namespacing/polyinstantiation application.</summary>
@@ -9564,6 +9571,49 @@ Allow phpfpm to send syslog messages
 </p>
 </desc>
 </tunable>
+<tunable name="phpfpm_exec_shell" dftval="false">
+<desc>
+<p>
+Allow phpfpm to execute shells. This
+is needed by some webapps.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_http" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to http ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_pop" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to pop ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_redis" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to redis ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_sieve" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to sieve ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_smtp" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to smtp ports.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="resolvconf" filename="policy/modules/contrib/resolvconf.if">
 <summary>OpenResolv network configuration management</summary>
@@ -9922,19 +9972,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_dontaudit_write_bin_dirs" lineno="137">
+<interface name="corecmd_watch_bin_dirs" lineno="137">
 <summary>
-Do not audit attempts to write bin directories.
+Watch bin directories.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_watch_bin_dirs" lineno="155">
+<interface name="corecmd_mounton_bin_dirs" lineno="155">
 <summary>
-Watch bin directories.
+Mount on bin directories.
 </summary>
 <param name="domain">
 <summary>
@@ -9942,7 +9992,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_getattr_bin_files" lineno="173">
+<interface name="corecmd_dontaudit_write_bin_dirs" lineno="173">
+<summary>
+Do not audit attempts to write bin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_getattr_bin_files" lineno="191">
 <summary>
 Get the attributes of files in bin directories.
 </summary>
@@ -9952,7 +10012,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192">
+<interface name="corecmd_dontaudit_getattr_bin_files" lineno="210">
 <summary>
 Do not audit attempts to get the attributes of files in bin directories.
 </summary>
@@ -9962,7 +10022,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_check_exec_bin_files" lineno="211">
+<interface name="corecmd_check_exec_bin_files" lineno="229">
 <summary>
 Check if files in bin directories are executable (DAC-wise)
 </summary>
@@ -9972,7 +10032,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_files" lineno="230">
+<interface name="corecmd_read_bin_files" lineno="248">
 <summary>
 Read files in bin directories.
 </summary>
@@ -9982,7 +10042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_dontaudit_write_bin_files" lineno="249">
+<interface name="corecmd_dontaudit_write_bin_files" lineno="267">
 <summary>
 Do not audit attempts to write bin files.
 </summary>
@@ -9992,7 +10052,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_pipes" lineno="267">
+<interface name="corecmd_read_bin_pipes" lineno="285">
 <summary>
 Read pipes in bin directories.
 </summary>
@@ -10002,7 +10062,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_read_bin_sockets" lineno="286">
+<interface name="corecmd_read_bin_sockets" lineno="304">
 <summary>
 Read named sockets in bin directories.
 </summary>
@@ -10012,7 +10072,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_bin" lineno="326">
+<interface name="corecmd_exec_bin" lineno="344">
 <summary>
 Execute generic programs in bin directories,
 in the caller domain.
@@ -10043,7 +10103,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_bin_files" lineno="345">
+<interface name="corecmd_manage_bin_files" lineno="363">
 <summary>
 Create, read, write, and delete bin files.
 </summary>
@@ -10053,7 +10113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_bin_symlinks" lineno="364">
+<interface name="corecmd_manage_bin_symlinks" lineno="382">
 <summary>
 Manage symlinks for bin files.
 </summary>
@@ -10063,7 +10123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_files" lineno="383">
+<interface name="corecmd_relabel_bin_files" lineno="401">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10073,7 +10133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_mmap_bin_files" lineno="402">
+<interface name="corecmd_mmap_bin_files" lineno="420">
 <summary>
 Mmap a bin file as executable.
 </summary>
@@ -10083,7 +10143,34 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="447">
+<interface name="corecmd_bin_filetrans" lineno="456">
+<summary>
+Create objects in bin directories
+with an automatic transition to a
+private type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="file_type">
+<summary>
+The type of the object being created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_bin_spec_domtrans" lineno="501">
 <summary>
 Execute a file in a bin directory
 in the specified domain but do not
@@ -10119,7 +10206,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_bin_domtrans" lineno="490">
+<interface name="corecmd_bin_domtrans" lineno="544">
 <summary>
 Execute a file in a bin directory
 in the specified domain.
@@ -10153,7 +10240,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_check_exec_shell" lineno="509">
+<interface name="corecmd_check_exec_shell" lineno="563">
 <summary>
 Check if a shell is executable (DAC-wise).
 </summary>
@@ -10163,7 +10250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_shell" lineno="546">
+<interface name="corecmd_exec_shell" lineno="600">
 <summary>
 Execute shells in the caller domain.
 </summary>
@@ -10191,7 +10278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="584">
+<interface name="corecmd_shell_spec_domtrans" lineno="638">
 <summary>
 Execute a shell in the target domain.  This
 is an explicit transition, requiring the
@@ -10220,7 +10307,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_shell_domtrans" lineno="618">
+<interface name="corecmd_shell_domtrans" lineno="672">
 <summary>
 Execute a shell in the specified domain.
 </summary>
@@ -10245,7 +10332,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_exec_chroot" lineno="637">
+<interface name="corecmd_exec_chroot" lineno="691">
 <summary>
 Execute chroot in the caller domain.
 </summary>
@@ -10255,7 +10342,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_getattr_all_executables" lineno="658">
+<interface name="corecmd_getattr_all_executables" lineno="712">
 <summary>
 Get the attributes of all executable files.
 </summary>
@@ -10266,7 +10353,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_read_all_executables" lineno="679">
+<interface name="corecmd_read_all_executables" lineno="733">
 <summary>
 Read all executable files.
 </summary>
@@ -10277,7 +10364,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_exec_all_executables" lineno="699">
+<interface name="corecmd_exec_all_executables" lineno="753">
 <summary>
 Execute all executable files.
 </summary>
@@ -10288,7 +10375,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="720">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="774">
 <summary>
 Do not audit attempts to execute all executables.
 </summary>
@@ -10298,7 +10385,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_manage_all_executables" lineno="739">
+<interface name="corecmd_manage_all_executables" lineno="793">
 <summary>
 Create, read, write, and all executable files.
 </summary>
@@ -10309,7 +10396,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_relabel_all_executables" lineno="761">
+<interface name="corecmd_relabel_all_executables" lineno="815">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10320,7 +10407,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="corecmd_mmap_all_executables" lineno="781">
+<interface name="corecmd_mmap_all_executables" lineno="835">
 <summary>
 Mmap all executables as executable.
 </summary>
@@ -10330,7 +10417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="803">
+<interface name="corecmd_relabel_bin_dirs" lineno="857">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -10340,7 +10427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="821">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="875">
 <summary>
 Relabel to and from the bin type.
 </summary>
@@ -12610,85 +12697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684">
-<summary>
-Send and receive TCP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_adb_port" lineno="3699">
-<summary>
-Send UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714">
-<summary>
-Do not audit attempts to send UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3729">
-<summary>
-Receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744">
-<summary>
-Do not audit attempts to receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3759">
-<summary>
-Send and receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3790">
+<interface name="corenet_tcp_bind_adb_port" lineno="3684">
 <summary>
 Bind TCP sockets to the adb port.
 </summary>
@@ -12699,7 +12708,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3810">
+<interface name="corenet_udp_bind_adb_port" lineno="3704">
 <summary>
 Bind UDP sockets to the adb port.
 </summary>
@@ -12710,7 +12719,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3829">
+<interface name="corenet_tcp_connect_adb_port" lineno="3723">
 <summary>
 Make a TCP connection to the adb port.
 </summary>
@@ -12720,7 +12729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_client_packets" lineno="3849">
+<interface name="corenet_send_adb_client_packets" lineno="3743">
 <summary>
 Send adb_client packets.
 </summary>
@@ -12731,7 +12740,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3762">
 <summary>
 Do not audit attempts to send adb_client packets.
 </summary>
@@ -12742,7 +12751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3887">
+<interface name="corenet_receive_adb_client_packets" lineno="3781">
 <summary>
 Receive adb_client packets.
 </summary>
@@ -12753,7 +12762,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3800">
 <summary>
 Do not audit attempts to receive adb_client packets.
 </summary>
@@ -12764,7 +12773,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3925">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3819">
 <summary>
 Send and receive adb_client packets.
 </summary>
@@ -12775,7 +12784,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3835">
 <summary>
 Do not audit attempts to send and receive adb_client packets.
 </summary>
@@ -12786,7 +12795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3956">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3850">
 <summary>
 Relabel packets to adb_client the packet type.
 </summary>
@@ -12796,7 +12805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_adb_server_packets" lineno="3976">
+<interface name="corenet_send_adb_server_packets" lineno="3870">
 <summary>
 Send adb_server packets.
 </summary>
@@ -12807,7 +12816,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3889">
 <summary>
 Do not audit attempts to send adb_server packets.
 </summary>
@@ -12818,7 +12827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_adb_server_packets" lineno="4014">
+<interface name="corenet_receive_adb_server_packets" lineno="3908">
 <summary>
 Receive adb_server packets.
 </summary>
@@ -12829,7 +12838,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3927">
 <summary>
 Do not audit attempts to receive adb_server packets.
 </summary>
@@ -12840,7 +12849,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="4052">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="3946">
 <summary>
 Send and receive adb_server packets.
 </summary>
@@ -12851,7 +12860,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3962">
 <summary>
 Do not audit attempts to send and receive adb_server packets.
 </summary>
@@ -12862,7 +12871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="4083">
+<interface name="corenet_relabelto_adb_server_packets" lineno="3977">
 <summary>
 Relabel packets to adb_server the packet type.
 </summary>
@@ -12872,85 +12881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105">
-<summary>
-Send and receive TCP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="4120">
-<summary>
-Send UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4150">
-<summary>
-Receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180">
-<summary>
-Send and receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="3999">
 <summary>
 Bind TCP sockets to the afs_bos port.
 </summary>
@@ -12961,7 +12892,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4231">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4019">
 <summary>
 Bind UDP sockets to the afs_bos port.
 </summary>
@@ -12972,7 +12903,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4038">
 <summary>
 Make a TCP connection to the afs_bos port.
 </summary>
@@ -12982,7 +12913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4270">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4058">
 <summary>
 Send afs_bos_client packets.
 </summary>
@@ -12993,7 +12924,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4077">
 <summary>
 Do not audit attempts to send afs_bos_client packets.
 </summary>
@@ -13004,7 +12935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4308">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4096">
 <summary>
 Receive afs_bos_client packets.
 </summary>
@@ -13015,7 +12946,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4115">
 <summary>
 Do not audit attempts to receive afs_bos_client packets.
 </summary>
@@ -13026,7 +12957,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4134">
 <summary>
 Send and receive afs_bos_client packets.
 </summary>
@@ -13037,7 +12968,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4150">
 <summary>
 Do not audit attempts to send and receive afs_bos_client packets.
 </summary>
@@ -13048,7 +12979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4165">
 <summary>
 Relabel packets to afs_bos_client the packet type.
 </summary>
@@ -13058,7 +12989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4397">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4185">
 <summary>
 Send afs_bos_server packets.
 </summary>
@@ -13069,7 +13000,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4204">
 <summary>
 Do not audit attempts to send afs_bos_server packets.
 </summary>
@@ -13080,7 +13011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4435">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4223">
 <summary>
 Receive afs_bos_server packets.
 </summary>
@@ -13091,7 +13022,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4242">
 <summary>
 Do not audit attempts to receive afs_bos_server packets.
 </summary>
@@ -13102,7 +13033,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4261">
 <summary>
 Send and receive afs_bos_server packets.
 </summary>
@@ -13113,7 +13044,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4277">
 <summary>
 Do not audit attempts to send and receive afs_bos_server packets.
 </summary>
@@ -13124,7 +13055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4292">
 <summary>
 Relabel packets to afs_bos_server the packet type.
 </summary>
@@ -13134,85 +13065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526">
-<summary>
-Send and receive TCP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4541">
-<summary>
-Send UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4571">
-<summary>
-Receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601">
-<summary>
-Send and receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4314">
 <summary>
 Bind TCP sockets to the afs_fs port.
 </summary>
@@ -13223,7 +13076,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4652">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4334">
 <summary>
 Bind UDP sockets to the afs_fs port.
 </summary>
@@ -13234,7 +13087,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4353">
 <summary>
 Make a TCP connection to the afs_fs port.
 </summary>
@@ -13244,7 +13097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4691">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4373">
 <summary>
 Send afs_fs_client packets.
 </summary>
@@ -13255,7 +13108,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4392">
 <summary>
 Do not audit attempts to send afs_fs_client packets.
 </summary>
@@ -13266,7 +13119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4729">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4411">
 <summary>
 Receive afs_fs_client packets.
 </summary>
@@ -13277,7 +13130,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4430">
 <summary>
 Do not audit attempts to receive afs_fs_client packets.
 </summary>
@@ -13288,7 +13141,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4449">
 <summary>
 Send and receive afs_fs_client packets.
 </summary>
@@ -13299,7 +13152,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4465">
 <summary>
 Do not audit attempts to send and receive afs_fs_client packets.
 </summary>
@@ -13310,7 +13163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4480">
 <summary>
 Relabel packets to afs_fs_client the packet type.
 </summary>
@@ -13320,7 +13173,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4818">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4500">
 <summary>
 Send afs_fs_server packets.
 </summary>
@@ -13331,7 +13184,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4519">
 <summary>
 Do not audit attempts to send afs_fs_server packets.
 </summary>
@@ -13342,7 +13195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4856">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4538">
 <summary>
 Receive afs_fs_server packets.
 </summary>
@@ -13353,7 +13206,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4557">
 <summary>
 Do not audit attempts to receive afs_fs_server packets.
 </summary>
@@ -13364,7 +13217,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4576">
 <summary>
 Send and receive afs_fs_server packets.
 </summary>
@@ -13375,7 +13228,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4592">
 <summary>
 Do not audit attempts to send and receive afs_fs_server packets.
 </summary>
@@ -13386,7 +13239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4607">
 <summary>
 Relabel packets to afs_fs_server the packet type.
 </summary>
@@ -13396,85 +13249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947">
-<summary>
-Send and receive TCP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4962">
-<summary>
-Send UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4992">
-<summary>
-Receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022">
-<summary>
-Send and receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="4629">
 <summary>
 Bind TCP sockets to the afs_ka port.
 </summary>
@@ -13485,7 +13260,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="5073">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="4649">
 <summary>
 Bind UDP sockets to the afs_ka port.
 </summary>
@@ -13496,7 +13271,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="4668">
 <summary>
 Make a TCP connection to the afs_ka port.
 </summary>
@@ -13506,7 +13281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="5112">
+<interface name="corenet_send_afs_ka_client_packets" lineno="4688">
 <summary>
 Send afs_ka_client packets.
 </summary>
@@ -13517,7 +13292,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4707">
 <summary>
 Do not audit attempts to send afs_ka_client packets.
 </summary>
@@ -13528,7 +13303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5150">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="4726">
 <summary>
 Receive afs_ka_client packets.
 </summary>
@@ -13539,7 +13314,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="4745">
 <summary>
 Do not audit attempts to receive afs_ka_client packets.
 </summary>
@@ -13550,7 +13325,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="4764">
 <summary>
 Send and receive afs_ka_client packets.
 </summary>
@@ -13561,7 +13336,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="4780">
 <summary>
 Do not audit attempts to send and receive afs_ka_client packets.
 </summary>
@@ -13572,7 +13347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="4795">
 <summary>
 Relabel packets to afs_ka_client the packet type.
 </summary>
@@ -13582,7 +13357,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5239">
+<interface name="corenet_send_afs_ka_server_packets" lineno="4815">
 <summary>
 Send afs_ka_server packets.
 </summary>
@@ -13593,7 +13368,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="4834">
 <summary>
 Do not audit attempts to send afs_ka_server packets.
 </summary>
@@ -13604,7 +13379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5277">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="4853">
 <summary>
 Receive afs_ka_server packets.
 </summary>
@@ -13615,7 +13390,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="4872">
 <summary>
 Do not audit attempts to receive afs_ka_server packets.
 </summary>
@@ -13626,7 +13401,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="4891">
 <summary>
 Send and receive afs_ka_server packets.
 </summary>
@@ -13637,7 +13412,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="4907">
 <summary>
 Do not audit attempts to send and receive afs_ka_server packets.
 </summary>
@@ -13648,7 +13423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="4922">
 <summary>
 Relabel packets to afs_ka_server the packet type.
 </summary>
@@ -13658,85 +13433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368">
-<summary>
-Send and receive TCP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5383">
-<summary>
-Send UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5413">
-<summary>
-Receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443">
-<summary>
-Send and receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="4944">
 <summary>
 Bind TCP sockets to the afs_pt port.
 </summary>
@@ -13747,7 +13444,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5494">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="4964">
 <summary>
 Bind UDP sockets to the afs_pt port.
 </summary>
@@ -13758,7 +13455,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="4983">
 <summary>
 Make a TCP connection to the afs_pt port.
 </summary>
@@ -13768,7 +13465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5533">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5003">
 <summary>
 Send afs_pt_client packets.
 </summary>
@@ -13779,7 +13476,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5022">
 <summary>
 Do not audit attempts to send afs_pt_client packets.
 </summary>
@@ -13790,7 +13487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5571">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5041">
 <summary>
 Receive afs_pt_client packets.
 </summary>
@@ -13801,7 +13498,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5060">
 <summary>
 Do not audit attempts to receive afs_pt_client packets.
 </summary>
@@ -13812,7 +13509,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5079">
 <summary>
 Send and receive afs_pt_client packets.
 </summary>
@@ -13823,7 +13520,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5095">
 <summary>
 Do not audit attempts to send and receive afs_pt_client packets.
 </summary>
@@ -13834,7 +13531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5110">
 <summary>
 Relabel packets to afs_pt_client the packet type.
 </summary>
@@ -13844,7 +13541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5660">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5130">
 <summary>
 Send afs_pt_server packets.
 </summary>
@@ -13855,7 +13552,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5149">
 <summary>
 Do not audit attempts to send afs_pt_server packets.
 </summary>
@@ -13866,7 +13563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5698">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5168">
 <summary>
 Receive afs_pt_server packets.
 </summary>
@@ -13877,7 +13574,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5187">
 <summary>
 Do not audit attempts to receive afs_pt_server packets.
 </summary>
@@ -13888,7 +13585,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5206">
 <summary>
 Send and receive afs_pt_server packets.
 </summary>
@@ -13899,7 +13596,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5222">
 <summary>
 Do not audit attempts to send and receive afs_pt_server packets.
 </summary>
@@ -13910,7 +13607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5237">
 <summary>
 Relabel packets to afs_pt_server the packet type.
 </summary>
@@ -13920,85 +13617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789">
-<summary>
-Send and receive TCP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5804">
-<summary>
-Send UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5834">
-<summary>
-Receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864">
-<summary>
-Send and receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5259">
 <summary>
 Bind TCP sockets to the afs_vl port.
 </summary>
@@ -14009,7 +13628,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5915">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5279">
 <summary>
 Bind UDP sockets to the afs_vl port.
 </summary>
@@ -14020,7 +13639,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5298">
 <summary>
 Make a TCP connection to the afs_vl port.
 </summary>
@@ -14030,7 +13649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5954">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5318">
 <summary>
 Send afs_vl_client packets.
 </summary>
@@ -14041,7 +13660,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5337">
 <summary>
 Do not audit attempts to send afs_vl_client packets.
 </summary>
@@ -14052,7 +13671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5992">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5356">
 <summary>
 Receive afs_vl_client packets.
 </summary>
@@ -14063,7 +13682,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5375">
 <summary>
 Do not audit attempts to receive afs_vl_client packets.
 </summary>
@@ -14074,7 +13693,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5394">
 <summary>
 Send and receive afs_vl_client packets.
 </summary>
@@ -14085,7 +13704,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5410">
 <summary>
 Do not audit attempts to send and receive afs_vl_client packets.
 </summary>
@@ -14096,7 +13715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5425">
 <summary>
 Relabel packets to afs_vl_client the packet type.
 </summary>
@@ -14106,7 +13725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="6081">
+<interface name="corenet_send_afs_vl_server_packets" lineno="5445">
 <summary>
 Send afs_vl_server packets.
 </summary>
@@ -14117,7 +13736,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5464">
 <summary>
 Do not audit attempts to send afs_vl_server packets.
 </summary>
@@ -14128,7 +13747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="6119">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="5483">
 <summary>
 Receive afs_vl_server packets.
 </summary>
@@ -14139,7 +13758,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5502">
 <summary>
 Do not audit attempts to receive afs_vl_server packets.
 </summary>
@@ -14150,7 +13769,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="5521">
 <summary>
 Send and receive afs_vl_server packets.
 </summary>
@@ -14161,7 +13780,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="5537">
 <summary>
 Do not audit attempts to send and receive afs_vl_server packets.
 </summary>
@@ -14172,7 +13791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="5552">
 <summary>
 Relabel packets to afs_vl_server the packet type.
 </summary>
@@ -14182,85 +13801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210">
-<summary>
-Send and receive TCP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6225">
-<summary>
-Send UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240">
-<summary>
-Do not audit attempts to send UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255">
-<summary>
-Receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285">
-<summary>
-Send and receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="5574">
 <summary>
 Bind TCP sockets to the afs3_callback port.
 </summary>
@@ -14271,7 +13812,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="5594">
 <summary>
 Bind UDP sockets to the afs3_callback port.
 </summary>
@@ -14282,7 +13823,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="5613">
 <summary>
 Make a TCP connection to the afs3_callback port.
 </summary>
@@ -14292,7 +13833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6375">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="5633">
 <summary>
 Send afs3_callback_client packets.
 </summary>
@@ -14303,7 +13844,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="5652">
 <summary>
 Do not audit attempts to send afs3_callback_client packets.
 </summary>
@@ -14314,7 +13855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="5671">
 <summary>
 Receive afs3_callback_client packets.
 </summary>
@@ -14325,7 +13866,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="5690">
 <summary>
 Do not audit attempts to receive afs3_callback_client packets.
 </summary>
@@ -14336,7 +13877,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="5709">
 <summary>
 Send and receive afs3_callback_client packets.
 </summary>
@@ -14347,7 +13888,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="5725">
 <summary>
 Do not audit attempts to send and receive afs3_callback_client packets.
 </summary>
@@ -14358,7 +13899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="5740">
 <summary>
 Relabel packets to afs3_callback_client the packet type.
 </summary>
@@ -14368,7 +13909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6502">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="5760">
 <summary>
 Send afs3_callback_server packets.
 </summary>
@@ -14379,7 +13920,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="5779">
 <summary>
 Do not audit attempts to send afs3_callback_server packets.
 </summary>
@@ -14390,7 +13931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="5798">
 <summary>
 Receive afs3_callback_server packets.
 </summary>
@@ -14401,7 +13942,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="5817">
 <summary>
 Do not audit attempts to receive afs3_callback_server packets.
 </summary>
@@ -14412,7 +13953,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="5836">
 <summary>
 Send and receive afs3_callback_server packets.
 </summary>
@@ -14423,7 +13964,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="5852">
 <summary>
 Do not audit attempts to send and receive afs3_callback_server packets.
 </summary>
@@ -14434,7 +13975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="5867">
 <summary>
 Relabel packets to afs3_callback_server the packet type.
 </summary>
@@ -14444,85 +13985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631">
-<summary>
-Send and receive TCP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6646">
-<summary>
-Send UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661">
-<summary>
-Do not audit attempts to send UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6676">
-<summary>
-Receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691">
-<summary>
-Do not audit attempts to receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706">
-<summary>
-Send and receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6737">
+<interface name="corenet_tcp_bind_agentx_port" lineno="5889">
 <summary>
 Bind TCP sockets to the agentx port.
 </summary>
@@ -14533,7 +13996,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6757">
+<interface name="corenet_udp_bind_agentx_port" lineno="5909">
 <summary>
 Bind UDP sockets to the agentx port.
 </summary>
@@ -14544,7 +14007,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6776">
+<interface name="corenet_tcp_connect_agentx_port" lineno="5928">
 <summary>
 Make a TCP connection to the agentx port.
 </summary>
@@ -14554,7 +14017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6796">
+<interface name="corenet_send_agentx_client_packets" lineno="5948">
 <summary>
 Send agentx_client packets.
 </summary>
@@ -14565,7 +14028,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="5967">
 <summary>
 Do not audit attempts to send agentx_client packets.
 </summary>
@@ -14576,7 +14039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6834">
+<interface name="corenet_receive_agentx_client_packets" lineno="5986">
 <summary>
 Receive agentx_client packets.
 </summary>
@@ -14587,7 +14050,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6005">
 <summary>
 Do not audit attempts to receive agentx_client packets.
 </summary>
@@ -14598,7 +14061,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6024">
 <summary>
 Send and receive agentx_client packets.
 </summary>
@@ -14609,7 +14072,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6040">
 <summary>
 Do not audit attempts to send and receive agentx_client packets.
 </summary>
@@ -14620,7 +14083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6903">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6055">
 <summary>
 Relabel packets to agentx_client the packet type.
 </summary>
@@ -14630,7 +14093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6923">
+<interface name="corenet_send_agentx_server_packets" lineno="6075">
 <summary>
 Send agentx_server packets.
 </summary>
@@ -14641,7 +14104,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6094">
 <summary>
 Do not audit attempts to send agentx_server packets.
 </summary>
@@ -14652,7 +14115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6961">
+<interface name="corenet_receive_agentx_server_packets" lineno="6113">
 <summary>
 Receive agentx_server packets.
 </summary>
@@ -14663,7 +14126,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6132">
 <summary>
 Do not audit attempts to receive agentx_server packets.
 </summary>
@@ -14674,7 +14137,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6151">
 <summary>
 Send and receive agentx_server packets.
 </summary>
@@ -14685,7 +14148,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6167">
 <summary>
 Do not audit attempts to send and receive agentx_server packets.
 </summary>
@@ -14696,7 +14159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="7030">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="6182">
 <summary>
 Relabel packets to agentx_server the packet type.
 </summary>
@@ -14706,85 +14169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052">
-<summary>
-Send and receive TCP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amanda_port" lineno="7067">
-<summary>
-Send UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082">
-<summary>
-Do not audit attempts to send UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="7097">
-<summary>
-Receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112">
-<summary>
-Do not audit attempts to receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127">
-<summary>
-Send and receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7158">
+<interface name="corenet_tcp_bind_amanda_port" lineno="6204">
 <summary>
 Bind TCP sockets to the amanda port.
 </summary>
@@ -14795,7 +14180,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7178">
+<interface name="corenet_udp_bind_amanda_port" lineno="6224">
 <summary>
 Bind UDP sockets to the amanda port.
 </summary>
@@ -14806,7 +14191,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7197">
+<interface name="corenet_tcp_connect_amanda_port" lineno="6243">
 <summary>
 Make a TCP connection to the amanda port.
 </summary>
@@ -14816,7 +14201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7217">
+<interface name="corenet_send_amanda_client_packets" lineno="6263">
 <summary>
 Send amanda_client packets.
 </summary>
@@ -14827,7 +14212,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="6282">
 <summary>
 Do not audit attempts to send amanda_client packets.
 </summary>
@@ -14838,7 +14223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7255">
+<interface name="corenet_receive_amanda_client_packets" lineno="6301">
 <summary>
 Receive amanda_client packets.
 </summary>
@@ -14849,7 +14234,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="6320">
 <summary>
 Do not audit attempts to receive amanda_client packets.
 </summary>
@@ -14860,7 +14245,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="6339">
 <summary>
 Send and receive amanda_client packets.
 </summary>
@@ -14871,7 +14256,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="6355">
 <summary>
 Do not audit attempts to send and receive amanda_client packets.
 </summary>
@@ -14882,7 +14267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7324">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="6370">
 <summary>
 Relabel packets to amanda_client the packet type.
 </summary>
@@ -14892,7 +14277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7344">
+<interface name="corenet_send_amanda_server_packets" lineno="6390">
 <summary>
 Send amanda_server packets.
 </summary>
@@ -14903,7 +14288,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="6409">
 <summary>
 Do not audit attempts to send amanda_server packets.
 </summary>
@@ -14914,7 +14299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7382">
+<interface name="corenet_receive_amanda_server_packets" lineno="6428">
 <summary>
 Receive amanda_server packets.
 </summary>
@@ -14925,7 +14310,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="6447">
 <summary>
 Do not audit attempts to receive amanda_server packets.
 </summary>
@@ -14936,7 +14321,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="6466">
 <summary>
 Send and receive amanda_server packets.
 </summary>
@@ -14947,7 +14332,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="6482">
 <summary>
 Do not audit attempts to send and receive amanda_server packets.
 </summary>
@@ -14958,7 +14343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7451">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="6497">
 <summary>
 Relabel packets to amanda_server the packet type.
 </summary>
@@ -14968,85 +14353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473">
-<summary>
-Send and receive TCP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488">
-<summary>
-Send UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503">
-<summary>
-Do not audit attempts to send UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518">
-<summary>
-Receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533">
-<summary>
-Do not audit attempts to receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548">
-<summary>
-Send and receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="6519">
 <summary>
 Bind TCP sockets to the amavisd_recv port.
 </summary>
@@ -15057,7 +14364,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="6539">
 <summary>
 Bind UDP sockets to the amavisd_recv port.
 </summary>
@@ -15068,7 +14375,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="6558">
 <summary>
 Make a TCP connection to the amavisd_recv port.
 </summary>
@@ -15078,7 +14385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="6578">
 <summary>
 Send amavisd_recv_client packets.
 </summary>
@@ -15089,7 +14396,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="6597">
 <summary>
 Do not audit attempts to send amavisd_recv_client packets.
 </summary>
@@ -15100,7 +14407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="6616">
 <summary>
 Receive amavisd_recv_client packets.
 </summary>
@@ -15111,7 +14418,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="6635">
 <summary>
 Do not audit attempts to receive amavisd_recv_client packets.
 </summary>
@@ -15122,7 +14429,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="6654">
 <summary>
 Send and receive amavisd_recv_client packets.
 </summary>
@@ -15133,7 +14440,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="6670">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_client packets.
 </summary>
@@ -15144,7 +14451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="6685">
 <summary>
 Relabel packets to amavisd_recv_client the packet type.
 </summary>
@@ -15154,7 +14461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="6705">
 <summary>
 Send amavisd_recv_server packets.
 </summary>
@@ -15165,7 +14472,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="6724">
 <summary>
 Do not audit attempts to send amavisd_recv_server packets.
 </summary>
@@ -15176,7 +14483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="6743">
 <summary>
 Receive amavisd_recv_server packets.
 </summary>
@@ -15187,7 +14494,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="6762">
 <summary>
 Do not audit attempts to receive amavisd_recv_server packets.
 </summary>
@@ -15198,7 +14505,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="6781">
 <summary>
 Send and receive amavisd_recv_server packets.
 </summary>
@@ -15209,7 +14516,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="6797">
 <summary>
 Do not audit attempts to send and receive amavisd_recv_server packets.
 </summary>
@@ -15220,7 +14527,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="6812">
 <summary>
 Relabel packets to amavisd_recv_server the packet type.
 </summary>
@@ -15230,85 +14537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894">
-<summary>
-Send and receive TCP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7909">
-<summary>
-Send UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924">
-<summary>
-Do not audit attempts to send UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939">
-<summary>
-Receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954">
-<summary>
-Do not audit attempts to receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969">
-<summary>
-Send and receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="6834">
 <summary>
 Bind TCP sockets to the amavisd_send port.
 </summary>
@@ -15319,7 +14548,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="6854">
 <summary>
 Bind UDP sockets to the amavisd_send port.
 </summary>
@@ -15330,7 +14559,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="6873">
 <summary>
 Make a TCP connection to the amavisd_send port.
 </summary>
@@ -15340,7 +14569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="8059">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="6893">
 <summary>
 Send amavisd_send_client packets.
 </summary>
@@ -15351,7 +14580,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="6912">
 <summary>
 Do not audit attempts to send amavisd_send_client packets.
 </summary>
@@ -15362,7 +14591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="6931">
 <summary>
 Receive amavisd_send_client packets.
 </summary>
@@ -15373,7 +14602,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="6950">
 <summary>
 Do not audit attempts to receive amavisd_send_client packets.
 </summary>
@@ -15384,7 +14613,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="6969">
 <summary>
 Send and receive amavisd_send_client packets.
 </summary>
@@ -15395,7 +14624,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="6985">
 <summary>
 Do not audit attempts to send and receive amavisd_send_client packets.
 </summary>
@@ -15406,7 +14635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="7000">
 <summary>
 Relabel packets to amavisd_send_client the packet type.
 </summary>
@@ -15416,7 +14645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8186">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="7020">
 <summary>
 Send amavisd_send_server packets.
 </summary>
@@ -15427,7 +14656,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="7039">
 <summary>
 Do not audit attempts to send amavisd_send_server packets.
 </summary>
@@ -15438,7 +14667,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="7058">
 <summary>
 Receive amavisd_send_server packets.
 </summary>
@@ -15449,7 +14678,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="7077">
 <summary>
 Do not audit attempts to receive amavisd_send_server packets.
 </summary>
@@ -15460,7 +14689,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="7096">
 <summary>
 Send and receive amavisd_send_server packets.
 </summary>
@@ -15471,7 +14700,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="7112">
 <summary>
 Do not audit attempts to send and receive amavisd_send_server packets.
 </summary>
@@ -15482,7 +14711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="7127">
 <summary>
 Relabel packets to amavisd_send_server the packet type.
 </summary>
@@ -15492,85 +14721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315">
-<summary>
-Send and receive TCP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8330">
-<summary>
-Send UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345">
-<summary>
-Do not audit attempts to send UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8360">
-<summary>
-Receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375">
-<summary>
-Do not audit attempts to receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390">
-<summary>
-Send and receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8421">
+<interface name="corenet_tcp_bind_amqp_port" lineno="7149">
 <summary>
 Bind TCP sockets to the amqp port.
 </summary>
@@ -15581,7 +14732,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8441">
+<interface name="corenet_udp_bind_amqp_port" lineno="7169">
 <summary>
 Bind UDP sockets to the amqp port.
 </summary>
@@ -15592,7 +14743,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8460">
+<interface name="corenet_tcp_connect_amqp_port" lineno="7188">
 <summary>
 Make a TCP connection to the amqp port.
 </summary>
@@ -15602,7 +14753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8480">
+<interface name="corenet_send_amqp_client_packets" lineno="7208">
 <summary>
 Send amqp_client packets.
 </summary>
@@ -15613,7 +14764,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="7227">
 <summary>
 Do not audit attempts to send amqp_client packets.
 </summary>
@@ -15624,7 +14775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8518">
+<interface name="corenet_receive_amqp_client_packets" lineno="7246">
 <summary>
 Receive amqp_client packets.
 </summary>
@@ -15635,7 +14786,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="7265">
 <summary>
 Do not audit attempts to receive amqp_client packets.
 </summary>
@@ -15646,7 +14797,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="7284">
 <summary>
 Send and receive amqp_client packets.
 </summary>
@@ -15657,7 +14808,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="7300">
 <summary>
 Do not audit attempts to send and receive amqp_client packets.
 </summary>
@@ -15668,7 +14819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8587">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="7315">
 <summary>
 Relabel packets to amqp_client the packet type.
 </summary>
@@ -15678,7 +14829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8607">
+<interface name="corenet_send_amqp_server_packets" lineno="7335">
 <summary>
 Send amqp_server packets.
 </summary>
@@ -15689,7 +14840,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="7354">
 <summary>
 Do not audit attempts to send amqp_server packets.
 </summary>
@@ -15700,7 +14851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8645">
+<interface name="corenet_receive_amqp_server_packets" lineno="7373">
 <summary>
 Receive amqp_server packets.
 </summary>
@@ -15711,7 +14862,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="7392">
 <summary>
 Do not audit attempts to receive amqp_server packets.
 </summary>
@@ -15722,7 +14873,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="7411">
 <summary>
 Send and receive amqp_server packets.
 </summary>
@@ -15733,7 +14884,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="7427">
 <summary>
 Do not audit attempts to send and receive amqp_server packets.
 </summary>
@@ -15744,7 +14895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8714">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="7442">
 <summary>
 Relabel packets to amqp_server the packet type.
 </summary>
@@ -15754,85 +14905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736">
-<summary>
-Send and receive TCP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_aol_port" lineno="8751">
-<summary>
-Send UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766">
-<summary>
-Do not audit attempts to send UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8781">
-<summary>
-Receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796">
-<summary>
-Do not audit attempts to receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8811">
-<summary>
-Send and receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8842">
+<interface name="corenet_tcp_bind_aol_port" lineno="7464">
 <summary>
 Bind TCP sockets to the aol port.
 </summary>
@@ -15843,7 +14916,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8862">
+<interface name="corenet_udp_bind_aol_port" lineno="7484">
 <summary>
 Bind UDP sockets to the aol port.
 </summary>
@@ -15854,7 +14927,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8881">
+<interface name="corenet_tcp_connect_aol_port" lineno="7503">
 <summary>
 Make a TCP connection to the aol port.
 </summary>
@@ -15864,7 +14937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_client_packets" lineno="8901">
+<interface name="corenet_send_aol_client_packets" lineno="7523">
 <summary>
 Send aol_client packets.
 </summary>
@@ -15875,7 +14948,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="7542">
 <summary>
 Do not audit attempts to send aol_client packets.
 </summary>
@@ -15886,7 +14959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8939">
+<interface name="corenet_receive_aol_client_packets" lineno="7561">
 <summary>
 Receive aol_client packets.
 </summary>
@@ -15897,7 +14970,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="7580">
 <summary>
 Do not audit attempts to receive aol_client packets.
 </summary>
@@ -15908,7 +14981,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8977">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="7599">
 <summary>
 Send and receive aol_client packets.
 </summary>
@@ -15919,7 +14992,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="7615">
 <summary>
 Do not audit attempts to send and receive aol_client packets.
 </summary>
@@ -15930,7 +15003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="9008">
+<interface name="corenet_relabelto_aol_client_packets" lineno="7630">
 <summary>
 Relabel packets to aol_client the packet type.
 </summary>
@@ -15940,7 +15013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aol_server_packets" lineno="9028">
+<interface name="corenet_send_aol_server_packets" lineno="7650">
 <summary>
 Send aol_server packets.
 </summary>
@@ -15951,7 +15024,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="7669">
 <summary>
 Do not audit attempts to send aol_server packets.
 </summary>
@@ -15962,7 +15035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aol_server_packets" lineno="9066">
+<interface name="corenet_receive_aol_server_packets" lineno="7688">
 <summary>
 Receive aol_server packets.
 </summary>
@@ -15973,7 +15046,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="7707">
 <summary>
 Do not audit attempts to receive aol_server packets.
 </summary>
@@ -15984,7 +15057,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="9104">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="7726">
 <summary>
 Send and receive aol_server packets.
 </summary>
@@ -15995,7 +15068,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="7742">
 <summary>
 Do not audit attempts to send and receive aol_server packets.
 </summary>
@@ -16006,7 +15079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="9135">
+<interface name="corenet_relabelto_aol_server_packets" lineno="7757">
 <summary>
 Relabel packets to aol_server the packet type.
 </summary>
@@ -16016,85 +15089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157">
-<summary>
-Send and receive TCP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9172">
-<summary>
-Send UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187">
-<summary>
-Do not audit attempts to send UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9202">
-<summary>
-Receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217">
-<summary>
-Do not audit attempts to receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232">
-<summary>
-Send and receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="7779">
 <summary>
 Bind TCP sockets to the apcupsd port.
 </summary>
@@ -16105,7 +15100,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9283">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="7799">
 <summary>
 Bind UDP sockets to the apcupsd port.
 </summary>
@@ -16116,7 +15111,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="7818">
 <summary>
 Make a TCP connection to the apcupsd port.
 </summary>
@@ -16126,7 +15121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9322">
+<interface name="corenet_send_apcupsd_client_packets" lineno="7838">
 <summary>
 Send apcupsd_client packets.
 </summary>
@@ -16137,7 +15132,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="7857">
 <summary>
 Do not audit attempts to send apcupsd_client packets.
 </summary>
@@ -16148,7 +15143,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9360">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="7876">
 <summary>
 Receive apcupsd_client packets.
 </summary>
@@ -16159,7 +15154,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="7895">
 <summary>
 Do not audit attempts to receive apcupsd_client packets.
 </summary>
@@ -16170,7 +15165,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="7914">
 <summary>
 Send and receive apcupsd_client packets.
 </summary>
@@ -16181,7 +15176,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="7930">
 <summary>
 Do not audit attempts to send and receive apcupsd_client packets.
 </summary>
@@ -16192,7 +15187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="7945">
 <summary>
 Relabel packets to apcupsd_client the packet type.
 </summary>
@@ -16202,7 +15197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9449">
+<interface name="corenet_send_apcupsd_server_packets" lineno="7965">
 <summary>
 Send apcupsd_server packets.
 </summary>
@@ -16213,7 +15208,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="7984">
 <summary>
 Do not audit attempts to send apcupsd_server packets.
 </summary>
@@ -16224,7 +15219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9487">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="8003">
 <summary>
 Receive apcupsd_server packets.
 </summary>
@@ -16235,7 +15230,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="8022">
 <summary>
 Do not audit attempts to receive apcupsd_server packets.
 </summary>
@@ -16246,7 +15241,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="8041">
 <summary>
 Send and receive apcupsd_server packets.
 </summary>
@@ -16257,7 +15252,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="8057">
 <summary>
 Do not audit attempts to send and receive apcupsd_server packets.
 </summary>
@@ -16268,7 +15263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="8072">
 <summary>
 Relabel packets to apcupsd_server the packet type.
 </summary>
@@ -16278,85 +15273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578">
-<summary>
-Send and receive TCP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593">
-<summary>
-Send UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608">
-<summary>
-Do not audit attempts to send UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623">
-<summary>
-Receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638">
-<summary>
-Do not audit attempts to receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653">
-<summary>
-Send and receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="8094">
 <summary>
 Bind TCP sockets to the apertus_ldp port.
 </summary>
@@ -16367,7 +15284,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="8114">
 <summary>
 Bind UDP sockets to the apertus_ldp port.
 </summary>
@@ -16378,7 +15295,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="8133">
 <summary>
 Make a TCP connection to the apertus_ldp port.
 </summary>
@@ -16388,7 +15305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="8153">
 <summary>
 Send apertus_ldp_client packets.
 </summary>
@@ -16399,7 +15316,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="8172">
 <summary>
 Do not audit attempts to send apertus_ldp_client packets.
 </summary>
@@ -16410,7 +15327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="8191">
 <summary>
 Receive apertus_ldp_client packets.
 </summary>
@@ -16421,7 +15338,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="8210">
 <summary>
 Do not audit attempts to receive apertus_ldp_client packets.
 </summary>
@@ -16432,7 +15349,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="8229">
 <summary>
 Send and receive apertus_ldp_client packets.
 </summary>
@@ -16443,7 +15360,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="8245">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_client packets.
 </summary>
@@ -16454,7 +15371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="8260">
 <summary>
 Relabel packets to apertus_ldp_client the packet type.
 </summary>
@@ -16464,7 +15381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="8280">
 <summary>
 Send apertus_ldp_server packets.
 </summary>
@@ -16475,7 +15392,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="8299">
 <summary>
 Do not audit attempts to send apertus_ldp_server packets.
 </summary>
@@ -16486,7 +15403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="8318">
 <summary>
 Receive apertus_ldp_server packets.
 </summary>
@@ -16497,7 +15414,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="8337">
 <summary>
 Do not audit attempts to receive apertus_ldp_server packets.
 </summary>
@@ -16508,7 +15425,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="8356">
 <summary>
 Send and receive apertus_ldp_server packets.
 </summary>
@@ -16519,7 +15436,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="8372">
 <summary>
 Do not audit attempts to send and receive apertus_ldp_server packets.
 </summary>
@@ -16530,7 +15447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="8387">
 <summary>
 Relabel packets to apertus_ldp_server the packet type.
 </summary>
@@ -16540,85 +15457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999">
-<summary>
-Send and receive TCP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_aptcacher_port" lineno="10014">
-<summary>
-Send UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029">
-<summary>
-Do not audit attempts to send UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_aptcacher_port" lineno="10044">
-<summary>
-Receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059">
-<summary>
-Do not audit attempts to receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074">
-<summary>
-Send and receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105">
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="8409">
 <summary>
 Bind TCP sockets to the aptcacher port.
 </summary>
@@ -16629,7 +15468,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_aptcacher_port" lineno="10125">
+<interface name="corenet_udp_bind_aptcacher_port" lineno="8429">
 <summary>
 Bind UDP sockets to the aptcacher port.
 </summary>
@@ -16640,7 +15479,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144">
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="8448">
 <summary>
 Make a TCP connection to the aptcacher port.
 </summary>
@@ -16650,7 +15489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aptcacher_client_packets" lineno="10164">
+<interface name="corenet_send_aptcacher_client_packets" lineno="8468">
 <summary>
 Send aptcacher_client packets.
 </summary>
@@ -16661,7 +15500,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183">
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="8487">
 <summary>
 Do not audit attempts to send aptcacher_client packets.
 </summary>
@@ -16672,7 +15511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aptcacher_client_packets" lineno="10202">
+<interface name="corenet_receive_aptcacher_client_packets" lineno="8506">
 <summary>
 Receive aptcacher_client packets.
 </summary>
@@ -16683,7 +15522,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221">
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="8525">
 <summary>
 Do not audit attempts to receive aptcacher_client packets.
 </summary>
@@ -16694,7 +15533,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240">
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="8544">
 <summary>
 Send and receive aptcacher_client packets.
 </summary>
@@ -16705,7 +15544,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="8560">
 <summary>
 Do not audit attempts to send and receive aptcacher_client packets.
 </summary>
@@ -16716,7 +15555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271">
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="8575">
 <summary>
 Relabel packets to aptcacher_client the packet type.
 </summary>
@@ -16726,7 +15565,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_aptcacher_server_packets" lineno="10291">
+<interface name="corenet_send_aptcacher_server_packets" lineno="8595">
 <summary>
 Send aptcacher_server packets.
 </summary>
@@ -16737,7 +15576,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310">
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="8614">
 <summary>
 Do not audit attempts to send aptcacher_server packets.
 </summary>
@@ -16748,7 +15587,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_aptcacher_server_packets" lineno="10329">
+<interface name="corenet_receive_aptcacher_server_packets" lineno="8633">
 <summary>
 Receive aptcacher_server packets.
 </summary>
@@ -16759,7 +15598,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348">
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="8652">
 <summary>
 Do not audit attempts to receive aptcacher_server packets.
 </summary>
@@ -16770,7 +15609,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367">
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="8671">
 <summary>
 Send and receive aptcacher_server packets.
 </summary>
@@ -16781,7 +15620,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="8687">
 <summary>
 Do not audit attempts to send and receive aptcacher_server packets.
 </summary>
@@ -16792,7 +15631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398">
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="8702">
 <summary>
 Relabel packets to aptcacher_server the packet type.
 </summary>
@@ -16802,85 +15641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420">
-<summary>
-Send and receive TCP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435">
-<summary>
-Send UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450">
-<summary>
-Do not audit attempts to send UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465">
-<summary>
-Receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480">
-<summary>
-Do not audit attempts to receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495">
-<summary>
-Send and receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="8724">
 <summary>
 Bind TCP sockets to the armtechdaemon port.
 </summary>
@@ -16891,7 +15652,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="8744">
 <summary>
 Bind UDP sockets to the armtechdaemon port.
 </summary>
@@ -16902,7 +15663,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="8763">
 <summary>
 Make a TCP connection to the armtechdaemon port.
 </summary>
@@ -16912,7 +15673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="8783">
 <summary>
 Send armtechdaemon_client packets.
 </summary>
@@ -16923,7 +15684,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="8802">
 <summary>
 Do not audit attempts to send armtechdaemon_client packets.
 </summary>
@@ -16934,7 +15695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="8821">
 <summary>
 Receive armtechdaemon_client packets.
 </summary>
@@ -16945,7 +15706,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="8840">
 <summary>
 Do not audit attempts to receive armtechdaemon_client packets.
 </summary>
@@ -16956,7 +15717,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="8859">
 <summary>
 Send and receive armtechdaemon_client packets.
 </summary>
@@ -16967,7 +15728,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="8875">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_client packets.
 </summary>
@@ -16978,7 +15739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="8890">
 <summary>
 Relabel packets to armtechdaemon_client the packet type.
 </summary>
@@ -16988,7 +15749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="8910">
 <summary>
 Send armtechdaemon_server packets.
 </summary>
@@ -16999,7 +15760,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="8929">
 <summary>
 Do not audit attempts to send armtechdaemon_server packets.
 </summary>
@@ -17010,7 +15771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="8948">
 <summary>
 Receive armtechdaemon_server packets.
 </summary>
@@ -17021,7 +15782,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="8967">
 <summary>
 Do not audit attempts to receive armtechdaemon_server packets.
 </summary>
@@ -17032,7 +15793,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="8986">
 <summary>
 Send and receive armtechdaemon_server packets.
 </summary>
@@ -17043,7 +15804,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="9002">
 <summary>
 Do not audit attempts to send and receive armtechdaemon_server packets.
 </summary>
@@ -17054,7 +15815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="9017">
 <summary>
 Relabel packets to armtechdaemon_server the packet type.
 </summary>
@@ -17064,85 +15825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841">
-<summary>
-Send and receive TCP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10856">
-<summary>
-Send UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871">
-<summary>
-Do not audit attempts to send UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10886">
-<summary>
-Receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901">
-<summary>
-Do not audit attempts to receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916">
-<summary>
-Send and receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10947">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="9039">
 <summary>
 Bind TCP sockets to the asterisk port.
 </summary>
@@ -17153,7 +15836,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10967">
+<interface name="corenet_udp_bind_asterisk_port" lineno="9059">
 <summary>
 Bind UDP sockets to the asterisk port.
 </summary>
@@ -17164,7 +15847,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10986">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="9078">
 <summary>
 Make a TCP connection to the asterisk port.
 </summary>
@@ -17174,7 +15857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="11006">
+<interface name="corenet_send_asterisk_client_packets" lineno="9098">
 <summary>
 Send asterisk_client packets.
 </summary>
@@ -17185,7 +15868,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="9117">
 <summary>
 Do not audit attempts to send asterisk_client packets.
 </summary>
@@ -17196,7 +15879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="11044">
+<interface name="corenet_receive_asterisk_client_packets" lineno="9136">
 <summary>
 Receive asterisk_client packets.
 </summary>
@@ -17207,7 +15890,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="9155">
 <summary>
 Do not audit attempts to receive asterisk_client packets.
 </summary>
@@ -17218,7 +15901,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="9174">
 <summary>
 Send and receive asterisk_client packets.
 </summary>
@@ -17229,7 +15912,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="9190">
 <summary>
 Do not audit attempts to send and receive asterisk_client packets.
 </summary>
@@ -17240,7 +15923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="9205">
 <summary>
 Relabel packets to asterisk_client the packet type.
 </summary>
@@ -17250,7 +15933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="11133">
+<interface name="corenet_send_asterisk_server_packets" lineno="9225">
 <summary>
 Send asterisk_server packets.
 </summary>
@@ -17261,7 +15944,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="9244">
 <summary>
 Do not audit attempts to send asterisk_server packets.
 </summary>
@@ -17272,7 +15955,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="11171">
+<interface name="corenet_receive_asterisk_server_packets" lineno="9263">
 <summary>
 Receive asterisk_server packets.
 </summary>
@@ -17283,7 +15966,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="9282">
 <summary>
 Do not audit attempts to receive asterisk_server packets.
 </summary>
@@ -17294,7 +15977,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="9301">
 <summary>
 Send and receive asterisk_server packets.
 </summary>
@@ -17305,7 +15988,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="9317">
 <summary>
 Do not audit attempts to send and receive asterisk_server packets.
 </summary>
@@ -17316,7 +15999,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="9332">
 <summary>
 Relabel packets to asterisk_server the packet type.
 </summary>
@@ -17326,85 +16009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262">
-<summary>
-Send and receive TCP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_audit_port" lineno="11277">
-<summary>
-Send UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292">
-<summary>
-Do not audit attempts to send UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_audit_port" lineno="11307">
-<summary>
-Receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322">
-<summary>
-Do not audit attempts to receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="11337">
-<summary>
-Send and receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="11368">
+<interface name="corenet_tcp_bind_audit_port" lineno="9354">
 <summary>
 Bind TCP sockets to the audit port.
 </summary>
@@ -17415,7 +16020,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_audit_port" lineno="11388">
+<interface name="corenet_udp_bind_audit_port" lineno="9374">
 <summary>
 Bind UDP sockets to the audit port.
 </summary>
@@ -17426,7 +16031,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="11407">
+<interface name="corenet_tcp_connect_audit_port" lineno="9393">
 <summary>
 Make a TCP connection to the audit port.
 </summary>
@@ -17436,7 +16041,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_client_packets" lineno="11427">
+<interface name="corenet_send_audit_client_packets" lineno="9413">
 <summary>
 Send audit_client packets.
 </summary>
@@ -17447,7 +16052,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="9432">
 <summary>
 Do not audit attempts to send audit_client packets.
 </summary>
@@ -17458,7 +16063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_client_packets" lineno="11465">
+<interface name="corenet_receive_audit_client_packets" lineno="9451">
 <summary>
 Receive audit_client packets.
 </summary>
@@ -17469,7 +16074,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="9470">
 <summary>
 Do not audit attempts to receive audit_client packets.
 </summary>
@@ -17480,7 +16085,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="11503">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="9489">
 <summary>
 Send and receive audit_client packets.
 </summary>
@@ -17491,7 +16096,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="9505">
 <summary>
 Do not audit attempts to send and receive audit_client packets.
 </summary>
@@ -17502,7 +16107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="11534">
+<interface name="corenet_relabelto_audit_client_packets" lineno="9520">
 <summary>
 Relabel packets to audit_client the packet type.
 </summary>
@@ -17512,7 +16117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_audit_server_packets" lineno="11554">
+<interface name="corenet_send_audit_server_packets" lineno="9540">
 <summary>
 Send audit_server packets.
 </summary>
@@ -17523,7 +16128,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="9559">
 <summary>
 Do not audit attempts to send audit_server packets.
 </summary>
@@ -17534,7 +16139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11592">
+<interface name="corenet_receive_audit_server_packets" lineno="9578">
 <summary>
 Receive audit_server packets.
 </summary>
@@ -17545,7 +16150,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="9597">
 <summary>
 Do not audit attempts to receive audit_server packets.
 </summary>
@@ -17556,7 +16161,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11630">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="9616">
 <summary>
 Send and receive audit_server packets.
 </summary>
@@ -17567,7 +16172,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="9632">
 <summary>
 Do not audit attempts to send and receive audit_server packets.
 </summary>
@@ -17578,7 +16183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11661">
+<interface name="corenet_relabelto_audit_server_packets" lineno="9647">
 <summary>
 Relabel packets to audit_server the packet type.
 </summary>
@@ -17588,85 +16193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683">
-<summary>
-Send and receive TCP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_auth_port" lineno="11698">
-<summary>
-Send UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713">
-<summary>
-Do not audit attempts to send UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11728">
-<summary>
-Receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743">
-<summary>
-Do not audit attempts to receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11758">
-<summary>
-Send and receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11789">
+<interface name="corenet_tcp_bind_auth_port" lineno="9669">
 <summary>
 Bind TCP sockets to the auth port.
 </summary>
@@ -17677,7 +16204,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11809">
+<interface name="corenet_udp_bind_auth_port" lineno="9689">
 <summary>
 Bind UDP sockets to the auth port.
 </summary>
@@ -17688,7 +16215,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11828">
+<interface name="corenet_tcp_connect_auth_port" lineno="9708">
 <summary>
 Make a TCP connection to the auth port.
 </summary>
@@ -17698,7 +16225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_client_packets" lineno="11848">
+<interface name="corenet_send_auth_client_packets" lineno="9728">
 <summary>
 Send auth_client packets.
 </summary>
@@ -17709,7 +16236,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="9747">
 <summary>
 Do not audit attempts to send auth_client packets.
 </summary>
@@ -17720,7 +16247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11886">
+<interface name="corenet_receive_auth_client_packets" lineno="9766">
 <summary>
 Receive auth_client packets.
 </summary>
@@ -17731,7 +16258,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="9785">
 <summary>
 Do not audit attempts to receive auth_client packets.
 </summary>
@@ -17742,7 +16269,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11924">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="9804">
 <summary>
 Send and receive auth_client packets.
 </summary>
@@ -17753,7 +16280,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="9820">
 <summary>
 Do not audit attempts to send and receive auth_client packets.
 </summary>
@@ -17764,7 +16291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11955">
+<interface name="corenet_relabelto_auth_client_packets" lineno="9835">
 <summary>
 Relabel packets to auth_client the packet type.
 </summary>
@@ -17774,7 +16301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_auth_server_packets" lineno="11975">
+<interface name="corenet_send_auth_server_packets" lineno="9855">
 <summary>
 Send auth_server packets.
 </summary>
@@ -17785,7 +16312,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="9874">
 <summary>
 Do not audit attempts to send auth_server packets.
 </summary>
@@ -17796,7 +16323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_auth_server_packets" lineno="12013">
+<interface name="corenet_receive_auth_server_packets" lineno="9893">
 <summary>
 Receive auth_server packets.
 </summary>
@@ -17807,7 +16334,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="9912">
 <summary>
 Do not audit attempts to receive auth_server packets.
 </summary>
@@ -17818,7 +16345,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="12051">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="9931">
 <summary>
 Send and receive auth_server packets.
 </summary>
@@ -17829,7 +16356,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="9947">
 <summary>
 Do not audit attempts to send and receive auth_server packets.
 </summary>
@@ -17840,7 +16367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="12082">
+<interface name="corenet_relabelto_auth_server_packets" lineno="9962">
 <summary>
 Relabel packets to auth_server the packet type.
 </summary>
@@ -17850,85 +16377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104">
-<summary>
-Send and receive TCP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_bgp_port" lineno="12119">
-<summary>
-Send UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134">
-<summary>
-Do not audit attempts to send UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="12149">
-<summary>
-Receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164">
-<summary>
-Do not audit attempts to receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179">
-<summary>
-Send and receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="12210">
+<interface name="corenet_tcp_bind_bgp_port" lineno="9984">
 <summary>
 Bind TCP sockets to the bgp port.
 </summary>
@@ -17939,7 +16388,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="12230">
+<interface name="corenet_udp_bind_bgp_port" lineno="10004">
 <summary>
 Bind UDP sockets to the bgp port.
 </summary>
@@ -17950,7 +16399,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="12249">
+<interface name="corenet_tcp_connect_bgp_port" lineno="10023">
 <summary>
 Make a TCP connection to the bgp port.
 </summary>
@@ -17960,7 +16409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_client_packets" lineno="12269">
+<interface name="corenet_send_bgp_client_packets" lineno="10043">
 <summary>
 Send bgp_client packets.
 </summary>
@@ -17971,7 +16420,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="10062">
 <summary>
 Do not audit attempts to send bgp_client packets.
 </summary>
@@ -17982,7 +16431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="12307">
+<interface name="corenet_receive_bgp_client_packets" lineno="10081">
 <summary>
 Receive bgp_client packets.
 </summary>
@@ -17993,7 +16442,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="10100">
 <summary>
 Do not audit attempts to receive bgp_client packets.
 </summary>
@@ -18004,7 +16453,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="10119">
 <summary>
 Send and receive bgp_client packets.
 </summary>
@@ -18015,7 +16464,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="10135">
 <summary>
 Do not audit attempts to send and receive bgp_client packets.
 </summary>
@@ -18026,7 +16475,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="12376">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="10150">
 <summary>
 Relabel packets to bgp_client the packet type.
 </summary>
@@ -18036,7 +16485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bgp_server_packets" lineno="12396">
+<interface name="corenet_send_bgp_server_packets" lineno="10170">
 <summary>
 Send bgp_server packets.
 </summary>
@@ -18047,7 +16496,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="10189">
 <summary>
 Do not audit attempts to send bgp_server packets.
 </summary>
@@ -18058,7 +16507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="12434">
+<interface name="corenet_receive_bgp_server_packets" lineno="10208">
 <summary>
 Receive bgp_server packets.
 </summary>
@@ -18069,7 +16518,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="10227">
 <summary>
 Do not audit attempts to receive bgp_server packets.
 </summary>
@@ -18080,7 +16529,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="10246">
 <summary>
 Send and receive bgp_server packets.
 </summary>
@@ -18091,7 +16540,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="10262">
 <summary>
 Do not audit attempts to send and receive bgp_server packets.
 </summary>
@@ -18102,7 +16551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="12503">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="10277">
 <summary>
 Relabel packets to bgp_server the packet type.
 </summary>
@@ -18112,85 +16561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525">
-<summary>
-Send and receive TCP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="12540">
-<summary>
-Send UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555">
-<summary>
-Do not audit attempts to send UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12570">
-<summary>
-Receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585">
-<summary>
-Do not audit attempts to receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600">
-<summary>
-Send and receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="10299">
 <summary>
 Bind TCP sockets to the bitcoin port.
 </summary>
@@ -18201,7 +16572,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12651">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="10319">
 <summary>
 Bind UDP sockets to the bitcoin port.
 </summary>
@@ -18212,7 +16583,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="10338">
 <summary>
 Make a TCP connection to the bitcoin port.
 </summary>
@@ -18222,7 +16593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12690">
+<interface name="corenet_send_bitcoin_client_packets" lineno="10358">
 <summary>
 Send bitcoin_client packets.
 </summary>
@@ -18233,7 +16604,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="10377">
 <summary>
 Do not audit attempts to send bitcoin_client packets.
 </summary>
@@ -18244,7 +16615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12728">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="10396">
 <summary>
 Receive bitcoin_client packets.
 </summary>
@@ -18255,7 +16626,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="10415">
 <summary>
 Do not audit attempts to receive bitcoin_client packets.
 </summary>
@@ -18266,7 +16637,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="10434">
 <summary>
 Send and receive bitcoin_client packets.
 </summary>
@@ -18277,7 +16648,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="10450">
 <summary>
 Do not audit attempts to send and receive bitcoin_client packets.
 </summary>
@@ -18288,7 +16659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="10465">
 <summary>
 Relabel packets to bitcoin_client the packet type.
 </summary>
@@ -18298,7 +16669,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12817">
+<interface name="corenet_send_bitcoin_server_packets" lineno="10485">
 <summary>
 Send bitcoin_server packets.
 </summary>
@@ -18309,7 +16680,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="10504">
 <summary>
 Do not audit attempts to send bitcoin_server packets.
 </summary>
@@ -18320,7 +16691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12855">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="10523">
 <summary>
 Receive bitcoin_server packets.
 </summary>
@@ -18331,7 +16702,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="10542">
 <summary>
 Do not audit attempts to receive bitcoin_server packets.
 </summary>
@@ -18342,7 +16713,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="10561">
 <summary>
 Send and receive bitcoin_server packets.
 </summary>
@@ -18353,7 +16724,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="10577">
 <summary>
 Do not audit attempts to send and receive bitcoin_server packets.
 </summary>
@@ -18364,7 +16735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="10592">
 <summary>
 Relabel packets to bitcoin_server the packet type.
 </summary>
@@ -18374,85 +16745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946">
-<summary>
-Send and receive TCP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12961">
-<summary>
-Send UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976">
-<summary>
-Do not audit attempts to send UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12991">
-<summary>
-Receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006">
-<summary>
-Do not audit attempts to receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021">
-<summary>
-Send and receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="13052">
+<interface name="corenet_tcp_bind_boinc_port" lineno="10614">
 <summary>
 Bind TCP sockets to the boinc port.
 </summary>
@@ -18463,7 +16756,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="13072">
+<interface name="corenet_udp_bind_boinc_port" lineno="10634">
 <summary>
 Bind UDP sockets to the boinc port.
 </summary>
@@ -18474,7 +16767,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="13091">
+<interface name="corenet_tcp_connect_boinc_port" lineno="10653">
 <summary>
 Make a TCP connection to the boinc port.
 </summary>
@@ -18484,7 +16777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_packets" lineno="13111">
+<interface name="corenet_send_boinc_client_packets" lineno="10673">
 <summary>
 Send boinc_client packets.
 </summary>
@@ -18495,7 +16788,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="10692">
 <summary>
 Do not audit attempts to send boinc_client packets.
 </summary>
@@ -18506,7 +16799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="13149">
+<interface name="corenet_receive_boinc_client_packets" lineno="10711">
 <summary>
 Receive boinc_client packets.
 </summary>
@@ -18517,7 +16810,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="10730">
 <summary>
 Do not audit attempts to receive boinc_client packets.
 </summary>
@@ -18528,7 +16821,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="10749">
 <summary>
 Send and receive boinc_client packets.
 </summary>
@@ -18539,7 +16832,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="10765">
 <summary>
 Do not audit attempts to send and receive boinc_client packets.
 </summary>
@@ -18550,7 +16843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="13218">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="10780">
 <summary>
 Relabel packets to boinc_client the packet type.
 </summary>
@@ -18560,7 +16853,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_server_packets" lineno="13238">
+<interface name="corenet_send_boinc_server_packets" lineno="10800">
 <summary>
 Send boinc_server packets.
 </summary>
@@ -18571,7 +16864,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="10819">
 <summary>
 Do not audit attempts to send boinc_server packets.
 </summary>
@@ -18582,7 +16875,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="13276">
+<interface name="corenet_receive_boinc_server_packets" lineno="10838">
 <summary>
 Receive boinc_server packets.
 </summary>
@@ -18593,7 +16886,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="10857">
 <summary>
 Do not audit attempts to receive boinc_server packets.
 </summary>
@@ -18604,7 +16897,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="10876">
 <summary>
 Send and receive boinc_server packets.
 </summary>
@@ -18615,7 +16908,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="10892">
 <summary>
 Do not audit attempts to send and receive boinc_server packets.
 </summary>
@@ -18626,7 +16919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="13345">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="10907">
 <summary>
 Relabel packets to boinc_server the packet type.
 </summary>
@@ -18636,85 +16929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367">
-<summary>
-Send and receive TCP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="13382">
-<summary>
-Send UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397">
-<summary>
-Do not audit attempts to send UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="13412">
-<summary>
-Receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427">
-<summary>
-Do not audit attempts to receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442">
-<summary>
-Send and receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="10929">
 <summary>
 Bind TCP sockets to the boinc_client port.
 </summary>
@@ -18725,7 +16940,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="10949">
 <summary>
 Bind UDP sockets to the boinc_client port.
 </summary>
@@ -18736,7 +16951,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="10968">
 <summary>
 Make a TCP connection to the boinc_client port.
 </summary>
@@ -18746,7 +16961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
+<interface name="corenet_send_boinc_client_client_packets" lineno="10988">
 <summary>
 Send boinc_client_client packets.
 </summary>
@@ -18757,7 +16972,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="11007">
 <summary>
 Do not audit attempts to send boinc_client_client packets.
 </summary>
@@ -18768,7 +16983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="11026">
 <summary>
 Receive boinc_client_client packets.
 </summary>
@@ -18779,7 +16994,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="11045">
 <summary>
 Do not audit attempts to receive boinc_client_client packets.
 </summary>
@@ -18790,7 +17005,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="11064">
 <summary>
 Send and receive boinc_client_client packets.
 </summary>
@@ -18801,7 +17016,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="11080">
 <summary>
 Do not audit attempts to send and receive boinc_client_client packets.
 </summary>
@@ -18812,7 +17027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="11095">
 <summary>
 Relabel packets to boinc_client_client the packet type.
 </summary>
@@ -18822,7 +17037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
+<interface name="corenet_send_boinc_client_server_packets" lineno="11115">
 <summary>
 Send boinc_client_server packets.
 </summary>
@@ -18833,7 +17048,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="11134">
 <summary>
 Do not audit attempts to send boinc_client_server packets.
 </summary>
@@ -18844,7 +17059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="11153">
 <summary>
 Receive boinc_client_server packets.
 </summary>
@@ -18855,7 +17070,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="11172">
 <summary>
 Do not audit attempts to receive boinc_client_server packets.
 </summary>
@@ -18866,7 +17081,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="11191">
 <summary>
 Send and receive boinc_client_server packets.
 </summary>
@@ -18877,7 +17092,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="11207">
 <summary>
 Do not audit attempts to send and receive boinc_client_server packets.
 </summary>
@@ -18888,7 +17103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="11222">
 <summary>
 Relabel packets to boinc_client_server the packet type.
 </summary>
@@ -18898,85 +17113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
-<summary>
-Send and receive TCP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_biff_port" lineno="13803">
-<summary>
-Send UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818">
-<summary>
-Do not audit attempts to send UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13833">
-<summary>
-Receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848">
-<summary>
-Do not audit attempts to receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13863">
-<summary>
-Send and receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13894">
+<interface name="corenet_tcp_bind_biff_port" lineno="11244">
 <summary>
 Bind TCP sockets to the biff port.
 </summary>
@@ -18987,7 +17124,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13914">
+<interface name="corenet_udp_bind_biff_port" lineno="11264">
 <summary>
 Bind UDP sockets to the biff port.
 </summary>
@@ -18998,7 +17135,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13933">
+<interface name="corenet_tcp_connect_biff_port" lineno="11283">
 <summary>
 Make a TCP connection to the biff port.
 </summary>
@@ -19008,7 +17145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_client_packets" lineno="13953">
+<interface name="corenet_send_biff_client_packets" lineno="11303">
 <summary>
 Send biff_client packets.
 </summary>
@@ -19019,7 +17156,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="11322">
 <summary>
 Do not audit attempts to send biff_client packets.
 </summary>
@@ -19030,7 +17167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13991">
+<interface name="corenet_receive_biff_client_packets" lineno="11341">
 <summary>
 Receive biff_client packets.
 </summary>
@@ -19041,7 +17178,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="11360">
 <summary>
 Do not audit attempts to receive biff_client packets.
 </summary>
@@ -19052,7 +17189,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="14029">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="11379">
 <summary>
 Send and receive biff_client packets.
 </summary>
@@ -19063,7 +17200,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="11395">
 <summary>
 Do not audit attempts to send and receive biff_client packets.
 </summary>
@@ -19074,7 +17211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="14060">
+<interface name="corenet_relabelto_biff_client_packets" lineno="11410">
 <summary>
 Relabel packets to biff_client the packet type.
 </summary>
@@ -19084,7 +17221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_biff_server_packets" lineno="14080">
+<interface name="corenet_send_biff_server_packets" lineno="11430">
 <summary>
 Send biff_server packets.
 </summary>
@@ -19095,7 +17232,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="11449">
 <summary>
 Do not audit attempts to send biff_server packets.
 </summary>
@@ -19106,7 +17243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_biff_server_packets" lineno="14118">
+<interface name="corenet_receive_biff_server_packets" lineno="11468">
 <summary>
 Receive biff_server packets.
 </summary>
@@ -19117,7 +17254,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="11487">
 <summary>
 Do not audit attempts to receive biff_server packets.
 </summary>
@@ -19128,7 +17265,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="14156">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="11506">
 <summary>
 Send and receive biff_server packets.
 </summary>
@@ -19139,7 +17276,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="11522">
 <summary>
 Do not audit attempts to send and receive biff_server packets.
 </summary>
@@ -19150,7 +17287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="14187">
+<interface name="corenet_relabelto_biff_server_packets" lineno="11537">
 <summary>
 Relabel packets to biff_server the packet type.
 </summary>
@@ -19160,85 +17297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209">
-<summary>
-Send and receive TCP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="14224">
-<summary>
-Send UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239">
-<summary>
-Do not audit attempts to send UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="14254">
-<summary>
-Receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269">
-<summary>
-Do not audit attempts to receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284">
-<summary>
-Send and receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="14315">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="11559">
 <summary>
 Bind TCP sockets to the certmaster port.
 </summary>
@@ -19249,7 +17308,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="14335">
+<interface name="corenet_udp_bind_certmaster_port" lineno="11579">
 <summary>
 Bind UDP sockets to the certmaster port.
 </summary>
@@ -19260,7 +17319,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="14354">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="11598">
 <summary>
 Make a TCP connection to the certmaster port.
 </summary>
@@ -19270,7 +17329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="14374">
+<interface name="corenet_send_certmaster_client_packets" lineno="11618">
 <summary>
 Send certmaster_client packets.
 </summary>
@@ -19281,7 +17340,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="11637">
 <summary>
 Do not audit attempts to send certmaster_client packets.
 </summary>
@@ -19292,7 +17351,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="14412">
+<interface name="corenet_receive_certmaster_client_packets" lineno="11656">
 <summary>
 Receive certmaster_client packets.
 </summary>
@@ -19303,7 +17362,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="11675">
 <summary>
 Do not audit attempts to receive certmaster_client packets.
 </summary>
@@ -19314,7 +17373,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="11694">
 <summary>
 Send and receive certmaster_client packets.
 </summary>
@@ -19325,7 +17384,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="11710">
 <summary>
 Do not audit attempts to send and receive certmaster_client packets.
 </summary>
@@ -19336,7 +17395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="11725">
 <summary>
 Relabel packets to certmaster_client the packet type.
 </summary>
@@ -19346,7 +17405,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="14501">
+<interface name="corenet_send_certmaster_server_packets" lineno="11745">
 <summary>
 Send certmaster_server packets.
 </summary>
@@ -19357,7 +17416,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="11764">
 <summary>
 Do not audit attempts to send certmaster_server packets.
 </summary>
@@ -19368,7 +17427,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="14539">
+<interface name="corenet_receive_certmaster_server_packets" lineno="11783">
 <summary>
 Receive certmaster_server packets.
 </summary>
@@ -19379,7 +17438,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="11802">
 <summary>
 Do not audit attempts to receive certmaster_server packets.
 </summary>
@@ -19390,7 +17449,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="11821">
 <summary>
 Send and receive certmaster_server packets.
 </summary>
@@ -19401,7 +17460,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="11837">
 <summary>
 Do not audit attempts to send and receive certmaster_server packets.
 </summary>
@@ -19412,7 +17471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="11852">
 <summary>
 Relabel packets to certmaster_server the packet type.
 </summary>
@@ -19422,85 +17481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630">
-<summary>
-Send and receive TCP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14645">
-<summary>
-Send UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660">
-<summary>
-Do not audit attempts to send UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14675">
-<summary>
-Receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690">
-<summary>
-Do not audit attempts to receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705">
-<summary>
-Send and receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14736">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="11874">
 <summary>
 Bind TCP sockets to the chronyd port.
 </summary>
@@ -19511,7 +17492,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14756">
+<interface name="corenet_udp_bind_chronyd_port" lineno="11894">
 <summary>
 Bind UDP sockets to the chronyd port.
 </summary>
@@ -19522,7 +17503,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14775">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="11913">
 <summary>
 Make a TCP connection to the chronyd port.
 </summary>
@@ -19532,7 +17513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14795">
+<interface name="corenet_send_chronyd_client_packets" lineno="11933">
 <summary>
 Send chronyd_client packets.
 </summary>
@@ -19543,7 +17524,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="11952">
 <summary>
 Do not audit attempts to send chronyd_client packets.
 </summary>
@@ -19554,7 +17535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14833">
+<interface name="corenet_receive_chronyd_client_packets" lineno="11971">
 <summary>
 Receive chronyd_client packets.
 </summary>
@@ -19565,7 +17546,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="11990">
 <summary>
 Do not audit attempts to receive chronyd_client packets.
 </summary>
@@ -19576,7 +17557,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="12009">
 <summary>
 Send and receive chronyd_client packets.
 </summary>
@@ -19587,7 +17568,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="12025">
 <summary>
 Do not audit attempts to send and receive chronyd_client packets.
 </summary>
@@ -19598,7 +17579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="12040">
 <summary>
 Relabel packets to chronyd_client the packet type.
 </summary>
@@ -19608,7 +17589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14922">
+<interface name="corenet_send_chronyd_server_packets" lineno="12060">
 <summary>
 Send chronyd_server packets.
 </summary>
@@ -19619,7 +17600,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="12079">
 <summary>
 Do not audit attempts to send chronyd_server packets.
 </summary>
@@ -19630,7 +17611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14960">
+<interface name="corenet_receive_chronyd_server_packets" lineno="12098">
 <summary>
 Receive chronyd_server packets.
 </summary>
@@ -19641,7 +17622,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="12117">
 <summary>
 Do not audit attempts to receive chronyd_server packets.
 </summary>
@@ -19652,7 +17633,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="12136">
 <summary>
 Send and receive chronyd_server packets.
 </summary>
@@ -19663,7 +17644,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="12152">
 <summary>
 Do not audit attempts to send and receive chronyd_server packets.
 </summary>
@@ -19674,7 +17655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="12167">
 <summary>
 Relabel packets to chronyd_server the packet type.
 </summary>
@@ -19684,85 +17665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051">
-<summary>
-Send and receive TCP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_clamd_port" lineno="15066">
-<summary>
-Send UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081">
-<summary>
-Do not audit attempts to send UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="15096">
-<summary>
-Receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111">
-<summary>
-Do not audit attempts to receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126">
-<summary>
-Send and receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="15157">
+<interface name="corenet_tcp_bind_clamd_port" lineno="12189">
 <summary>
 Bind TCP sockets to the clamd port.
 </summary>
@@ -19773,7 +17676,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="15177">
+<interface name="corenet_udp_bind_clamd_port" lineno="12209">
 <summary>
 Bind UDP sockets to the clamd port.
 </summary>
@@ -19784,7 +17687,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="15196">
+<interface name="corenet_tcp_connect_clamd_port" lineno="12228">
 <summary>
 Make a TCP connection to the clamd port.
 </summary>
@@ -19794,7 +17697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_client_packets" lineno="15216">
+<interface name="corenet_send_clamd_client_packets" lineno="12248">
 <summary>
 Send clamd_client packets.
 </summary>
@@ -19805,7 +17708,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="12267">
 <summary>
 Do not audit attempts to send clamd_client packets.
 </summary>
@@ -19816,7 +17719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="15254">
+<interface name="corenet_receive_clamd_client_packets" lineno="12286">
 <summary>
 Receive clamd_client packets.
 </summary>
@@ -19827,7 +17730,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="12305">
 <summary>
 Do not audit attempts to receive clamd_client packets.
 </summary>
@@ -19838,7 +17741,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="12324">
 <summary>
 Send and receive clamd_client packets.
 </summary>
@@ -19849,7 +17752,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="12340">
 <summary>
 Do not audit attempts to send and receive clamd_client packets.
 </summary>
@@ -19860,7 +17763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="15323">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="12355">
 <summary>
 Relabel packets to clamd_client the packet type.
 </summary>
@@ -19870,7 +17773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clamd_server_packets" lineno="15343">
+<interface name="corenet_send_clamd_server_packets" lineno="12375">
 <summary>
 Send clamd_server packets.
 </summary>
@@ -19881,7 +17784,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="12394">
 <summary>
 Do not audit attempts to send clamd_server packets.
 </summary>
@@ -19892,7 +17795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="15381">
+<interface name="corenet_receive_clamd_server_packets" lineno="12413">
 <summary>
 Receive clamd_server packets.
 </summary>
@@ -19903,7 +17806,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="12432">
 <summary>
 Do not audit attempts to receive clamd_server packets.
 </summary>
@@ -19914,7 +17817,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="12451">
 <summary>
 Send and receive clamd_server packets.
 </summary>
@@ -19925,7 +17828,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="12467">
 <summary>
 Do not audit attempts to send and receive clamd_server packets.
 </summary>
@@ -19936,7 +17839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="15450">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="12482">
 <summary>
 Relabel packets to clamd_server the packet type.
 </summary>
@@ -19946,85 +17849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472">
-<summary>
-Send and receive TCP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="15487">
-<summary>
-Send UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502">
-<summary>
-Do not audit attempts to send UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="15517">
-<summary>
-Receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532">
-<summary>
-Do not audit attempts to receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547">
-<summary>
-Send and receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="12504">
 <summary>
 Bind TCP sockets to the clockspeed port.
 </summary>
@@ -20035,7 +17860,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15598">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="12524">
 <summary>
 Bind UDP sockets to the clockspeed port.
 </summary>
@@ -20046,7 +17871,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="12543">
 <summary>
 Make a TCP connection to the clockspeed port.
 </summary>
@@ -20056,7 +17881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15637">
+<interface name="corenet_send_clockspeed_client_packets" lineno="12563">
 <summary>
 Send clockspeed_client packets.
 </summary>
@@ -20067,7 +17892,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="12582">
 <summary>
 Do not audit attempts to send clockspeed_client packets.
 </summary>
@@ -20078,7 +17903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15675">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="12601">
 <summary>
 Receive clockspeed_client packets.
 </summary>
@@ -20089,7 +17914,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="12620">
 <summary>
 Do not audit attempts to receive clockspeed_client packets.
 </summary>
@@ -20100,7 +17925,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="12639">
 <summary>
 Send and receive clockspeed_client packets.
 </summary>
@@ -20111,7 +17936,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="12655">
 <summary>
 Do not audit attempts to send and receive clockspeed_client packets.
 </summary>
@@ -20122,7 +17947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="12670">
 <summary>
 Relabel packets to clockspeed_client the packet type.
 </summary>
@@ -20132,7 +17957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15764">
+<interface name="corenet_send_clockspeed_server_packets" lineno="12690">
 <summary>
 Send clockspeed_server packets.
 </summary>
@@ -20143,7 +17968,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="12709">
 <summary>
 Do not audit attempts to send clockspeed_server packets.
 </summary>
@@ -20154,7 +17979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15802">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="12728">
 <summary>
 Receive clockspeed_server packets.
 </summary>
@@ -20165,7 +17990,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="12747">
 <summary>
 Do not audit attempts to receive clockspeed_server packets.
 </summary>
@@ -20176,7 +18001,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="12766">
 <summary>
 Send and receive clockspeed_server packets.
 </summary>
@@ -20187,7 +18012,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="12782">
 <summary>
 Do not audit attempts to send and receive clockspeed_server packets.
 </summary>
@@ -20198,7 +18023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="12797">
 <summary>
 Relabel packets to clockspeed_server the packet type.
 </summary>
@@ -20208,85 +18033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893">
-<summary>
-Send and receive TCP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15908">
-<summary>
-Send UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923">
-<summary>
-Do not audit attempts to send UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15938">
-<summary>
-Receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953">
-<summary>
-Do not audit attempts to receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968">
-<summary>
-Send and receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15999">
+<interface name="corenet_tcp_bind_cluster_port" lineno="12819">
 <summary>
 Bind TCP sockets to the cluster port.
 </summary>
@@ -20297,7 +18044,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="16019">
+<interface name="corenet_udp_bind_cluster_port" lineno="12839">
 <summary>
 Bind UDP sockets to the cluster port.
 </summary>
@@ -20308,7 +18055,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="16038">
+<interface name="corenet_tcp_connect_cluster_port" lineno="12858">
 <summary>
 Make a TCP connection to the cluster port.
 </summary>
@@ -20318,7 +18065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_client_packets" lineno="16058">
+<interface name="corenet_send_cluster_client_packets" lineno="12878">
 <summary>
 Send cluster_client packets.
 </summary>
@@ -20329,7 +18076,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="12897">
 <summary>
 Do not audit attempts to send cluster_client packets.
 </summary>
@@ -20340,7 +18087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="16096">
+<interface name="corenet_receive_cluster_client_packets" lineno="12916">
 <summary>
 Receive cluster_client packets.
 </summary>
@@ -20351,7 +18098,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="12935">
 <summary>
 Do not audit attempts to receive cluster_client packets.
 </summary>
@@ -20362,7 +18109,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="12954">
 <summary>
 Send and receive cluster_client packets.
 </summary>
@@ -20373,7 +18120,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="12970">
 <summary>
 Do not audit attempts to send and receive cluster_client packets.
 </summary>
@@ -20384,7 +18131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="16165">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="12985">
 <summary>
 Relabel packets to cluster_client the packet type.
 </summary>
@@ -20394,7 +18141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cluster_server_packets" lineno="16185">
+<interface name="corenet_send_cluster_server_packets" lineno="13005">
 <summary>
 Send cluster_server packets.
 </summary>
@@ -20405,7 +18152,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="13024">
 <summary>
 Do not audit attempts to send cluster_server packets.
 </summary>
@@ -20416,7 +18163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="16223">
+<interface name="corenet_receive_cluster_server_packets" lineno="13043">
 <summary>
 Receive cluster_server packets.
 </summary>
@@ -20427,7 +18174,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="13062">
 <summary>
 Do not audit attempts to receive cluster_server packets.
 </summary>
@@ -20438,7 +18185,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="13081">
 <summary>
 Send and receive cluster_server packets.
 </summary>
@@ -20449,7 +18196,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="13097">
 <summary>
 Do not audit attempts to send and receive cluster_server packets.
 </summary>
@@ -20460,7 +18207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="16292">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="13112">
 <summary>
 Relabel packets to cluster_server the packet type.
 </summary>
@@ -20470,85 +18217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314">
-<summary>
-Send and receive TCP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cma_port" lineno="16329">
-<summary>
-Send UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344">
-<summary>
-Do not audit attempts to send UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cma_port" lineno="16359">
-<summary>
-Receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374">
-<summary>
-Do not audit attempts to receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="16389">
-<summary>
-Send and receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="16420">
+<interface name="corenet_tcp_bind_cma_port" lineno="13134">
 <summary>
 Bind TCP sockets to the cma port.
 </summary>
@@ -20559,7 +18228,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cma_port" lineno="16440">
+<interface name="corenet_udp_bind_cma_port" lineno="13154">
 <summary>
 Bind UDP sockets to the cma port.
 </summary>
@@ -20570,7 +18239,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="16459">
+<interface name="corenet_tcp_connect_cma_port" lineno="13173">
 <summary>
 Make a TCP connection to the cma port.
 </summary>
@@ -20580,7 +18249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_client_packets" lineno="16479">
+<interface name="corenet_send_cma_client_packets" lineno="13193">
 <summary>
 Send cma_client packets.
 </summary>
@@ -20591,7 +18260,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="13212">
 <summary>
 Do not audit attempts to send cma_client packets.
 </summary>
@@ -20602,7 +18271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_client_packets" lineno="16517">
+<interface name="corenet_receive_cma_client_packets" lineno="13231">
 <summary>
 Receive cma_client packets.
 </summary>
@@ -20613,7 +18282,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="13250">
 <summary>
 Do not audit attempts to receive cma_client packets.
 </summary>
@@ -20624,7 +18293,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="16555">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="13269">
 <summary>
 Send and receive cma_client packets.
 </summary>
@@ -20635,7 +18304,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="13285">
 <summary>
 Do not audit attempts to send and receive cma_client packets.
 </summary>
@@ -20646,7 +18315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16586">
+<interface name="corenet_relabelto_cma_client_packets" lineno="13300">
 <summary>
 Relabel packets to cma_client the packet type.
 </summary>
@@ -20656,7 +18325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cma_server_packets" lineno="16606">
+<interface name="corenet_send_cma_server_packets" lineno="13320">
 <summary>
 Send cma_server packets.
 </summary>
@@ -20667,7 +18336,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="13339">
 <summary>
 Do not audit attempts to send cma_server packets.
 </summary>
@@ -20678,7 +18347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16644">
+<interface name="corenet_receive_cma_server_packets" lineno="13358">
 <summary>
 Receive cma_server packets.
 </summary>
@@ -20689,7 +18358,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="13377">
 <summary>
 Do not audit attempts to receive cma_server packets.
 </summary>
@@ -20700,7 +18369,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16682">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="13396">
 <summary>
 Send and receive cma_server packets.
 </summary>
@@ -20711,7 +18380,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="13412">
 <summary>
 Do not audit attempts to send and receive cma_server packets.
 </summary>
@@ -20722,7 +18391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16713">
+<interface name="corenet_relabelto_cma_server_packets" lineno="13427">
 <summary>
 Relabel packets to cma_server the packet type.
 </summary>
@@ -20732,85 +18401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735">
-<summary>
-Send and receive TCP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16750">
-<summary>
-Send UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765">
-<summary>
-Do not audit attempts to send UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16780">
-<summary>
-Receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795">
-<summary>
-Do not audit attempts to receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810">
-<summary>
-Send and receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16841">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="13449">
 <summary>
 Bind TCP sockets to the cobbler port.
 </summary>
@@ -20821,7 +18412,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16861">
+<interface name="corenet_udp_bind_cobbler_port" lineno="13469">
 <summary>
 Bind UDP sockets to the cobbler port.
 </summary>
@@ -20832,7 +18423,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16880">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="13488">
 <summary>
 Make a TCP connection to the cobbler port.
 </summary>
@@ -20842,7 +18433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16900">
+<interface name="corenet_send_cobbler_client_packets" lineno="13508">
 <summary>
 Send cobbler_client packets.
 </summary>
@@ -20853,7 +18444,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="13527">
 <summary>
 Do not audit attempts to send cobbler_client packets.
 </summary>
@@ -20864,7 +18455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16938">
+<interface name="corenet_receive_cobbler_client_packets" lineno="13546">
 <summary>
 Receive cobbler_client packets.
 </summary>
@@ -20875,7 +18466,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="13565">
 <summary>
 Do not audit attempts to receive cobbler_client packets.
 </summary>
@@ -20886,7 +18477,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="13584">
 <summary>
 Send and receive cobbler_client packets.
 </summary>
@@ -20897,7 +18488,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="13600">
 <summary>
 Do not audit attempts to send and receive cobbler_client packets.
 </summary>
@@ -20908,7 +18499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="13615">
 <summary>
 Relabel packets to cobbler_client the packet type.
 </summary>
@@ -20918,7 +18509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="17027">
+<interface name="corenet_send_cobbler_server_packets" lineno="13635">
 <summary>
 Send cobbler_server packets.
 </summary>
@@ -20929,7 +18520,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="13654">
 <summary>
 Do not audit attempts to send cobbler_server packets.
 </summary>
@@ -20940,7 +18531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="17065">
+<interface name="corenet_receive_cobbler_server_packets" lineno="13673">
 <summary>
 Receive cobbler_server packets.
 </summary>
@@ -20951,7 +18542,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="13692">
 <summary>
 Do not audit attempts to receive cobbler_server packets.
 </summary>
@@ -20962,7 +18553,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="13711">
 <summary>
 Send and receive cobbler_server packets.
 </summary>
@@ -20973,7 +18564,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="13727">
 <summary>
 Do not audit attempts to send and receive cobbler_server packets.
 </summary>
@@ -20984,7 +18575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="13742">
 <summary>
 Relabel packets to cobbler_server the packet type.
 </summary>
@@ -20994,85 +18585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156">
-<summary>
-Send and receive TCP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="17171">
-<summary>
-Send UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186">
-<summary>
-Do not audit attempts to send UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="17201">
-<summary>
-Receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216">
-<summary>
-Do not audit attempts to receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231">
-<summary>
-Send and receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="13764">
 <summary>
 Bind TCP sockets to the commplex_link port.
 </summary>
@@ -21083,7 +18596,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="17282">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="13784">
 <summary>
 Bind UDP sockets to the commplex_link port.
 </summary>
@@ -21094,7 +18607,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="13803">
 <summary>
 Make a TCP connection to the commplex_link port.
 </summary>
@@ -21104,7 +18617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="17321">
+<interface name="corenet_send_commplex_link_client_packets" lineno="13823">
 <summary>
 Send commplex_link_client packets.
 </summary>
@@ -21115,7 +18628,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="13842">
 <summary>
 Do not audit attempts to send commplex_link_client packets.
 </summary>
@@ -21126,7 +18639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="17359">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="13861">
 <summary>
 Receive commplex_link_client packets.
 </summary>
@@ -21137,7 +18650,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="13880">
 <summary>
 Do not audit attempts to receive commplex_link_client packets.
 </summary>
@@ -21148,7 +18661,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="13899">
 <summary>
 Send and receive commplex_link_client packets.
 </summary>
@@ -21159,7 +18672,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="13915">
 <summary>
 Do not audit attempts to send and receive commplex_link_client packets.
 </summary>
@@ -21170,7 +18683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="13930">
 <summary>
 Relabel packets to commplex_link_client the packet type.
 </summary>
@@ -21180,7 +18693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="17448">
+<interface name="corenet_send_commplex_link_server_packets" lineno="13950">
 <summary>
 Send commplex_link_server packets.
 </summary>
@@ -21191,7 +18704,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="13969">
 <summary>
 Do not audit attempts to send commplex_link_server packets.
 </summary>
@@ -21202,7 +18715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="17486">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="13988">
 <summary>
 Receive commplex_link_server packets.
 </summary>
@@ -21213,7 +18726,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="14007">
 <summary>
 Do not audit attempts to receive commplex_link_server packets.
 </summary>
@@ -21224,7 +18737,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="14026">
 <summary>
 Send and receive commplex_link_server packets.
 </summary>
@@ -21235,7 +18748,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="14042">
 <summary>
 Do not audit attempts to send and receive commplex_link_server packets.
 </summary>
@@ -21246,7 +18759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="14057">
 <summary>
 Relabel packets to commplex_link_server the packet type.
 </summary>
@@ -21256,85 +18769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577">
-<summary>
-Send and receive TCP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17592">
-<summary>
-Send UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607">
-<summary>
-Do not audit attempts to send UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17622">
-<summary>
-Receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637">
-<summary>
-Do not audit attempts to receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652">
-<summary>
-Send and receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="14079">
 <summary>
 Bind TCP sockets to the commplex_main port.
 </summary>
@@ -21345,7 +18780,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17703">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="14099">
 <summary>
 Bind UDP sockets to the commplex_main port.
 </summary>
@@ -21356,7 +18791,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="14118">
 <summary>
 Make a TCP connection to the commplex_main port.
 </summary>
@@ -21366,7 +18801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17742">
+<interface name="corenet_send_commplex_main_client_packets" lineno="14138">
 <summary>
 Send commplex_main_client packets.
 </summary>
@@ -21377,7 +18812,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="14157">
 <summary>
 Do not audit attempts to send commplex_main_client packets.
 </summary>
@@ -21388,7 +18823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17780">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="14176">
 <summary>
 Receive commplex_main_client packets.
 </summary>
@@ -21399,7 +18834,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="14195">
 <summary>
 Do not audit attempts to receive commplex_main_client packets.
 </summary>
@@ -21410,7 +18845,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="14214">
 <summary>
 Send and receive commplex_main_client packets.
 </summary>
@@ -21421,7 +18856,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="14230">
 <summary>
 Do not audit attempts to send and receive commplex_main_client packets.
 </summary>
@@ -21432,7 +18867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="14245">
 <summary>
 Relabel packets to commplex_main_client the packet type.
 </summary>
@@ -21442,7 +18877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17869">
+<interface name="corenet_send_commplex_main_server_packets" lineno="14265">
 <summary>
 Send commplex_main_server packets.
 </summary>
@@ -21453,7 +18888,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="14284">
 <summary>
 Do not audit attempts to send commplex_main_server packets.
 </summary>
@@ -21464,7 +18899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17907">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="14303">
 <summary>
 Receive commplex_main_server packets.
 </summary>
@@ -21475,7 +18910,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="14322">
 <summary>
 Do not audit attempts to receive commplex_main_server packets.
 </summary>
@@ -21486,7 +18921,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="14341">
 <summary>
 Send and receive commplex_main_server packets.
 </summary>
@@ -21497,7 +18932,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="14357">
 <summary>
 Do not audit attempts to send and receive commplex_main_server packets.
 </summary>
@@ -21508,7 +18943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="14372">
 <summary>
 Relabel packets to commplex_main_server the packet type.
 </summary>
@@ -21518,85 +18953,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998">
-<summary>
-Send and receive TCP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_comsat_port" lineno="18013">
-<summary>
-Send UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028">
-<summary>
-Do not audit attempts to send UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="18043">
-<summary>
-Receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058">
-<summary>
-Do not audit attempts to receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073">
-<summary>
-Send and receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="18104">
+<interface name="corenet_tcp_bind_comsat_port" lineno="14394">
 <summary>
 Bind TCP sockets to the comsat port.
 </summary>
@@ -21607,7 +18964,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="18124">
+<interface name="corenet_udp_bind_comsat_port" lineno="14414">
 <summary>
 Bind UDP sockets to the comsat port.
 </summary>
@@ -21618,7 +18975,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="18143">
+<interface name="corenet_tcp_connect_comsat_port" lineno="14433">
 <summary>
 Make a TCP connection to the comsat port.
 </summary>
@@ -21628,7 +18985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_client_packets" lineno="18163">
+<interface name="corenet_send_comsat_client_packets" lineno="14453">
 <summary>
 Send comsat_client packets.
 </summary>
@@ -21639,7 +18996,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="14472">
 <summary>
 Do not audit attempts to send comsat_client packets.
 </summary>
@@ -21650,7 +19007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="18201">
+<interface name="corenet_receive_comsat_client_packets" lineno="14491">
 <summary>
 Receive comsat_client packets.
 </summary>
@@ -21661,7 +19018,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="14510">
 <summary>
 Do not audit attempts to receive comsat_client packets.
 </summary>
@@ -21672,7 +19029,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="14529">
 <summary>
 Send and receive comsat_client packets.
 </summary>
@@ -21683,7 +19040,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="14545">
 <summary>
 Do not audit attempts to send and receive comsat_client packets.
 </summary>
@@ -21694,7 +19051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="18270">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="14560">
 <summary>
 Relabel packets to comsat_client the packet type.
 </summary>
@@ -21704,7 +19061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_comsat_server_packets" lineno="18290">
+<interface name="corenet_send_comsat_server_packets" lineno="14580">
 <summary>
 Send comsat_server packets.
 </summary>
@@ -21715,7 +19072,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="14599">
 <summary>
 Do not audit attempts to send comsat_server packets.
 </summary>
@@ -21726,7 +19083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="18328">
+<interface name="corenet_receive_comsat_server_packets" lineno="14618">
 <summary>
 Receive comsat_server packets.
 </summary>
@@ -21737,7 +19094,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="14637">
 <summary>
 Do not audit attempts to receive comsat_server packets.
 </summary>
@@ -21748,7 +19105,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="14656">
 <summary>
 Send and receive comsat_server packets.
 </summary>
@@ -21759,7 +19116,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="14672">
 <summary>
 Do not audit attempts to send and receive comsat_server packets.
 </summary>
@@ -21770,7 +19127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="18397">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="14687">
 <summary>
 Relabel packets to comsat_server the packet type.
 </summary>
@@ -21780,85 +19137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419">
-<summary>
-Send and receive TCP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_condor_port" lineno="18434">
-<summary>
-Send UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449">
-<summary>
-Do not audit attempts to send UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_condor_port" lineno="18464">
-<summary>
-Receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479">
-<summary>
-Do not audit attempts to receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="18494">
-<summary>
-Send and receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="18525">
+<interface name="corenet_tcp_bind_condor_port" lineno="14709">
 <summary>
 Bind TCP sockets to the condor port.
 </summary>
@@ -21869,7 +19148,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_condor_port" lineno="18545">
+<interface name="corenet_udp_bind_condor_port" lineno="14729">
 <summary>
 Bind UDP sockets to the condor port.
 </summary>
@@ -21880,7 +19159,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18564">
+<interface name="corenet_tcp_connect_condor_port" lineno="14748">
 <summary>
 Make a TCP connection to the condor port.
 </summary>
@@ -21890,7 +19169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_client_packets" lineno="18584">
+<interface name="corenet_send_condor_client_packets" lineno="14768">
 <summary>
 Send condor_client packets.
 </summary>
@@ -21901,7 +19180,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="14787">
 <summary>
 Do not audit attempts to send condor_client packets.
 </summary>
@@ -21912,7 +19191,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18622">
+<interface name="corenet_receive_condor_client_packets" lineno="14806">
 <summary>
 Receive condor_client packets.
 </summary>
@@ -21923,7 +19202,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="14825">
 <summary>
 Do not audit attempts to receive condor_client packets.
 </summary>
@@ -21934,7 +19213,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18660">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="14844">
 <summary>
 Send and receive condor_client packets.
 </summary>
@@ -21945,7 +19224,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="14860">
 <summary>
 Do not audit attempts to send and receive condor_client packets.
 </summary>
@@ -21956,7 +19235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18691">
+<interface name="corenet_relabelto_condor_client_packets" lineno="14875">
 <summary>
 Relabel packets to condor_client the packet type.
 </summary>
@@ -21966,7 +19245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_condor_server_packets" lineno="18711">
+<interface name="corenet_send_condor_server_packets" lineno="14895">
 <summary>
 Send condor_server packets.
 </summary>
@@ -21977,7 +19256,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="14914">
 <summary>
 Do not audit attempts to send condor_server packets.
 </summary>
@@ -21988,7 +19267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18749">
+<interface name="corenet_receive_condor_server_packets" lineno="14933">
 <summary>
 Receive condor_server packets.
 </summary>
@@ -21999,7 +19278,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="14952">
 <summary>
 Do not audit attempts to receive condor_server packets.
 </summary>
@@ -22010,7 +19289,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18787">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="14971">
 <summary>
 Send and receive condor_server packets.
 </summary>
@@ -22021,7 +19300,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="14987">
 <summary>
 Do not audit attempts to send and receive condor_server packets.
 </summary>
@@ -22032,7 +19311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18818">
+<interface name="corenet_relabelto_condor_server_packets" lineno="15002">
 <summary>
 Relabel packets to condor_server the packet type.
 </summary>
@@ -22042,85 +19321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840">
-<summary>
-Send and receive TCP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18855">
-<summary>
-Send UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870">
-<summary>
-Do not audit attempts to send UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18885">
-<summary>
-Receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900">
-<summary>
-Do not audit attempts to receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915">
-<summary>
-Send and receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18946">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="15024">
 <summary>
 Bind TCP sockets to the couchdb port.
 </summary>
@@ -22131,7 +19332,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18966">
+<interface name="corenet_udp_bind_couchdb_port" lineno="15044">
 <summary>
 Bind UDP sockets to the couchdb port.
 </summary>
@@ -22142,7 +19343,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18985">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="15063">
 <summary>
 Make a TCP connection to the couchdb port.
 </summary>
@@ -22152,7 +19353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="19005">
+<interface name="corenet_send_couchdb_client_packets" lineno="15083">
 <summary>
 Send couchdb_client packets.
 </summary>
@@ -22163,7 +19364,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="15102">
 <summary>
 Do not audit attempts to send couchdb_client packets.
 </summary>
@@ -22174,7 +19375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="19043">
+<interface name="corenet_receive_couchdb_client_packets" lineno="15121">
 <summary>
 Receive couchdb_client packets.
 </summary>
@@ -22185,7 +19386,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="15140">
 <summary>
 Do not audit attempts to receive couchdb_client packets.
 </summary>
@@ -22196,7 +19397,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="15159">
 <summary>
 Send and receive couchdb_client packets.
 </summary>
@@ -22207,7 +19408,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="15175">
 <summary>
 Do not audit attempts to send and receive couchdb_client packets.
 </summary>
@@ -22218,7 +19419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="15190">
 <summary>
 Relabel packets to couchdb_client the packet type.
 </summary>
@@ -22228,7 +19429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="19132">
+<interface name="corenet_send_couchdb_server_packets" lineno="15210">
 <summary>
 Send couchdb_server packets.
 </summary>
@@ -22239,7 +19440,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="15229">
 <summary>
 Do not audit attempts to send couchdb_server packets.
 </summary>
@@ -22250,7 +19451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="19170">
+<interface name="corenet_receive_couchdb_server_packets" lineno="15248">
 <summary>
 Receive couchdb_server packets.
 </summary>
@@ -22261,7 +19462,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="15267">
 <summary>
 Do not audit attempts to receive couchdb_server packets.
 </summary>
@@ -22272,7 +19473,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="15286">
 <summary>
 Send and receive couchdb_server packets.
 </summary>
@@ -22283,7 +19484,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="15302">
 <summary>
 Do not audit attempts to send and receive couchdb_server packets.
 </summary>
@@ -22294,7 +19495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="15317">
 <summary>
 Relabel packets to couchdb_server the packet type.
 </summary>
@@ -22304,85 +19505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261">
-<summary>
-Send and receive TCP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="19276">
-<summary>
-Send UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291">
-<summary>
-Do not audit attempts to send UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="19306">
-<summary>
-Receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321">
-<summary>
-Do not audit attempts to receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336">
-<summary>
-Send and receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="19367">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="15339">
 <summary>
 Bind TCP sockets to the cslistener port.
 </summary>
@@ -22393,7 +19516,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="19387">
+<interface name="corenet_udp_bind_cslistener_port" lineno="15359">
 <summary>
 Bind UDP sockets to the cslistener port.
 </summary>
@@ -22404,7 +19527,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="19406">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="15378">
 <summary>
 Make a TCP connection to the cslistener port.
 </summary>
@@ -22414,7 +19537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="19426">
+<interface name="corenet_send_cslistener_client_packets" lineno="15398">
 <summary>
 Send cslistener_client packets.
 </summary>
@@ -22425,7 +19548,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="15417">
 <summary>
 Do not audit attempts to send cslistener_client packets.
 </summary>
@@ -22436,7 +19559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="19464">
+<interface name="corenet_receive_cslistener_client_packets" lineno="15436">
 <summary>
 Receive cslistener_client packets.
 </summary>
@@ -22447,7 +19570,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="15455">
 <summary>
 Do not audit attempts to receive cslistener_client packets.
 </summary>
@@ -22458,7 +19581,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="15474">
 <summary>
 Send and receive cslistener_client packets.
 </summary>
@@ -22469,7 +19592,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="15490">
 <summary>
 Do not audit attempts to send and receive cslistener_client packets.
 </summary>
@@ -22480,7 +19603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="15505">
 <summary>
 Relabel packets to cslistener_client the packet type.
 </summary>
@@ -22490,7 +19613,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="19553">
+<interface name="corenet_send_cslistener_server_packets" lineno="15525">
 <summary>
 Send cslistener_server packets.
 </summary>
@@ -22501,7 +19624,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="15544">
 <summary>
 Do not audit attempts to send cslistener_server packets.
 </summary>
@@ -22512,7 +19635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19591">
+<interface name="corenet_receive_cslistener_server_packets" lineno="15563">
 <summary>
 Receive cslistener_server packets.
 </summary>
@@ -22523,7 +19646,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="15582">
 <summary>
 Do not audit attempts to receive cslistener_server packets.
 </summary>
@@ -22534,7 +19657,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="15601">
 <summary>
 Send and receive cslistener_server packets.
 </summary>
@@ -22545,7 +19668,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="15617">
 <summary>
 Do not audit attempts to send and receive cslistener_server packets.
 </summary>
@@ -22556,7 +19679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="15632">
 <summary>
 Relabel packets to cslistener_server the packet type.
 </summary>
@@ -22566,85 +19689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682">
-<summary>
-Send and receive TCP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19697">
-<summary>
-Send UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712">
-<summary>
-Do not audit attempts to send UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19727">
-<summary>
-Receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742">
-<summary>
-Do not audit attempts to receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757">
-<summary>
-Send and receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19788">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="15654">
 <summary>
 Bind TCP sockets to the ctdb port.
 </summary>
@@ -22655,7 +19700,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19808">
+<interface name="corenet_udp_bind_ctdb_port" lineno="15674">
 <summary>
 Bind UDP sockets to the ctdb port.
 </summary>
@@ -22666,7 +19711,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19827">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="15693">
 <summary>
 Make a TCP connection to the ctdb port.
 </summary>
@@ -22676,7 +19721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19847">
+<interface name="corenet_send_ctdb_client_packets" lineno="15713">
 <summary>
 Send ctdb_client packets.
 </summary>
@@ -22687,7 +19732,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="15732">
 <summary>
 Do not audit attempts to send ctdb_client packets.
 </summary>
@@ -22698,7 +19743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19885">
+<interface name="corenet_receive_ctdb_client_packets" lineno="15751">
 <summary>
 Receive ctdb_client packets.
 </summary>
@@ -22709,7 +19754,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="15770">
 <summary>
 Do not audit attempts to receive ctdb_client packets.
 </summary>
@@ -22720,7 +19765,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="15789">
 <summary>
 Send and receive ctdb_client packets.
 </summary>
@@ -22731,7 +19776,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="15805">
 <summary>
 Do not audit attempts to send and receive ctdb_client packets.
 </summary>
@@ -22742,7 +19787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="15820">
 <summary>
 Relabel packets to ctdb_client the packet type.
 </summary>
@@ -22752,7 +19797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19974">
+<interface name="corenet_send_ctdb_server_packets" lineno="15840">
 <summary>
 Send ctdb_server packets.
 </summary>
@@ -22763,7 +19808,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="15859">
 <summary>
 Do not audit attempts to send ctdb_server packets.
 </summary>
@@ -22774,7 +19819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="20012">
+<interface name="corenet_receive_ctdb_server_packets" lineno="15878">
 <summary>
 Receive ctdb_server packets.
 </summary>
@@ -22785,7 +19830,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="15897">
 <summary>
 Do not audit attempts to receive ctdb_server packets.
 </summary>
@@ -22796,7 +19841,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="15916">
 <summary>
 Send and receive ctdb_server packets.
 </summary>
@@ -22807,7 +19852,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="15932">
 <summary>
 Do not audit attempts to send and receive ctdb_server packets.
 </summary>
@@ -22818,7 +19863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="15947">
 <summary>
 Relabel packets to ctdb_server the packet type.
 </summary>
@@ -22828,85 +19873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103">
-<summary>
-Send and receive TCP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cvs_port" lineno="20118">
-<summary>
-Send UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133">
-<summary>
-Do not audit attempts to send UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="20148">
-<summary>
-Receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163">
-<summary>
-Do not audit attempts to receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178">
-<summary>
-Send and receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="20209">
+<interface name="corenet_tcp_bind_cvs_port" lineno="15969">
 <summary>
 Bind TCP sockets to the cvs port.
 </summary>
@@ -22917,7 +19884,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="20229">
+<interface name="corenet_udp_bind_cvs_port" lineno="15989">
 <summary>
 Bind UDP sockets to the cvs port.
 </summary>
@@ -22928,7 +19895,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="20248">
+<interface name="corenet_tcp_connect_cvs_port" lineno="16008">
 <summary>
 Make a TCP connection to the cvs port.
 </summary>
@@ -22938,7 +19905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_client_packets" lineno="20268">
+<interface name="corenet_send_cvs_client_packets" lineno="16028">
 <summary>
 Send cvs_client packets.
 </summary>
@@ -22949,7 +19916,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="16047">
 <summary>
 Do not audit attempts to send cvs_client packets.
 </summary>
@@ -22960,7 +19927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="20306">
+<interface name="corenet_receive_cvs_client_packets" lineno="16066">
 <summary>
 Receive cvs_client packets.
 </summary>
@@ -22971,7 +19938,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="16085">
 <summary>
 Do not audit attempts to receive cvs_client packets.
 </summary>
@@ -22982,7 +19949,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="16104">
 <summary>
 Send and receive cvs_client packets.
 </summary>
@@ -22993,7 +19960,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="16120">
 <summary>
 Do not audit attempts to send and receive cvs_client packets.
 </summary>
@@ -23004,7 +19971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="20375">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="16135">
 <summary>
 Relabel packets to cvs_client the packet type.
 </summary>
@@ -23014,7 +19981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cvs_server_packets" lineno="20395">
+<interface name="corenet_send_cvs_server_packets" lineno="16155">
 <summary>
 Send cvs_server packets.
 </summary>
@@ -23025,7 +19992,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="16174">
 <summary>
 Do not audit attempts to send cvs_server packets.
 </summary>
@@ -23036,7 +20003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="20433">
+<interface name="corenet_receive_cvs_server_packets" lineno="16193">
 <summary>
 Receive cvs_server packets.
 </summary>
@@ -23047,7 +20014,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="16212">
 <summary>
 Do not audit attempts to receive cvs_server packets.
 </summary>
@@ -23058,7 +20025,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="16231">
 <summary>
 Send and receive cvs_server packets.
 </summary>
@@ -23069,7 +20036,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="16247">
 <summary>
 Do not audit attempts to send and receive cvs_server packets.
 </summary>
@@ -23080,7 +20047,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="20502">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="16262">
 <summary>
 Relabel packets to cvs_server the packet type.
 </summary>
@@ -23090,85 +20057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524">
-<summary>
-Send and receive TCP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="20539">
-<summary>
-Send UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554">
-<summary>
-Do not audit attempts to send UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20569">
-<summary>
-Receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584">
-<summary>
-Do not audit attempts to receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599">
-<summary>
-Send and receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="16284">
 <summary>
 Bind TCP sockets to the cyphesis port.
 </summary>
@@ -23179,7 +20068,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20650">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="16304">
 <summary>
 Bind UDP sockets to the cyphesis port.
 </summary>
@@ -23190,7 +20079,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="16323">
 <summary>
 Make a TCP connection to the cyphesis port.
 </summary>
@@ -23200,7 +20089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20689">
+<interface name="corenet_send_cyphesis_client_packets" lineno="16343">
 <summary>
 Send cyphesis_client packets.
 </summary>
@@ -23211,7 +20100,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="16362">
 <summary>
 Do not audit attempts to send cyphesis_client packets.
 </summary>
@@ -23222,7 +20111,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20727">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="16381">
 <summary>
 Receive cyphesis_client packets.
 </summary>
@@ -23233,7 +20122,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="16400">
 <summary>
 Do not audit attempts to receive cyphesis_client packets.
 </summary>
@@ -23244,7 +20133,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="16419">
 <summary>
 Send and receive cyphesis_client packets.
 </summary>
@@ -23255,7 +20144,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="16435">
 <summary>
 Do not audit attempts to send and receive cyphesis_client packets.
 </summary>
@@ -23266,7 +20155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="16450">
 <summary>
 Relabel packets to cyphesis_client the packet type.
 </summary>
@@ -23276,7 +20165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20816">
+<interface name="corenet_send_cyphesis_server_packets" lineno="16470">
 <summary>
 Send cyphesis_server packets.
 </summary>
@@ -23287,7 +20176,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="16489">
 <summary>
 Do not audit attempts to send cyphesis_server packets.
 </summary>
@@ -23298,7 +20187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20854">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="16508">
 <summary>
 Receive cyphesis_server packets.
 </summary>
@@ -23309,7 +20198,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="16527">
 <summary>
 Do not audit attempts to receive cyphesis_server packets.
 </summary>
@@ -23320,7 +20209,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="16546">
 <summary>
 Send and receive cyphesis_server packets.
 </summary>
@@ -23331,7 +20220,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="16562">
 <summary>
 Do not audit attempts to send and receive cyphesis_server packets.
 </summary>
@@ -23342,7 +20231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="16577">
 <summary>
 Relabel packets to cyphesis_server the packet type.
 </summary>
@@ -23352,85 +20241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945">
-<summary>
-Send and receive TCP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_daap_port" lineno="20960">
-<summary>
-Send UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975">
-<summary>
-Do not audit attempts to send UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20990">
-<summary>
-Receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005">
-<summary>
-Do not audit attempts to receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="21020">
-<summary>
-Send and receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="21051">
+<interface name="corenet_tcp_bind_daap_port" lineno="16599">
 <summary>
 Bind TCP sockets to the daap port.
 </summary>
@@ -23441,7 +20252,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_daap_port" lineno="21071">
+<interface name="corenet_udp_bind_daap_port" lineno="16619">
 <summary>
 Bind UDP sockets to the daap port.
 </summary>
@@ -23452,7 +20263,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="21090">
+<interface name="corenet_tcp_connect_daap_port" lineno="16638">
 <summary>
 Make a TCP connection to the daap port.
 </summary>
@@ -23462,7 +20273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_client_packets" lineno="21110">
+<interface name="corenet_send_daap_client_packets" lineno="16658">
 <summary>
 Send daap_client packets.
 </summary>
@@ -23473,7 +20284,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="16677">
 <summary>
 Do not audit attempts to send daap_client packets.
 </summary>
@@ -23484,7 +20295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_client_packets" lineno="21148">
+<interface name="corenet_receive_daap_client_packets" lineno="16696">
 <summary>
 Receive daap_client packets.
 </summary>
@@ -23495,7 +20306,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="16715">
 <summary>
 Do not audit attempts to receive daap_client packets.
 </summary>
@@ -23506,7 +20317,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="21186">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="16734">
 <summary>
 Send and receive daap_client packets.
 </summary>
@@ -23517,7 +20328,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="16750">
 <summary>
 Do not audit attempts to send and receive daap_client packets.
 </summary>
@@ -23528,7 +20339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="21217">
+<interface name="corenet_relabelto_daap_client_packets" lineno="16765">
 <summary>
 Relabel packets to daap_client the packet type.
 </summary>
@@ -23538,7 +20349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_daap_server_packets" lineno="21237">
+<interface name="corenet_send_daap_server_packets" lineno="16785">
 <summary>
 Send daap_server packets.
 </summary>
@@ -23549,7 +20360,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="16804">
 <summary>
 Do not audit attempts to send daap_server packets.
 </summary>
@@ -23560,7 +20371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_daap_server_packets" lineno="21275">
+<interface name="corenet_receive_daap_server_packets" lineno="16823">
 <summary>
 Receive daap_server packets.
 </summary>
@@ -23571,7 +20382,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="16842">
 <summary>
 Do not audit attempts to receive daap_server packets.
 </summary>
@@ -23582,7 +20393,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="21313">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="16861">
 <summary>
 Send and receive daap_server packets.
 </summary>
@@ -23593,7 +20404,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="16877">
 <summary>
 Do not audit attempts to send and receive daap_server packets.
 </summary>
@@ -23604,7 +20415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="21344">
+<interface name="corenet_relabelto_daap_server_packets" lineno="16892">
 <summary>
 Relabel packets to daap_server the packet type.
 </summary>
@@ -23614,85 +20425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366">
-<summary>
-Send and receive TCP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="21381">
-<summary>
-Send UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396">
-<summary>
-Do not audit attempts to send UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="21411">
-<summary>
-Receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426">
-<summary>
-Do not audit attempts to receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441">
-<summary>
-Send and receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="16914">
 <summary>
 Bind TCP sockets to the dbskkd port.
 </summary>
@@ -23703,7 +20436,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="21492">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="16934">
 <summary>
 Bind UDP sockets to the dbskkd port.
 </summary>
@@ -23714,7 +20447,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="16953">
 <summary>
 Make a TCP connection to the dbskkd port.
 </summary>
@@ -23724,7 +20457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="21531">
+<interface name="corenet_send_dbskkd_client_packets" lineno="16973">
 <summary>
 Send dbskkd_client packets.
 </summary>
@@ -23735,7 +20468,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="16992">
 <summary>
 Do not audit attempts to send dbskkd_client packets.
 </summary>
@@ -23746,7 +20479,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21569">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="17011">
 <summary>
 Receive dbskkd_client packets.
 </summary>
@@ -23757,7 +20490,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="17030">
 <summary>
 Do not audit attempts to receive dbskkd_client packets.
 </summary>
@@ -23768,7 +20501,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="17049">
 <summary>
 Send and receive dbskkd_client packets.
 </summary>
@@ -23779,7 +20512,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="17065">
 <summary>
 Do not audit attempts to send and receive dbskkd_client packets.
 </summary>
@@ -23790,7 +20523,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="17080">
 <summary>
 Relabel packets to dbskkd_client the packet type.
 </summary>
@@ -23800,7 +20533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21658">
+<interface name="corenet_send_dbskkd_server_packets" lineno="17100">
 <summary>
 Send dbskkd_server packets.
 </summary>
@@ -23811,7 +20544,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="17119">
 <summary>
 Do not audit attempts to send dbskkd_server packets.
 </summary>
@@ -23822,7 +20555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21696">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="17138">
 <summary>
 Receive dbskkd_server packets.
 </summary>
@@ -23833,7 +20566,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="17157">
 <summary>
 Do not audit attempts to receive dbskkd_server packets.
 </summary>
@@ -23844,7 +20577,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="17176">
 <summary>
 Send and receive dbskkd_server packets.
 </summary>
@@ -23855,7 +20588,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="17192">
 <summary>
 Do not audit attempts to send and receive dbskkd_server packets.
 </summary>
@@ -23866,7 +20599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="17207">
 <summary>
 Relabel packets to dbskkd_server the packet type.
 </summary>
@@ -23876,85 +20609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787">
-<summary>
-Send and receive TCP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21802">
-<summary>
-Send UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817">
-<summary>
-Do not audit attempts to send UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21832">
-<summary>
-Receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847">
-<summary>
-Do not audit attempts to receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862">
-<summary>
-Send and receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21893">
+<interface name="corenet_tcp_bind_dcc_port" lineno="17229">
 <summary>
 Bind TCP sockets to the dcc port.
 </summary>
@@ -23965,7 +20620,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21913">
+<interface name="corenet_udp_bind_dcc_port" lineno="17249">
 <summary>
 Bind UDP sockets to the dcc port.
 </summary>
@@ -23976,7 +20631,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21932">
+<interface name="corenet_tcp_connect_dcc_port" lineno="17268">
 <summary>
 Make a TCP connection to the dcc port.
 </summary>
@@ -23986,7 +20641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21952">
+<interface name="corenet_send_dcc_client_packets" lineno="17288">
 <summary>
 Send dcc_client packets.
 </summary>
@@ -23997,7 +20652,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="17307">
 <summary>
 Do not audit attempts to send dcc_client packets.
 </summary>
@@ -24008,7 +20663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21990">
+<interface name="corenet_receive_dcc_client_packets" lineno="17326">
 <summary>
 Receive dcc_client packets.
 </summary>
@@ -24019,7 +20674,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="17345">
 <summary>
 Do not audit attempts to receive dcc_client packets.
 </summary>
@@ -24030,7 +20685,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="17364">
 <summary>
 Send and receive dcc_client packets.
 </summary>
@@ -24041,7 +20696,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="17380">
 <summary>
 Do not audit attempts to send and receive dcc_client packets.
 </summary>
@@ -24052,7 +20707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="22059">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="17395">
 <summary>
 Relabel packets to dcc_client the packet type.
 </summary>
@@ -24062,7 +20717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dcc_server_packets" lineno="22079">
+<interface name="corenet_send_dcc_server_packets" lineno="17415">
 <summary>
 Send dcc_server packets.
 </summary>
@@ -24073,7 +20728,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="17434">
 <summary>
 Do not audit attempts to send dcc_server packets.
 </summary>
@@ -24084,7 +20739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="22117">
+<interface name="corenet_receive_dcc_server_packets" lineno="17453">
 <summary>
 Receive dcc_server packets.
 </summary>
@@ -24095,7 +20750,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="17472">
 <summary>
 Do not audit attempts to receive dcc_server packets.
 </summary>
@@ -24106,7 +20761,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="17491">
 <summary>
 Send and receive dcc_server packets.
 </summary>
@@ -24117,7 +20772,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="17507">
 <summary>
 Do not audit attempts to send and receive dcc_server packets.
 </summary>
@@ -24128,7 +20783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="22186">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="17522">
 <summary>
 Relabel packets to dcc_server the packet type.
 </summary>
@@ -24138,85 +20793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208">
-<summary>
-Send and receive TCP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dccm_port" lineno="22223">
-<summary>
-Send UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238">
-<summary>
-Do not audit attempts to send UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="22253">
-<summary>
-Receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268">
-<summary>
-Do not audit attempts to receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283">
-<summary>
-Send and receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="22314">
+<interface name="corenet_tcp_bind_dccm_port" lineno="17544">
 <summary>
 Bind TCP sockets to the dccm port.
 </summary>
@@ -24227,7 +20804,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="22334">
+<interface name="corenet_udp_bind_dccm_port" lineno="17564">
 <summary>
 Bind UDP sockets to the dccm port.
 </summary>
@@ -24238,7 +20815,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="22353">
+<interface name="corenet_tcp_connect_dccm_port" lineno="17583">
 <summary>
 Make a TCP connection to the dccm port.
 </summary>
@@ -24248,7 +20825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_client_packets" lineno="22373">
+<interface name="corenet_send_dccm_client_packets" lineno="17603">
 <summary>
 Send dccm_client packets.
 </summary>
@@ -24259,7 +20836,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="17622">
 <summary>
 Do not audit attempts to send dccm_client packets.
 </summary>
@@ -24270,7 +20847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="22411">
+<interface name="corenet_receive_dccm_client_packets" lineno="17641">
 <summary>
 Receive dccm_client packets.
 </summary>
@@ -24281,7 +20858,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="17660">
 <summary>
 Do not audit attempts to receive dccm_client packets.
 </summary>
@@ -24292,7 +20869,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="17679">
 <summary>
 Send and receive dccm_client packets.
 </summary>
@@ -24303,7 +20880,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="17695">
 <summary>
 Do not audit attempts to send and receive dccm_client packets.
 </summary>
@@ -24314,7 +20891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="22480">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="17710">
 <summary>
 Relabel packets to dccm_client the packet type.
 </summary>
@@ -24324,7 +20901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dccm_server_packets" lineno="22500">
+<interface name="corenet_send_dccm_server_packets" lineno="17730">
 <summary>
 Send dccm_server packets.
 </summary>
@@ -24335,7 +20912,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="17749">
 <summary>
 Do not audit attempts to send dccm_server packets.
 </summary>
@@ -24346,7 +20923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="22538">
+<interface name="corenet_receive_dccm_server_packets" lineno="17768">
 <summary>
 Receive dccm_server packets.
 </summary>
@@ -24357,7 +20934,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="17787">
 <summary>
 Do not audit attempts to receive dccm_server packets.
 </summary>
@@ -24368,7 +20945,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="17806">
 <summary>
 Send and receive dccm_server packets.
 </summary>
@@ -24379,7 +20956,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="17822">
 <summary>
 Do not audit attempts to send and receive dccm_server packets.
 </summary>
@@ -24390,7 +20967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22607">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="17837">
 <summary>
 Relabel packets to dccm_server the packet type.
 </summary>
@@ -24400,85 +20977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629">
-<summary>
-Send and receive TCP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22644">
-<summary>
-Send UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659">
-<summary>
-Do not audit attempts to send UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22674">
-<summary>
-Receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689">
-<summary>
-Do not audit attempts to receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704">
-<summary>
-Send and receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="17859">
 <summary>
 Bind TCP sockets to the dhcpc port.
 </summary>
@@ -24489,7 +20988,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22755">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="17879">
 <summary>
 Bind UDP sockets to the dhcpc port.
 </summary>
@@ -24500,7 +20999,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="17898">
 <summary>
 Make a TCP connection to the dhcpc port.
 </summary>
@@ -24510,7 +21009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22794">
+<interface name="corenet_send_dhcpc_client_packets" lineno="17918">
 <summary>
 Send dhcpc_client packets.
 </summary>
@@ -24521,7 +21020,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="17937">
 <summary>
 Do not audit attempts to send dhcpc_client packets.
 </summary>
@@ -24532,7 +21031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22832">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="17956">
 <summary>
 Receive dhcpc_client packets.
 </summary>
@@ -24543,7 +21042,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="17975">
 <summary>
 Do not audit attempts to receive dhcpc_client packets.
 </summary>
@@ -24554,7 +21053,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="17994">
 <summary>
 Send and receive dhcpc_client packets.
 </summary>
@@ -24565,7 +21064,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="18010">
 <summary>
 Do not audit attempts to send and receive dhcpc_client packets.
 </summary>
@@ -24576,7 +21075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="18025">
 <summary>
 Relabel packets to dhcpc_client the packet type.
 </summary>
@@ -24586,7 +21085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22921">
+<interface name="corenet_send_dhcpc_server_packets" lineno="18045">
 <summary>
 Send dhcpc_server packets.
 </summary>
@@ -24597,7 +21096,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="18064">
 <summary>
 Do not audit attempts to send dhcpc_server packets.
 </summary>
@@ -24608,7 +21107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22959">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="18083">
 <summary>
 Receive dhcpc_server packets.
 </summary>
@@ -24619,7 +21118,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="18102">
 <summary>
 Do not audit attempts to receive dhcpc_server packets.
 </summary>
@@ -24630,7 +21129,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="18121">
 <summary>
 Send and receive dhcpc_server packets.
 </summary>
@@ -24641,7 +21140,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="18137">
 <summary>
 Do not audit attempts to send and receive dhcpc_server packets.
 </summary>
@@ -24652,7 +21151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="18152">
 <summary>
 Relabel packets to dhcpc_server the packet type.
 </summary>
@@ -24662,85 +21161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050">
-<summary>
-Send and receive TCP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="23065">
-<summary>
-Send UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080">
-<summary>
-Do not audit attempts to send UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="23095">
-<summary>
-Receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110">
-<summary>
-Do not audit attempts to receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125">
-<summary>
-Send and receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="18174">
 <summary>
 Bind TCP sockets to the dhcpd port.
 </summary>
@@ -24751,7 +21172,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="23176">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="18194">
 <summary>
 Bind UDP sockets to the dhcpd port.
 </summary>
@@ -24762,7 +21183,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="18213">
 <summary>
 Make a TCP connection to the dhcpd port.
 </summary>
@@ -24772,7 +21193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="23215">
+<interface name="corenet_send_dhcpd_client_packets" lineno="18233">
 <summary>
 Send dhcpd_client packets.
 </summary>
@@ -24783,7 +21204,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="18252">
 <summary>
 Do not audit attempts to send dhcpd_client packets.
 </summary>
@@ -24794,7 +21215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="23253">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="18271">
 <summary>
 Receive dhcpd_client packets.
 </summary>
@@ -24805,7 +21226,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="18290">
 <summary>
 Do not audit attempts to receive dhcpd_client packets.
 </summary>
@@ -24816,7 +21237,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="18309">
 <summary>
 Send and receive dhcpd_client packets.
 </summary>
@@ -24827,7 +21248,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="18325">
 <summary>
 Do not audit attempts to send and receive dhcpd_client packets.
 </summary>
@@ -24838,7 +21259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="18340">
 <summary>
 Relabel packets to dhcpd_client the packet type.
 </summary>
@@ -24848,7 +21269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="23342">
+<interface name="corenet_send_dhcpd_server_packets" lineno="18360">
 <summary>
 Send dhcpd_server packets.
 </summary>
@@ -24859,7 +21280,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="18379">
 <summary>
 Do not audit attempts to send dhcpd_server packets.
 </summary>
@@ -24870,7 +21291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="23380">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="18398">
 <summary>
 Receive dhcpd_server packets.
 </summary>
@@ -24881,7 +21302,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="18417">
 <summary>
 Do not audit attempts to receive dhcpd_server packets.
 </summary>
@@ -24892,7 +21313,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="18436">
 <summary>
 Send and receive dhcpd_server packets.
 </summary>
@@ -24903,7 +21324,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="18452">
 <summary>
 Do not audit attempts to send and receive dhcpd_server packets.
 </summary>
@@ -24914,7 +21335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="18467">
 <summary>
 Relabel packets to dhcpd_server the packet type.
 </summary>
@@ -24924,85 +21345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471">
-<summary>
-Send and receive TCP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dict_port" lineno="23486">
-<summary>
-Send UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501">
-<summary>
-Do not audit attempts to send UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dict_port" lineno="23516">
-<summary>
-Receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531">
-<summary>
-Do not audit attempts to receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="23546">
-<summary>
-Send and receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23577">
+<interface name="corenet_tcp_bind_dict_port" lineno="18489">
 <summary>
 Bind TCP sockets to the dict port.
 </summary>
@@ -25013,7 +21356,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23597">
+<interface name="corenet_udp_bind_dict_port" lineno="18509">
 <summary>
 Bind UDP sockets to the dict port.
 </summary>
@@ -25024,7 +21367,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23616">
+<interface name="corenet_tcp_connect_dict_port" lineno="18528">
 <summary>
 Make a TCP connection to the dict port.
 </summary>
@@ -25034,7 +21377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_client_packets" lineno="23636">
+<interface name="corenet_send_dict_client_packets" lineno="18548">
 <summary>
 Send dict_client packets.
 </summary>
@@ -25045,7 +21388,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="18567">
 <summary>
 Do not audit attempts to send dict_client packets.
 </summary>
@@ -25056,7 +21399,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23674">
+<interface name="corenet_receive_dict_client_packets" lineno="18586">
 <summary>
 Receive dict_client packets.
 </summary>
@@ -25067,7 +21410,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="18605">
 <summary>
 Do not audit attempts to receive dict_client packets.
 </summary>
@@ -25078,7 +21421,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23712">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="18624">
 <summary>
 Send and receive dict_client packets.
 </summary>
@@ -25089,7 +21432,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="18640">
 <summary>
 Do not audit attempts to send and receive dict_client packets.
 </summary>
@@ -25100,7 +21443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23743">
+<interface name="corenet_relabelto_dict_client_packets" lineno="18655">
 <summary>
 Relabel packets to dict_client the packet type.
 </summary>
@@ -25110,7 +21453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dict_server_packets" lineno="23763">
+<interface name="corenet_send_dict_server_packets" lineno="18675">
 <summary>
 Send dict_server packets.
 </summary>
@@ -25121,7 +21464,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="18694">
 <summary>
 Do not audit attempts to send dict_server packets.
 </summary>
@@ -25132,7 +21475,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23801">
+<interface name="corenet_receive_dict_server_packets" lineno="18713">
 <summary>
 Receive dict_server packets.
 </summary>
@@ -25143,7 +21486,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="18732">
 <summary>
 Do not audit attempts to receive dict_server packets.
 </summary>
@@ -25154,7 +21497,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23839">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="18751">
 <summary>
 Send and receive dict_server packets.
 </summary>
@@ -25165,7 +21508,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="18767">
 <summary>
 Do not audit attempts to send and receive dict_server packets.
 </summary>
@@ -25176,7 +21519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23870">
+<interface name="corenet_relabelto_dict_server_packets" lineno="18782">
 <summary>
 Relabel packets to dict_server the packet type.
 </summary>
@@ -25186,85 +21529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892">
-<summary>
-Send and receive TCP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23907">
-<summary>
-Send UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922">
-<summary>
-Do not audit attempts to send UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23937">
-<summary>
-Receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952">
-<summary>
-Do not audit attempts to receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967">
-<summary>
-Send and receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23998">
+<interface name="corenet_tcp_bind_distccd_port" lineno="18804">
 <summary>
 Bind TCP sockets to the distccd port.
 </summary>
@@ -25275,7 +21540,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="24018">
+<interface name="corenet_udp_bind_distccd_port" lineno="18824">
 <summary>
 Bind UDP sockets to the distccd port.
 </summary>
@@ -25286,7 +21551,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="24037">
+<interface name="corenet_tcp_connect_distccd_port" lineno="18843">
 <summary>
 Make a TCP connection to the distccd port.
 </summary>
@@ -25296,7 +21561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_client_packets" lineno="24057">
+<interface name="corenet_send_distccd_client_packets" lineno="18863">
 <summary>
 Send distccd_client packets.
 </summary>
@@ -25307,7 +21572,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="18882">
 <summary>
 Do not audit attempts to send distccd_client packets.
 </summary>
@@ -25318,7 +21583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="24095">
+<interface name="corenet_receive_distccd_client_packets" lineno="18901">
 <summary>
 Receive distccd_client packets.
 </summary>
@@ -25329,7 +21594,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="18920">
 <summary>
 Do not audit attempts to receive distccd_client packets.
 </summary>
@@ -25340,7 +21605,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="18939">
 <summary>
 Send and receive distccd_client packets.
 </summary>
@@ -25351,7 +21616,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="18955">
 <summary>
 Do not audit attempts to send and receive distccd_client packets.
 </summary>
@@ -25362,7 +21627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="24164">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="18970">
 <summary>
 Relabel packets to distccd_client the packet type.
 </summary>
@@ -25372,7 +21637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_distccd_server_packets" lineno="24184">
+<interface name="corenet_send_distccd_server_packets" lineno="18990">
 <summary>
 Send distccd_server packets.
 </summary>
@@ -25383,7 +21648,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="19009">
 <summary>
 Do not audit attempts to send distccd_server packets.
 </summary>
@@ -25394,7 +21659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="24222">
+<interface name="corenet_receive_distccd_server_packets" lineno="19028">
 <summary>
 Receive distccd_server packets.
 </summary>
@@ -25405,7 +21670,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="19047">
 <summary>
 Do not audit attempts to receive distccd_server packets.
 </summary>
@@ -25416,7 +21681,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="19066">
 <summary>
 Send and receive distccd_server packets.
 </summary>
@@ -25427,7 +21692,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="19082">
 <summary>
 Do not audit attempts to send and receive distccd_server packets.
 </summary>
@@ -25438,7 +21703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="24291">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="19097">
 <summary>
 Relabel packets to distccd_server the packet type.
 </summary>
@@ -25448,85 +21713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313">
-<summary>
-Send and receive TCP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dns_port" lineno="24328">
-<summary>
-Send UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343">
-<summary>
-Do not audit attempts to send UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dns_port" lineno="24358">
-<summary>
-Receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373">
-<summary>
-Do not audit attempts to receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="24388">
-<summary>
-Send and receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="24419">
+<interface name="corenet_tcp_bind_dns_port" lineno="19119">
 <summary>
 Bind TCP sockets to the dns port.
 </summary>
@@ -25537,7 +21724,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dns_port" lineno="24439">
+<interface name="corenet_udp_bind_dns_port" lineno="19139">
 <summary>
 Bind UDP sockets to the dns port.
 </summary>
@@ -25548,7 +21735,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="24458">
+<interface name="corenet_tcp_connect_dns_port" lineno="19158">
 <summary>
 Make a TCP connection to the dns port.
 </summary>
@@ -25558,7 +21745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_client_packets" lineno="24478">
+<interface name="corenet_send_dns_client_packets" lineno="19178">
 <summary>
 Send dns_client packets.
 </summary>
@@ -25569,7 +21756,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="19197">
 <summary>
 Do not audit attempts to send dns_client packets.
 </summary>
@@ -25580,7 +21767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_client_packets" lineno="24516">
+<interface name="corenet_receive_dns_client_packets" lineno="19216">
 <summary>
 Receive dns_client packets.
 </summary>
@@ -25591,7 +21778,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="19235">
 <summary>
 Do not audit attempts to receive dns_client packets.
 </summary>
@@ -25602,7 +21789,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="24554">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="19254">
 <summary>
 Send and receive dns_client packets.
 </summary>
@@ -25613,7 +21800,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="19270">
 <summary>
 Do not audit attempts to send and receive dns_client packets.
 </summary>
@@ -25624,7 +21811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24585">
+<interface name="corenet_relabelto_dns_client_packets" lineno="19285">
 <summary>
 Relabel packets to dns_client the packet type.
 </summary>
@@ -25634,7 +21821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dns_server_packets" lineno="24605">
+<interface name="corenet_send_dns_server_packets" lineno="19305">
 <summary>
 Send dns_server packets.
 </summary>
@@ -25645,7 +21832,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="19324">
 <summary>
 Do not audit attempts to send dns_server packets.
 </summary>
@@ -25656,7 +21843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24643">
+<interface name="corenet_receive_dns_server_packets" lineno="19343">
 <summary>
 Receive dns_server packets.
 </summary>
@@ -25667,7 +21854,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="19362">
 <summary>
 Do not audit attempts to receive dns_server packets.
 </summary>
@@ -25678,7 +21865,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24681">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="19381">
 <summary>
 Send and receive dns_server packets.
 </summary>
@@ -25689,7 +21876,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="19397">
 <summary>
 Do not audit attempts to send and receive dns_server packets.
 </summary>
@@ -25700,7 +21887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24712">
+<interface name="corenet_relabelto_dns_server_packets" lineno="19412">
 <summary>
 Relabel packets to dns_server the packet type.
 </summary>
@@ -25710,85 +21897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734">
-<summary>
-Send and receive TCP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24749">
-<summary>
-Send UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764">
-<summary>
-Do not audit attempts to send UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24779">
-<summary>
-Receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794">
-<summary>
-Do not audit attempts to receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809">
-<summary>
-Send and receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24840">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="19434">
 <summary>
 Bind TCP sockets to the dropbox port.
 </summary>
@@ -25799,7 +21908,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24860">
+<interface name="corenet_udp_bind_dropbox_port" lineno="19454">
 <summary>
 Bind UDP sockets to the dropbox port.
 </summary>
@@ -25810,7 +21919,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24879">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="19473">
 <summary>
 Make a TCP connection to the dropbox port.
 </summary>
@@ -25820,7 +21929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24899">
+<interface name="corenet_send_dropbox_client_packets" lineno="19493">
 <summary>
 Send dropbox_client packets.
 </summary>
@@ -25831,7 +21940,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="19512">
 <summary>
 Do not audit attempts to send dropbox_client packets.
 </summary>
@@ -25842,7 +21951,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24937">
+<interface name="corenet_receive_dropbox_client_packets" lineno="19531">
 <summary>
 Receive dropbox_client packets.
 </summary>
@@ -25853,7 +21962,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="19550">
 <summary>
 Do not audit attempts to receive dropbox_client packets.
 </summary>
@@ -25864,7 +21973,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="19569">
 <summary>
 Send and receive dropbox_client packets.
 </summary>
@@ -25875,7 +21984,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="19585">
 <summary>
 Do not audit attempts to send and receive dropbox_client packets.
 </summary>
@@ -25886,7 +21995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="19600">
 <summary>
 Relabel packets to dropbox_client the packet type.
 </summary>
@@ -25896,7 +22005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="25026">
+<interface name="corenet_send_dropbox_server_packets" lineno="19620">
 <summary>
 Send dropbox_server packets.
 </summary>
@@ -25907,7 +22016,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="19639">
 <summary>
 Do not audit attempts to send dropbox_server packets.
 </summary>
@@ -25918,7 +22027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="25064">
+<interface name="corenet_receive_dropbox_server_packets" lineno="19658">
 <summary>
 Receive dropbox_server packets.
 </summary>
@@ -25929,7 +22038,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="19677">
 <summary>
 Do not audit attempts to receive dropbox_server packets.
 </summary>
@@ -25940,7 +22049,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="19696">
 <summary>
 Send and receive dropbox_server packets.
 </summary>
@@ -25951,7 +22060,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="19712">
 <summary>
 Do not audit attempts to send and receive dropbox_server packets.
 </summary>
@@ -25962,7 +22071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="19727">
 <summary>
 Relabel packets to dropbox_server the packet type.
 </summary>
@@ -25972,85 +22081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155">
-<summary>
-Send and receive TCP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_efs_port" lineno="25170">
-<summary>
-Send UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185">
-<summary>
-Do not audit attempts to send UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_efs_port" lineno="25200">
-<summary>
-Receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215">
-<summary>
-Do not audit attempts to receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="25230">
-<summary>
-Send and receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="25261">
+<interface name="corenet_tcp_bind_efs_port" lineno="19749">
 <summary>
 Bind TCP sockets to the efs port.
 </summary>
@@ -26061,7 +22092,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_efs_port" lineno="25281">
+<interface name="corenet_udp_bind_efs_port" lineno="19769">
 <summary>
 Bind UDP sockets to the efs port.
 </summary>
@@ -26072,7 +22103,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="25300">
+<interface name="corenet_tcp_connect_efs_port" lineno="19788">
 <summary>
 Make a TCP connection to the efs port.
 </summary>
@@ -26082,7 +22113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_client_packets" lineno="25320">
+<interface name="corenet_send_efs_client_packets" lineno="19808">
 <summary>
 Send efs_client packets.
 </summary>
@@ -26093,7 +22124,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="19827">
 <summary>
 Do not audit attempts to send efs_client packets.
 </summary>
@@ -26104,7 +22135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_client_packets" lineno="25358">
+<interface name="corenet_receive_efs_client_packets" lineno="19846">
 <summary>
 Receive efs_client packets.
 </summary>
@@ -26115,7 +22146,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="19865">
 <summary>
 Do not audit attempts to receive efs_client packets.
 </summary>
@@ -26126,7 +22157,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="25396">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="19884">
 <summary>
 Send and receive efs_client packets.
 </summary>
@@ -26137,7 +22168,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="19900">
 <summary>
 Do not audit attempts to send and receive efs_client packets.
 </summary>
@@ -26148,7 +22179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="25427">
+<interface name="corenet_relabelto_efs_client_packets" lineno="19915">
 <summary>
 Relabel packets to efs_client the packet type.
 </summary>
@@ -26158,7 +22189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_efs_server_packets" lineno="25447">
+<interface name="corenet_send_efs_server_packets" lineno="19935">
 <summary>
 Send efs_server packets.
 </summary>
@@ -26169,7 +22200,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="19954">
 <summary>
 Do not audit attempts to send efs_server packets.
 </summary>
@@ -26180,7 +22211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_efs_server_packets" lineno="25485">
+<interface name="corenet_receive_efs_server_packets" lineno="19973">
 <summary>
 Receive efs_server packets.
 </summary>
@@ -26191,7 +22222,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="19992">
 <summary>
 Do not audit attempts to receive efs_server packets.
 </summary>
@@ -26202,7 +22233,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="25523">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="20011">
 <summary>
 Send and receive efs_server packets.
 </summary>
@@ -26213,7 +22244,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="20027">
 <summary>
 Do not audit attempts to send and receive efs_server packets.
 </summary>
@@ -26224,7 +22255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="25554">
+<interface name="corenet_relabelto_efs_server_packets" lineno="20042">
 <summary>
 Relabel packets to efs_server the packet type.
 </summary>
@@ -26234,85 +22265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576">
-<summary>
-Send and receive TCP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591">
-<summary>
-Send UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606">
-<summary>
-Do not audit attempts to send UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621">
-<summary>
-Receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636">
-<summary>
-Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651">
-<summary>
-Send and receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="20064">
 <summary>
 Bind TCP sockets to the embrace_dp_c port.
 </summary>
@@ -26323,7 +22276,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="20084">
 <summary>
 Bind UDP sockets to the embrace_dp_c port.
 </summary>
@@ -26334,7 +22287,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="20103">
 <summary>
 Make a TCP connection to the embrace_dp_c port.
 </summary>
@@ -26344,7 +22297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="20123">
 <summary>
 Send embrace_dp_c_client packets.
 </summary>
@@ -26355,7 +22308,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="20142">
 <summary>
 Do not audit attempts to send embrace_dp_c_client packets.
 </summary>
@@ -26366,7 +22319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="20161">
 <summary>
 Receive embrace_dp_c_client packets.
 </summary>
@@ -26377,7 +22330,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="20180">
 <summary>
 Do not audit attempts to receive embrace_dp_c_client packets.
 </summary>
@@ -26388,7 +22341,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="20199">
 <summary>
 Send and receive embrace_dp_c_client packets.
 </summary>
@@ -26399,7 +22352,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="20215">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_client packets.
 </summary>
@@ -26410,7 +22363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="20230">
 <summary>
 Relabel packets to embrace_dp_c_client the packet type.
 </summary>
@@ -26420,7 +22373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="20250">
 <summary>
 Send embrace_dp_c_server packets.
 </summary>
@@ -26431,7 +22384,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="20269">
 <summary>
 Do not audit attempts to send embrace_dp_c_server packets.
 </summary>
@@ -26442,7 +22395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="20288">
 <summary>
 Receive embrace_dp_c_server packets.
 </summary>
@@ -26453,7 +22406,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="20307">
 <summary>
 Do not audit attempts to receive embrace_dp_c_server packets.
 </summary>
@@ -26464,7 +22417,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="20326">
 <summary>
 Send and receive embrace_dp_c_server packets.
 </summary>
@@ -26475,7 +22428,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="20342">
 <summary>
 Do not audit attempts to send and receive embrace_dp_c_server packets.
 </summary>
@@ -26486,7 +22439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="20357">
 <summary>
 Relabel packets to embrace_dp_c_server the packet type.
 </summary>
@@ -26496,85 +22449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997">
-<summary>
-Send and receive TCP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_epmap_port" lineno="26012">
-<summary>
-Send UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027">
-<summary>
-Do not audit attempts to send UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="26042">
-<summary>
-Receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057">
-<summary>
-Do not audit attempts to receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072">
-<summary>
-Send and receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="26103">
+<interface name="corenet_tcp_bind_epmap_port" lineno="20379">
 <summary>
 Bind TCP sockets to the epmap port.
 </summary>
@@ -26585,7 +22460,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="26123">
+<interface name="corenet_udp_bind_epmap_port" lineno="20399">
 <summary>
 Bind UDP sockets to the epmap port.
 </summary>
@@ -26596,7 +22471,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="26142">
+<interface name="corenet_tcp_connect_epmap_port" lineno="20418">
 <summary>
 Make a TCP connection to the epmap port.
 </summary>
@@ -26606,7 +22481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_client_packets" lineno="26162">
+<interface name="corenet_send_epmap_client_packets" lineno="20438">
 <summary>
 Send epmap_client packets.
 </summary>
@@ -26617,7 +22492,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="20457">
 <summary>
 Do not audit attempts to send epmap_client packets.
 </summary>
@@ -26628,7 +22503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="26200">
+<interface name="corenet_receive_epmap_client_packets" lineno="20476">
 <summary>
 Receive epmap_client packets.
 </summary>
@@ -26639,7 +22514,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="20495">
 <summary>
 Do not audit attempts to receive epmap_client packets.
 </summary>
@@ -26650,7 +22525,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="20514">
 <summary>
 Send and receive epmap_client packets.
 </summary>
@@ -26661,7 +22536,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="20530">
 <summary>
 Do not audit attempts to send and receive epmap_client packets.
 </summary>
@@ -26672,7 +22547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="26269">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="20545">
 <summary>
 Relabel packets to epmap_client the packet type.
 </summary>
@@ -26682,7 +22557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmap_server_packets" lineno="26289">
+<interface name="corenet_send_epmap_server_packets" lineno="20565">
 <summary>
 Send epmap_server packets.
 </summary>
@@ -26693,7 +22568,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="20584">
 <summary>
 Do not audit attempts to send epmap_server packets.
 </summary>
@@ -26704,7 +22579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="26327">
+<interface name="corenet_receive_epmap_server_packets" lineno="20603">
 <summary>
 Receive epmap_server packets.
 </summary>
@@ -26715,7 +22590,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="20622">
 <summary>
 Do not audit attempts to receive epmap_server packets.
 </summary>
@@ -26726,7 +22601,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="20641">
 <summary>
 Send and receive epmap_server packets.
 </summary>
@@ -26737,7 +22612,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="20657">
 <summary>
 Do not audit attempts to send and receive epmap_server packets.
 </summary>
@@ -26748,7 +22623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="26396">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="20672">
 <summary>
 Relabel packets to epmap_server the packet type.
 </summary>
@@ -26758,85 +22633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418">
-<summary>
-Send and receive TCP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_epmd_port" lineno="26433">
-<summary>
-Send UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448">
-<summary>
-Do not audit attempts to send UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="26463">
-<summary>
-Receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478">
-<summary>
-Do not audit attempts to receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493">
-<summary>
-Send and receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="26524">
+<interface name="corenet_tcp_bind_epmd_port" lineno="20694">
 <summary>
 Bind TCP sockets to the epmd port.
 </summary>
@@ -26847,7 +22644,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="26544">
+<interface name="corenet_udp_bind_epmd_port" lineno="20714">
 <summary>
 Bind UDP sockets to the epmd port.
 </summary>
@@ -26858,7 +22655,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26563">
+<interface name="corenet_tcp_connect_epmd_port" lineno="20733">
 <summary>
 Make a TCP connection to the epmd port.
 </summary>
@@ -26868,7 +22665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26583">
+<interface name="corenet_send_epmd_client_packets" lineno="20753">
 <summary>
 Send epmd_client packets.
 </summary>
@@ -26879,7 +22676,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="20772">
 <summary>
 Do not audit attempts to send epmd_client packets.
 </summary>
@@ -26890,7 +22687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26621">
+<interface name="corenet_receive_epmd_client_packets" lineno="20791">
 <summary>
 Receive epmd_client packets.
 </summary>
@@ -26901,7 +22698,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="20810">
 <summary>
 Do not audit attempts to receive epmd_client packets.
 </summary>
@@ -26912,7 +22709,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="20829">
 <summary>
 Send and receive epmd_client packets.
 </summary>
@@ -26923,7 +22720,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="20845">
 <summary>
 Do not audit attempts to send and receive epmd_client packets.
 </summary>
@@ -26934,7 +22731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26690">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="20860">
 <summary>
 Relabel packets to epmd_client the packet type.
 </summary>
@@ -26944,7 +22741,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26710">
+<interface name="corenet_send_epmd_server_packets" lineno="20880">
 <summary>
 Send epmd_server packets.
 </summary>
@@ -26955,7 +22752,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="20899">
 <summary>
 Do not audit attempts to send epmd_server packets.
 </summary>
@@ -26966,7 +22763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26748">
+<interface name="corenet_receive_epmd_server_packets" lineno="20918">
 <summary>
 Receive epmd_server packets.
 </summary>
@@ -26977,7 +22774,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="20937">
 <summary>
 Do not audit attempts to receive epmd_server packets.
 </summary>
@@ -26988,7 +22785,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="20956">
 <summary>
 Send and receive epmd_server packets.
 </summary>
@@ -26999,7 +22796,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="20972">
 <summary>
 Do not audit attempts to send and receive epmd_server packets.
 </summary>
@@ -27010,7 +22807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26817">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="20987">
 <summary>
 Relabel packets to epmd_server the packet type.
 </summary>
@@ -27020,85 +22817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839">
-<summary>
-Send and receive TCP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26854">
-<summary>
-Send UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869">
-<summary>
-Do not audit attempts to send UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26884">
-<summary>
-Receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899">
-<summary>
-Do not audit attempts to receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914">
-<summary>
-Send and receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26945">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="21009">
 <summary>
 Bind TCP sockets to the fingerd port.
 </summary>
@@ -27109,7 +22828,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26965">
+<interface name="corenet_udp_bind_fingerd_port" lineno="21029">
 <summary>
 Bind UDP sockets to the fingerd port.
 </summary>
@@ -27120,7 +22839,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26984">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="21048">
 <summary>
 Make a TCP connection to the fingerd port.
 </summary>
@@ -27130,7 +22849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="27004">
+<interface name="corenet_send_fingerd_client_packets" lineno="21068">
 <summary>
 Send fingerd_client packets.
 </summary>
@@ -27141,7 +22860,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="21087">
 <summary>
 Do not audit attempts to send fingerd_client packets.
 </summary>
@@ -27152,7 +22871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="27042">
+<interface name="corenet_receive_fingerd_client_packets" lineno="21106">
 <summary>
 Receive fingerd_client packets.
 </summary>
@@ -27163,7 +22882,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="21125">
 <summary>
 Do not audit attempts to receive fingerd_client packets.
 </summary>
@@ -27174,7 +22893,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="21144">
 <summary>
 Send and receive fingerd_client packets.
 </summary>
@@ -27185,7 +22904,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="21160">
 <summary>
 Do not audit attempts to send and receive fingerd_client packets.
 </summary>
@@ -27196,7 +22915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="21175">
 <summary>
 Relabel packets to fingerd_client the packet type.
 </summary>
@@ -27206,7 +22925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="27131">
+<interface name="corenet_send_fingerd_server_packets" lineno="21195">
 <summary>
 Send fingerd_server packets.
 </summary>
@@ -27217,7 +22936,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="21214">
 <summary>
 Do not audit attempts to send fingerd_server packets.
 </summary>
@@ -27228,7 +22947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="27169">
+<interface name="corenet_receive_fingerd_server_packets" lineno="21233">
 <summary>
 Receive fingerd_server packets.
 </summary>
@@ -27239,7 +22958,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="21252">
 <summary>
 Do not audit attempts to receive fingerd_server packets.
 </summary>
@@ -27250,7 +22969,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="21271">
 <summary>
 Send and receive fingerd_server packets.
 </summary>
@@ -27261,7 +22980,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="21287">
 <summary>
 Do not audit attempts to send and receive fingerd_server packets.
 </summary>
@@ -27272,7 +22991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="21302">
 <summary>
 Relabel packets to fingerd_server the packet type.
 </summary>
@@ -27282,85 +23001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260">
-<summary>
-Send and receive TCP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ftp_port" lineno="27275">
-<summary>
-Send UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290">
-<summary>
-Do not audit attempts to send UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="27305">
-<summary>
-Receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320">
-<summary>
-Do not audit attempts to receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335">
-<summary>
-Send and receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="27366">
+<interface name="corenet_tcp_bind_ftp_port" lineno="21324">
 <summary>
 Bind TCP sockets to the ftp port.
 </summary>
@@ -27371,7 +23012,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="27386">
+<interface name="corenet_udp_bind_ftp_port" lineno="21344">
 <summary>
 Bind UDP sockets to the ftp port.
 </summary>
@@ -27382,7 +23023,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="27405">
+<interface name="corenet_tcp_connect_ftp_port" lineno="21363">
 <summary>
 Make a TCP connection to the ftp port.
 </summary>
@@ -27392,7 +23033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_client_packets" lineno="27425">
+<interface name="corenet_send_ftp_client_packets" lineno="21383">
 <summary>
 Send ftp_client packets.
 </summary>
@@ -27403,7 +23044,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="21402">
 <summary>
 Do not audit attempts to send ftp_client packets.
 </summary>
@@ -27414,7 +23055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="27463">
+<interface name="corenet_receive_ftp_client_packets" lineno="21421">
 <summary>
 Receive ftp_client packets.
 </summary>
@@ -27425,7 +23066,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="21440">
 <summary>
 Do not audit attempts to receive ftp_client packets.
 </summary>
@@ -27436,7 +23077,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="21459">
 <summary>
 Send and receive ftp_client packets.
 </summary>
@@ -27447,7 +23088,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="21475">
 <summary>
 Do not audit attempts to send and receive ftp_client packets.
 </summary>
@@ -27458,7 +23099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="27532">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="21490">
 <summary>
 Relabel packets to ftp_client the packet type.
 </summary>
@@ -27468,7 +23109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_server_packets" lineno="27552">
+<interface name="corenet_send_ftp_server_packets" lineno="21510">
 <summary>
 Send ftp_server packets.
 </summary>
@@ -27479,7 +23120,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="21529">
 <summary>
 Do not audit attempts to send ftp_server packets.
 </summary>
@@ -27490,7 +23131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27590">
+<interface name="corenet_receive_ftp_server_packets" lineno="21548">
 <summary>
 Receive ftp_server packets.
 </summary>
@@ -27501,7 +23142,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="21567">
 <summary>
 Do not audit attempts to receive ftp_server packets.
 </summary>
@@ -27512,7 +23153,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="21586">
 <summary>
 Send and receive ftp_server packets.
 </summary>
@@ -27523,7 +23164,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="21602">
 <summary>
 Do not audit attempts to send and receive ftp_server packets.
 </summary>
@@ -27534,7 +23175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27659">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="21617">
 <summary>
 Relabel packets to ftp_server the packet type.
 </summary>
@@ -27544,85 +23185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681">
-<summary>
-Send and receive TCP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27696">
-<summary>
-Send UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711">
-<summary>
-Do not audit attempts to send UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27726">
-<summary>
-Receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741">
-<summary>
-Do not audit attempts to receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756">
-<summary>
-Send and receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="21639">
 <summary>
 Bind TCP sockets to the ftp_data port.
 </summary>
@@ -27633,7 +23196,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27807">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="21659">
 <summary>
 Bind UDP sockets to the ftp_data port.
 </summary>
@@ -27644,7 +23207,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="21678">
 <summary>
 Make a TCP connection to the ftp_data port.
 </summary>
@@ -27654,7 +23217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27846">
+<interface name="corenet_send_ftp_data_client_packets" lineno="21698">
 <summary>
 Send ftp_data_client packets.
 </summary>
@@ -27665,7 +23228,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="21717">
 <summary>
 Do not audit attempts to send ftp_data_client packets.
 </summary>
@@ -27676,7 +23239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27884">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="21736">
 <summary>
 Receive ftp_data_client packets.
 </summary>
@@ -27687,7 +23250,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="21755">
 <summary>
 Do not audit attempts to receive ftp_data_client packets.
 </summary>
@@ -27698,7 +23261,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="21774">
 <summary>
 Send and receive ftp_data_client packets.
 </summary>
@@ -27709,7 +23272,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="21790">
 <summary>
 Do not audit attempts to send and receive ftp_data_client packets.
 </summary>
@@ -27720,7 +23283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="21805">
 <summary>
 Relabel packets to ftp_data_client the packet type.
 </summary>
@@ -27730,7 +23293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27973">
+<interface name="corenet_send_ftp_data_server_packets" lineno="21825">
 <summary>
 Send ftp_data_server packets.
 </summary>
@@ -27741,7 +23304,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="21844">
 <summary>
 Do not audit attempts to send ftp_data_server packets.
 </summary>
@@ -27752,7 +23315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="28011">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="21863">
 <summary>
 Receive ftp_data_server packets.
 </summary>
@@ -27763,7 +23326,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="21882">
 <summary>
 Do not audit attempts to receive ftp_data_server packets.
 </summary>
@@ -27774,7 +23337,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="21901">
 <summary>
 Send and receive ftp_data_server packets.
 </summary>
@@ -27785,7 +23348,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="21917">
 <summary>
 Do not audit attempts to send and receive ftp_data_server packets.
 </summary>
@@ -27796,7 +23359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="21932">
 <summary>
 Relabel packets to ftp_data_server the packet type.
 </summary>
@@ -27806,85 +23369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102">
-<summary>
-Send and receive TCP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="28117">
-<summary>
-Send UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132">
-<summary>
-Do not audit attempts to send UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147">
-<summary>
-Receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162">
-<summary>
-Do not audit attempts to receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177">
-<summary>
-Send and receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="21954">
 <summary>
 Bind TCP sockets to the gatekeeper port.
 </summary>
@@ -27895,7 +23380,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="21974">
 <summary>
 Bind UDP sockets to the gatekeeper port.
 </summary>
@@ -27906,7 +23391,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="21993">
 <summary>
 Make a TCP connection to the gatekeeper port.
 </summary>
@@ -27916,7 +23401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="28267">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="22013">
 <summary>
 Send gatekeeper_client packets.
 </summary>
@@ -27927,7 +23412,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="22032">
 <summary>
 Do not audit attempts to send gatekeeper_client packets.
 </summary>
@@ -27938,7 +23423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="22051">
 <summary>
 Receive gatekeeper_client packets.
 </summary>
@@ -27949,7 +23434,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="22070">
 <summary>
 Do not audit attempts to receive gatekeeper_client packets.
 </summary>
@@ -27960,7 +23445,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="22089">
 <summary>
 Send and receive gatekeeper_client packets.
 </summary>
@@ -27971,7 +23456,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="22105">
 <summary>
 Do not audit attempts to send and receive gatekeeper_client packets.
 </summary>
@@ -27982,7 +23467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="22120">
 <summary>
 Relabel packets to gatekeeper_client the packet type.
 </summary>
@@ -27992,7 +23477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="28394">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="22140">
 <summary>
 Send gatekeeper_server packets.
 </summary>
@@ -28003,7 +23488,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="22159">
 <summary>
 Do not audit attempts to send gatekeeper_server packets.
 </summary>
@@ -28014,7 +23499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="22178">
 <summary>
 Receive gatekeeper_server packets.
 </summary>
@@ -28025,7 +23510,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="22197">
 <summary>
 Do not audit attempts to receive gatekeeper_server packets.
 </summary>
@@ -28036,7 +23521,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="22216">
 <summary>
 Send and receive gatekeeper_server packets.
 </summary>
@@ -28047,7 +23532,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="22232">
 <summary>
 Do not audit attempts to send and receive gatekeeper_server packets.
 </summary>
@@ -28058,7 +23543,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="22247">
 <summary>
 Relabel packets to gatekeeper_server the packet type.
 </summary>
@@ -28068,85 +23553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523">
-<summary>
-Send and receive TCP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="28538">
-<summary>
-Send UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553">
-<summary>
-Do not audit attempts to send UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28568">
-<summary>
-Receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583">
-<summary>
-Do not audit attempts to receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598">
-<summary>
-Send and receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28629">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="22269">
 <summary>
 Bind TCP sockets to the gdomap port.
 </summary>
@@ -28157,7 +23564,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28649">
+<interface name="corenet_udp_bind_gdomap_port" lineno="22289">
 <summary>
 Bind UDP sockets to the gdomap port.
 </summary>
@@ -28168,7 +23575,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28668">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="22308">
 <summary>
 Make a TCP connection to the gdomap port.
 </summary>
@@ -28178,7 +23585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28688">
+<interface name="corenet_send_gdomap_client_packets" lineno="22328">
 <summary>
 Send gdomap_client packets.
 </summary>
@@ -28189,7 +23596,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="22347">
 <summary>
 Do not audit attempts to send gdomap_client packets.
 </summary>
@@ -28200,7 +23607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28726">
+<interface name="corenet_receive_gdomap_client_packets" lineno="22366">
 <summary>
 Receive gdomap_client packets.
 </summary>
@@ -28211,7 +23618,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="22385">
 <summary>
 Do not audit attempts to receive gdomap_client packets.
 </summary>
@@ -28222,7 +23629,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="22404">
 <summary>
 Send and receive gdomap_client packets.
 </summary>
@@ -28233,7 +23640,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="22420">
 <summary>
 Do not audit attempts to send and receive gdomap_client packets.
 </summary>
@@ -28244,7 +23651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="22435">
 <summary>
 Relabel packets to gdomap_client the packet type.
 </summary>
@@ -28254,7 +23661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28815">
+<interface name="corenet_send_gdomap_server_packets" lineno="22455">
 <summary>
 Send gdomap_server packets.
 </summary>
@@ -28265,7 +23672,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="22474">
 <summary>
 Do not audit attempts to send gdomap_server packets.
 </summary>
@@ -28276,7 +23683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28853">
+<interface name="corenet_receive_gdomap_server_packets" lineno="22493">
 <summary>
 Receive gdomap_server packets.
 </summary>
@@ -28287,7 +23694,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="22512">
 <summary>
 Do not audit attempts to receive gdomap_server packets.
 </summary>
@@ -28298,7 +23705,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="22531">
 <summary>
 Send and receive gdomap_server packets.
 </summary>
@@ -28309,7 +23716,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="22547">
 <summary>
 Do not audit attempts to send and receive gdomap_server packets.
 </summary>
@@ -28320,7 +23727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="22562">
 <summary>
 Relabel packets to gdomap_server the packet type.
 </summary>
@@ -28330,85 +23737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944">
-<summary>
-Send and receive TCP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28959">
-<summary>
-Send UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974">
-<summary>
-Do not audit attempts to send UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28989">
-<summary>
-Receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004">
-<summary>
-Do not audit attempts to receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019">
-<summary>
-Send and receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="29050">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="22584">
 <summary>
 Bind TCP sockets to the gds_db port.
 </summary>
@@ -28419,7 +23748,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="29070">
+<interface name="corenet_udp_bind_gds_db_port" lineno="22604">
 <summary>
 Bind UDP sockets to the gds_db port.
 </summary>
@@ -28430,7 +23759,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="29089">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="22623">
 <summary>
 Make a TCP connection to the gds_db port.
 </summary>
@@ -28440,7 +23769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="29109">
+<interface name="corenet_send_gds_db_client_packets" lineno="22643">
 <summary>
 Send gds_db_client packets.
 </summary>
@@ -28451,7 +23780,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="22662">
 <summary>
 Do not audit attempts to send gds_db_client packets.
 </summary>
@@ -28462,7 +23791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="29147">
+<interface name="corenet_receive_gds_db_client_packets" lineno="22681">
 <summary>
 Receive gds_db_client packets.
 </summary>
@@ -28473,7 +23802,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="22700">
 <summary>
 Do not audit attempts to receive gds_db_client packets.
 </summary>
@@ -28484,7 +23813,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="22719">
 <summary>
 Send and receive gds_db_client packets.
 </summary>
@@ -28495,7 +23824,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="22735">
 <summary>
 Do not audit attempts to send and receive gds_db_client packets.
 </summary>
@@ -28506,7 +23835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="22750">
 <summary>
 Relabel packets to gds_db_client the packet type.
 </summary>
@@ -28516,7 +23845,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="29236">
+<interface name="corenet_send_gds_db_server_packets" lineno="22770">
 <summary>
 Send gds_db_server packets.
 </summary>
@@ -28527,7 +23856,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="22789">
 <summary>
 Do not audit attempts to send gds_db_server packets.
 </summary>
@@ -28538,7 +23867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="29274">
+<interface name="corenet_receive_gds_db_server_packets" lineno="22808">
 <summary>
 Receive gds_db_server packets.
 </summary>
@@ -28549,7 +23878,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="22827">
 <summary>
 Do not audit attempts to receive gds_db_server packets.
 </summary>
@@ -28560,7 +23889,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="22846">
 <summary>
 Send and receive gds_db_server packets.
 </summary>
@@ -28571,7 +23900,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="22862">
 <summary>
 Do not audit attempts to send and receive gds_db_server packets.
 </summary>
@@ -28582,7 +23911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="22877">
 <summary>
 Relabel packets to gds_db_server the packet type.
 </summary>
@@ -28592,85 +23921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29365">
-<summary>
-Send and receive TCP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_git_port" lineno="29380">
-<summary>
-Send UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395">
-<summary>
-Do not audit attempts to send UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_git_port" lineno="29410">
-<summary>
-Receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425">
-<summary>
-Do not audit attempts to receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29440">
-<summary>
-Send and receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29471">
+<interface name="corenet_tcp_bind_git_port" lineno="22899">
 <summary>
 Bind TCP sockets to the git port.
 </summary>
@@ -28681,7 +23932,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_git_port" lineno="29491">
+<interface name="corenet_udp_bind_git_port" lineno="22919">
 <summary>
 Bind UDP sockets to the git port.
 </summary>
@@ -28692,7 +23943,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29510">
+<interface name="corenet_tcp_connect_git_port" lineno="22938">
 <summary>
 Make a TCP connection to the git port.
 </summary>
@@ -28702,7 +23953,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_client_packets" lineno="29530">
+<interface name="corenet_send_git_client_packets" lineno="22958">
 <summary>
 Send git_client packets.
 </summary>
@@ -28713,7 +23964,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="22977">
 <summary>
 Do not audit attempts to send git_client packets.
 </summary>
@@ -28724,7 +23975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_client_packets" lineno="29568">
+<interface name="corenet_receive_git_client_packets" lineno="22996">
 <summary>
 Receive git_client packets.
 </summary>
@@ -28735,7 +23986,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="23015">
 <summary>
 Do not audit attempts to receive git_client packets.
 </summary>
@@ -28746,7 +23997,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29606">
+<interface name="corenet_sendrecv_git_client_packets" lineno="23034">
 <summary>
 Send and receive git_client packets.
 </summary>
@@ -28757,7 +24008,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="23050">
 <summary>
 Do not audit attempts to send and receive git_client packets.
 </summary>
@@ -28768,7 +24019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29637">
+<interface name="corenet_relabelto_git_client_packets" lineno="23065">
 <summary>
 Relabel packets to git_client the packet type.
 </summary>
@@ -28778,7 +24029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_git_server_packets" lineno="29657">
+<interface name="corenet_send_git_server_packets" lineno="23085">
 <summary>
 Send git_server packets.
 </summary>
@@ -28789,7 +24040,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="23104">
 <summary>
 Do not audit attempts to send git_server packets.
 </summary>
@@ -28800,7 +24051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_git_server_packets" lineno="29695">
+<interface name="corenet_receive_git_server_packets" lineno="23123">
 <summary>
 Receive git_server packets.
 </summary>
@@ -28811,7 +24062,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="23142">
 <summary>
 Do not audit attempts to receive git_server packets.
 </summary>
@@ -28822,7 +24073,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29733">
+<interface name="corenet_sendrecv_git_server_packets" lineno="23161">
 <summary>
 Send and receive git_server packets.
 </summary>
@@ -28833,7 +24084,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="23177">
 <summary>
 Do not audit attempts to send and receive git_server packets.
 </summary>
@@ -28844,7 +24095,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29764">
+<interface name="corenet_relabelto_git_server_packets" lineno="23192">
 <summary>
 Relabel packets to git_server the packet type.
 </summary>
@@ -28854,85 +24105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786">
-<summary>
-Send and receive TCP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29801">
-<summary>
-Send UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816">
-<summary>
-Do not audit attempts to send UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29831">
-<summary>
-Receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846">
-<summary>
-Do not audit attempts to receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861">
-<summary>
-Send and receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="23214">
 <summary>
 Bind TCP sockets to the glance_registry port.
 </summary>
@@ -28943,7 +24116,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29912">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="23234">
 <summary>
 Bind UDP sockets to the glance_registry port.
 </summary>
@@ -28954,7 +24127,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="23253">
 <summary>
 Make a TCP connection to the glance_registry port.
 </summary>
@@ -28964,7 +24137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29951">
+<interface name="corenet_send_glance_registry_client_packets" lineno="23273">
 <summary>
 Send glance_registry_client packets.
 </summary>
@@ -28975,7 +24148,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="23292">
 <summary>
 Do not audit attempts to send glance_registry_client packets.
 </summary>
@@ -28986,7 +24159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29989">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="23311">
 <summary>
 Receive glance_registry_client packets.
 </summary>
@@ -28997,7 +24170,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="23330">
 <summary>
 Do not audit attempts to receive glance_registry_client packets.
 </summary>
@@ -29008,7 +24181,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="23349">
 <summary>
 Send and receive glance_registry_client packets.
 </summary>
@@ -29019,7 +24192,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="23365">
 <summary>
 Do not audit attempts to send and receive glance_registry_client packets.
 </summary>
@@ -29030,7 +24203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="23380">
 <summary>
 Relabel packets to glance_registry_client the packet type.
 </summary>
@@ -29040,7 +24213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="30078">
+<interface name="corenet_send_glance_registry_server_packets" lineno="23400">
 <summary>
 Send glance_registry_server packets.
 </summary>
@@ -29051,7 +24224,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="23419">
 <summary>
 Do not audit attempts to send glance_registry_server packets.
 </summary>
@@ -29062,7 +24235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="30116">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="23438">
 <summary>
 Receive glance_registry_server packets.
 </summary>
@@ -29073,7 +24246,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="23457">
 <summary>
 Do not audit attempts to receive glance_registry_server packets.
 </summary>
@@ -29084,7 +24257,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="23476">
 <summary>
 Send and receive glance_registry_server packets.
 </summary>
@@ -29095,7 +24268,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="23492">
 <summary>
 Do not audit attempts to send and receive glance_registry_server packets.
 </summary>
@@ -29106,7 +24279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="23507">
 <summary>
 Relabel packets to glance_registry_server the packet type.
 </summary>
@@ -29116,53 +24289,52 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207">
+<interface name="corenet_tcp_bind_glusterd_port" lineno="23529">
 <summary>
-Send and receive TCP traffic on the gopher port.
+Bind TCP sockets to the glusterd port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30222">
+<interface name="corenet_udp_bind_glusterd_port" lineno="23549">
 <summary>
-Send UDP traffic on the gopher port.
+Bind UDP sockets to the glusterd port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237">
+<interface name="corenet_tcp_connect_glusterd_port" lineno="23568">
 <summary>
-Do not audit attempts to send UDP traffic on the gopher port.
+Make a TCP connection to the glusterd port.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
-<infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30252">
+<interface name="corenet_send_glusterd_client_packets" lineno="23588">
 <summary>
-Receive UDP traffic on the gopher port.
+Send glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="read" weight="10"/>
+<infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267">
+<interface name="corenet_dontaudit_send_glusterd_client_packets" lineno="23607">
 <summary>
-Do not audit attempts to receive UDP traffic on the gopher port.
+Do not audit attempts to send glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29171,54 +24343,53 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282">
+<interface name="corenet_receive_glusterd_client_packets" lineno="23626">
 <summary>
-Send and receive UDP traffic on the gopher port.
+Receive glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298">
+<interface name="corenet_dontaudit_receive_glusterd_client_packets" lineno="23645">
 <summary>
-Do not audit attempts to send and receive
-UDP traffic on the gopher port.
+Do not audit attempts to receive glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30313">
+<interface name="corenet_sendrecv_glusterd_client_packets" lineno="23664">
 <summary>
-Bind TCP sockets to the gopher port.
+Send and receive glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="none"/>
+<infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30333">
+<interface name="corenet_dontaudit_sendrecv_glusterd_client_packets" lineno="23680">
 <summary>
-Bind UDP sockets to the gopher port.
+Do not audit attempts to send and receive glusterd_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain to not audit.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30352">
+<interface name="corenet_relabelto_glusterd_client_packets" lineno="23695">
 <summary>
-Make a TCP connection to the gopher port.
+Relabel packets to glusterd_client the packet type.
 </summary>
 <param name="domain">
 <summary>
@@ -29226,9 +24397,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30372">
+<interface name="corenet_send_glusterd_server_packets" lineno="23715">
 <summary>
-Send gopher_client packets.
+Send glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29237,9 +24408,9 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391">
+<interface name="corenet_dontaudit_send_glusterd_server_packets" lineno="23734">
 <summary>
-Do not audit attempts to send gopher_client packets.
+Do not audit attempts to send glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29248,9 +24419,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30410">
+<interface name="corenet_receive_glusterd_server_packets" lineno="23753">
 <summary>
-Receive gopher_client packets.
+Receive glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29259,9 +24430,9 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429">
+<interface name="corenet_dontaudit_receive_glusterd_server_packets" lineno="23772">
 <summary>
-Do not audit attempts to receive gopher_client packets.
+Do not audit attempts to receive glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29270,9 +24441,9 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448">
+<interface name="corenet_sendrecv_glusterd_server_packets" lineno="23791">
 <summary>
-Send and receive gopher_client packets.
+Send and receive glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29281,9 +24452,9 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464">
+<interface name="corenet_dontaudit_sendrecv_glusterd_server_packets" lineno="23807">
 <summary>
-Do not audit attempts to send and receive gopher_client packets.
+Do not audit attempts to send and receive glusterd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29292,9 +24463,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30479">
+<interface name="corenet_relabelto_glusterd_server_packets" lineno="23822">
 <summary>
-Relabel packets to gopher_client the packet type.
+Relabel packets to glusterd_server the packet type.
 </summary>
 <param name="domain">
 <summary>
@@ -29302,96 +24473,117 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30499">
+<interface name="corenet_tcp_bind_gopher_port" lineno="23844">
 <summary>
-Send gopher_server packets.
+Bind TCP sockets to the gopher port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518">
+<interface name="corenet_udp_bind_gopher_port" lineno="23864">
 <summary>
-Do not audit attempts to send gopher_server packets.
+Bind UDP sockets to the gopher port.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30537">
+<interface name="corenet_tcp_connect_gopher_port" lineno="23883">
 <summary>
-Receive gopher_server packets.
+Make a TCP connection to the gopher port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556">
+<interface name="corenet_send_gopher_client_packets" lineno="23903">
 <summary>
-Do not audit attempts to receive gopher_server packets.
+Send gopher_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="23922">
+<summary>
+Do not audit attempts to send gopher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575">
+<interface name="corenet_receive_gopher_client_packets" lineno="23941">
 <summary>
-Send and receive gopher_server packets.
+Receive gopher_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="23960">
 <summary>
-Do not audit attempts to send and receive gopher_server packets.
+Do not audit attempts to receive gopher_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30606">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="23979">
 <summary>
-Relabel packets to gopher_server the packet type.
+Send and receive gopher_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="23995">
 <summary>
-Send and receive TCP traffic on the gpsd port.
+Do not audit attempts to send and receive gopher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_gopher_client_packets" lineno="24010">
+<summary>
+Relabel packets to gopher_client the packet type.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30643">
+<interface name="corenet_send_gopher_server_packets" lineno="24030">
 <summary>
-Send UDP traffic on the gpsd port.
+Send gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29400,9 +24592,9 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="24049">
 <summary>
-Do not audit attempts to send UDP traffic on the gpsd port.
+Do not audit attempts to send gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29411,9 +24603,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30673">
+<interface name="corenet_receive_gopher_server_packets" lineno="24068">
 <summary>
-Receive UDP traffic on the gpsd port.
+Receive gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29422,20 +24614,20 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="24087">
 <summary>
-Do not audit attempts to receive UDP traffic on the gpsd port.
+Do not audit attempts to receive gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="24106">
 <summary>
-Send and receive UDP traffic on the gpsd port.
+Send and receive gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29444,10 +24636,9 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="24122">
 <summary>
-Do not audit attempts to send and receive
-UDP traffic on the gpsd port.
+Do not audit attempts to send and receive gopher_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -29456,7 +24647,17 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30734">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="24137">
+<summary>
+Relabel packets to gopher_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_bind_gpsd_port" lineno="24159">
 <summary>
 Bind TCP sockets to the gpsd port.
 </summary>
@@ -29467,7 +24668,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30754">
+<interface name="corenet_udp_bind_gpsd_port" lineno="24179">
 <summary>
 Bind UDP sockets to the gpsd port.
 </summary>
@@ -29478,7 +24679,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30773">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="24198">
 <summary>
 Make a TCP connection to the gpsd port.
 </summary>
@@ -29488,7 +24689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30793">
+<interface name="corenet_send_gpsd_client_packets" lineno="24218">
 <summary>
 Send gpsd_client packets.
 </summary>
@@ -29499,7 +24700,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="24237">
 <summary>
 Do not audit attempts to send gpsd_client packets.
 </summary>
@@ -29510,7 +24711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30831">
+<interface name="corenet_receive_gpsd_client_packets" lineno="24256">
 <summary>
 Receive gpsd_client packets.
 </summary>
@@ -29521,7 +24722,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="24275">
 <summary>
 Do not audit attempts to receive gpsd_client packets.
 </summary>
@@ -29532,7 +24733,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="24294">
 <summary>
 Send and receive gpsd_client packets.
 </summary>
@@ -29543,7 +24744,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="24310">
 <summary>
 Do not audit attempts to send and receive gpsd_client packets.
 </summary>
@@ -29554,7 +24755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="24325">
 <summary>
 Relabel packets to gpsd_client the packet type.
 </summary>
@@ -29564,7 +24765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30920">
+<interface name="corenet_send_gpsd_server_packets" lineno="24345">
 <summary>
 Send gpsd_server packets.
 </summary>
@@ -29575,7 +24776,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="24364">
 <summary>
 Do not audit attempts to send gpsd_server packets.
 </summary>
@@ -29586,7 +24787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30958">
+<interface name="corenet_receive_gpsd_server_packets" lineno="24383">
 <summary>
 Receive gpsd_server packets.
 </summary>
@@ -29597,7 +24798,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="24402">
 <summary>
 Do not audit attempts to receive gpsd_server packets.
 </summary>
@@ -29608,7 +24809,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="24421">
 <summary>
 Send and receive gpsd_server packets.
 </summary>
@@ -29619,7 +24820,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="24437">
 <summary>
 Do not audit attempts to send and receive gpsd_server packets.
 </summary>
@@ -29630,7 +24831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="24452">
 <summary>
 Relabel packets to gpsd_server the packet type.
 </summary>
@@ -29640,85 +24841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049">
-<summary>
-Send and receive TCP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064">
-<summary>
-Send UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079">
-<summary>
-Do not audit attempts to send UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094">
-<summary>
-Receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109">
-<summary>
-Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124">
-<summary>
-Send and receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="24474">
 <summary>
 Bind TCP sockets to the hadoop_datanode port.
 </summary>
@@ -29729,7 +24852,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="24494">
 <summary>
 Bind UDP sockets to the hadoop_datanode port.
 </summary>
@@ -29740,7 +24863,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="24513">
 <summary>
 Make a TCP connection to the hadoop_datanode port.
 </summary>
@@ -29750,7 +24873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="24533">
 <summary>
 Send hadoop_datanode_client packets.
 </summary>
@@ -29761,7 +24884,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="24552">
 <summary>
 Do not audit attempts to send hadoop_datanode_client packets.
 </summary>
@@ -29772,7 +24895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="24571">
 <summary>
 Receive hadoop_datanode_client packets.
 </summary>
@@ -29783,7 +24906,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="24590">
 <summary>
 Do not audit attempts to receive hadoop_datanode_client packets.
 </summary>
@@ -29794,7 +24917,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="24609">
 <summary>
 Send and receive hadoop_datanode_client packets.
 </summary>
@@ -29805,7 +24928,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="24625">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_client packets.
 </summary>
@@ -29816,7 +24939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="24640">
 <summary>
 Relabel packets to hadoop_datanode_client the packet type.
 </summary>
@@ -29826,7 +24949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="24660">
 <summary>
 Send hadoop_datanode_server packets.
 </summary>
@@ -29837,7 +24960,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="24679">
 <summary>
 Do not audit attempts to send hadoop_datanode_server packets.
 </summary>
@@ -29848,7 +24971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="24698">
 <summary>
 Receive hadoop_datanode_server packets.
 </summary>
@@ -29859,7 +24982,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="24717">
 <summary>
 Do not audit attempts to receive hadoop_datanode_server packets.
 </summary>
@@ -29870,7 +24993,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="24736">
 <summary>
 Send and receive hadoop_datanode_server packets.
 </summary>
@@ -29881,7 +25004,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="24752">
 <summary>
 Do not audit attempts to send and receive hadoop_datanode_server packets.
 </summary>
@@ -29892,7 +25015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="24767">
 <summary>
 Relabel packets to hadoop_datanode_server the packet type.
 </summary>
@@ -29902,85 +25025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470">
-<summary>
-Send and receive TCP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485">
-<summary>
-Send UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500">
-<summary>
-Do not audit attempts to send UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515">
-<summary>
-Receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530">
-<summary>
-Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545">
-<summary>
-Send and receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="24789">
 <summary>
 Bind TCP sockets to the hadoop_namenode port.
 </summary>
@@ -29991,7 +25036,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="24809">
 <summary>
 Bind UDP sockets to the hadoop_namenode port.
 </summary>
@@ -30002,7 +25047,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="24828">
 <summary>
 Make a TCP connection to the hadoop_namenode port.
 </summary>
@@ -30012,7 +25057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="24848">
 <summary>
 Send hadoop_namenode_client packets.
 </summary>
@@ -30023,7 +25068,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="24867">
 <summary>
 Do not audit attempts to send hadoop_namenode_client packets.
 </summary>
@@ -30034,7 +25079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="24886">
 <summary>
 Receive hadoop_namenode_client packets.
 </summary>
@@ -30045,7 +25090,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="24905">
 <summary>
 Do not audit attempts to receive hadoop_namenode_client packets.
 </summary>
@@ -30056,7 +25101,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="24924">
 <summary>
 Send and receive hadoop_namenode_client packets.
 </summary>
@@ -30067,7 +25112,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="24940">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_client packets.
 </summary>
@@ -30078,7 +25123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="24955">
 <summary>
 Relabel packets to hadoop_namenode_client the packet type.
 </summary>
@@ -30088,7 +25133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="24975">
 <summary>
 Send hadoop_namenode_server packets.
 </summary>
@@ -30099,7 +25144,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="24994">
 <summary>
 Do not audit attempts to send hadoop_namenode_server packets.
 </summary>
@@ -30110,7 +25155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="25013">
 <summary>
 Receive hadoop_namenode_server packets.
 </summary>
@@ -30121,7 +25166,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="25032">
 <summary>
 Do not audit attempts to receive hadoop_namenode_server packets.
 </summary>
@@ -30132,7 +25177,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="25051">
 <summary>
 Send and receive hadoop_namenode_server packets.
 </summary>
@@ -30143,7 +25188,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="25067">
 <summary>
 Do not audit attempts to send and receive hadoop_namenode_server packets.
 </summary>
@@ -30154,7 +25199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="25082">
 <summary>
 Relabel packets to hadoop_namenode_server the packet type.
 </summary>
@@ -30164,85 +25209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891">
-<summary>
-Send and receive TCP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31906">
-<summary>
-Send UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921">
-<summary>
-Do not audit attempts to send UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31936">
-<summary>
-Receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951">
-<summary>
-Do not audit attempts to receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966">
-<summary>
-Send and receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="25104">
 <summary>
 Bind TCP sockets to the hddtemp port.
 </summary>
@@ -30253,7 +25220,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="32017">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="25124">
 <summary>
 Bind UDP sockets to the hddtemp port.
 </summary>
@@ -30264,7 +25231,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="25143">
 <summary>
 Make a TCP connection to the hddtemp port.
 </summary>
@@ -30274,7 +25241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="32056">
+<interface name="corenet_send_hddtemp_client_packets" lineno="25163">
 <summary>
 Send hddtemp_client packets.
 </summary>
@@ -30285,7 +25252,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="25182">
 <summary>
 Do not audit attempts to send hddtemp_client packets.
 </summary>
@@ -30296,7 +25263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="32094">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="25201">
 <summary>
 Receive hddtemp_client packets.
 </summary>
@@ -30307,7 +25274,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="25220">
 <summary>
 Do not audit attempts to receive hddtemp_client packets.
 </summary>
@@ -30318,7 +25285,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="25239">
 <summary>
 Send and receive hddtemp_client packets.
 </summary>
@@ -30329,7 +25296,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="25255">
 <summary>
 Do not audit attempts to send and receive hddtemp_client packets.
 </summary>
@@ -30340,7 +25307,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="25270">
 <summary>
 Relabel packets to hddtemp_client the packet type.
 </summary>
@@ -30350,7 +25317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32183">
+<interface name="corenet_send_hddtemp_server_packets" lineno="25290">
 <summary>
 Send hddtemp_server packets.
 </summary>
@@ -30361,7 +25328,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="25309">
 <summary>
 Do not audit attempts to send hddtemp_server packets.
 </summary>
@@ -30372,7 +25339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32221">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="25328">
 <summary>
 Receive hddtemp_server packets.
 </summary>
@@ -30383,7 +25350,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="25347">
 <summary>
 Do not audit attempts to receive hddtemp_server packets.
 </summary>
@@ -30394,7 +25361,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="25366">
 <summary>
 Send and receive hddtemp_server packets.
 </summary>
@@ -30405,7 +25372,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="25382">
 <summary>
 Do not audit attempts to send and receive hddtemp_server packets.
 </summary>
@@ -30416,7 +25383,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="25397">
 <summary>
 Relabel packets to hddtemp_server the packet type.
 </summary>
@@ -30426,85 +25393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312">
-<summary>
-Send and receive TCP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_howl_port" lineno="32327">
-<summary>
-Send UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342">
-<summary>
-Do not audit attempts to send UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32357">
-<summary>
-Receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372">
-<summary>
-Do not audit attempts to receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32387">
-<summary>
-Send and receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32418">
+<interface name="corenet_tcp_bind_howl_port" lineno="25419">
 <summary>
 Bind TCP sockets to the howl port.
 </summary>
@@ -30515,7 +25404,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32438">
+<interface name="corenet_udp_bind_howl_port" lineno="25439">
 <summary>
 Bind UDP sockets to the howl port.
 </summary>
@@ -30526,7 +25415,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32457">
+<interface name="corenet_tcp_connect_howl_port" lineno="25458">
 <summary>
 Make a TCP connection to the howl port.
 </summary>
@@ -30536,7 +25425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_client_packets" lineno="32477">
+<interface name="corenet_send_howl_client_packets" lineno="25478">
 <summary>
 Send howl_client packets.
 </summary>
@@ -30547,7 +25436,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="25497">
 <summary>
 Do not audit attempts to send howl_client packets.
 </summary>
@@ -30558,7 +25447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32515">
+<interface name="corenet_receive_howl_client_packets" lineno="25516">
 <summary>
 Receive howl_client packets.
 </summary>
@@ -30569,7 +25458,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="25535">
 <summary>
 Do not audit attempts to receive howl_client packets.
 </summary>
@@ -30580,7 +25469,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32553">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="25554">
 <summary>
 Send and receive howl_client packets.
 </summary>
@@ -30591,7 +25480,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="25570">
 <summary>
 Do not audit attempts to send and receive howl_client packets.
 </summary>
@@ -30602,7 +25491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32584">
+<interface name="corenet_relabelto_howl_client_packets" lineno="25585">
 <summary>
 Relabel packets to howl_client the packet type.
 </summary>
@@ -30612,7 +25501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_howl_server_packets" lineno="32604">
+<interface name="corenet_send_howl_server_packets" lineno="25605">
 <summary>
 Send howl_server packets.
 </summary>
@@ -30623,7 +25512,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="25624">
 <summary>
 Do not audit attempts to send howl_server packets.
 </summary>
@@ -30634,7 +25523,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32642">
+<interface name="corenet_receive_howl_server_packets" lineno="25643">
 <summary>
 Receive howl_server packets.
 </summary>
@@ -30645,7 +25534,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="25662">
 <summary>
 Do not audit attempts to receive howl_server packets.
 </summary>
@@ -30656,7 +25545,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32680">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="25681">
 <summary>
 Send and receive howl_server packets.
 </summary>
@@ -30667,7 +25556,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="25697">
 <summary>
 Do not audit attempts to send and receive howl_server packets.
 </summary>
@@ -30678,7 +25567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32711">
+<interface name="corenet_relabelto_howl_server_packets" lineno="25712">
 <summary>
 Relabel packets to howl_server the packet type.
 </summary>
@@ -30688,85 +25577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733">
-<summary>
-Send and receive TCP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32748">
-<summary>
-Send UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763">
-<summary>
-Do not audit attempts to send UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32778">
-<summary>
-Receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793">
-<summary>
-Do not audit attempts to receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808">
-<summary>
-Send and receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32839">
+<interface name="corenet_tcp_bind_hplip_port" lineno="25734">
 <summary>
 Bind TCP sockets to the hplip port.
 </summary>
@@ -30777,7 +25588,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32859">
+<interface name="corenet_udp_bind_hplip_port" lineno="25754">
 <summary>
 Bind UDP sockets to the hplip port.
 </summary>
@@ -30788,7 +25599,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32878">
+<interface name="corenet_tcp_connect_hplip_port" lineno="25773">
 <summary>
 Make a TCP connection to the hplip port.
 </summary>
@@ -30798,7 +25609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32898">
+<interface name="corenet_send_hplip_client_packets" lineno="25793">
 <summary>
 Send hplip_client packets.
 </summary>
@@ -30809,7 +25620,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="25812">
 <summary>
 Do not audit attempts to send hplip_client packets.
 </summary>
@@ -30820,7 +25631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32936">
+<interface name="corenet_receive_hplip_client_packets" lineno="25831">
 <summary>
 Receive hplip_client packets.
 </summary>
@@ -30831,7 +25642,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="25850">
 <summary>
 Do not audit attempts to receive hplip_client packets.
 </summary>
@@ -30842,7 +25653,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="25869">
 <summary>
 Send and receive hplip_client packets.
 </summary>
@@ -30853,7 +25664,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="25885">
 <summary>
 Do not audit attempts to send and receive hplip_client packets.
 </summary>
@@ -30864,7 +25675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="33005">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="25900">
 <summary>
 Relabel packets to hplip_client the packet type.
 </summary>
@@ -30874,7 +25685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_hplip_server_packets" lineno="33025">
+<interface name="corenet_send_hplip_server_packets" lineno="25920">
 <summary>
 Send hplip_server packets.
 </summary>
@@ -30885,7 +25696,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="25939">
 <summary>
 Do not audit attempts to send hplip_server packets.
 </summary>
@@ -30896,7 +25707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="33063">
+<interface name="corenet_receive_hplip_server_packets" lineno="25958">
 <summary>
 Receive hplip_server packets.
 </summary>
@@ -30907,7 +25718,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="25977">
 <summary>
 Do not audit attempts to receive hplip_server packets.
 </summary>
@@ -30918,7 +25729,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="25996">
 <summary>
 Send and receive hplip_server packets.
 </summary>
@@ -30929,7 +25740,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="26012">
 <summary>
 Do not audit attempts to send and receive hplip_server packets.
 </summary>
@@ -30940,7 +25751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="33132">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="26027">
 <summary>
 Relabel packets to hplip_server the packet type.
 </summary>
@@ -30950,85 +25761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33154">
-<summary>
-Send and receive TCP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_http_port" lineno="33169">
-<summary>
-Send UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184">
-<summary>
-Do not audit attempts to send UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_http_port" lineno="33199">
-<summary>
-Receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214">
-<summary>
-Do not audit attempts to receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33229">
-<summary>
-Send and receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33260">
+<interface name="corenet_tcp_bind_http_port" lineno="26049">
 <summary>
 Bind TCP sockets to the http port.
 </summary>
@@ -31039,7 +25772,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_port" lineno="33280">
+<interface name="corenet_udp_bind_http_port" lineno="26069">
 <summary>
 Bind UDP sockets to the http port.
 </summary>
@@ -31050,7 +25783,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33299">
+<interface name="corenet_tcp_connect_http_port" lineno="26088">
 <summary>
 Make a TCP connection to the http port.
 </summary>
@@ -31060,7 +25793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_client_packets" lineno="33319">
+<interface name="corenet_send_http_client_packets" lineno="26108">
 <summary>
 Send http_client packets.
 </summary>
@@ -31071,7 +25804,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="26127">
 <summary>
 Do not audit attempts to send http_client packets.
 </summary>
@@ -31082,7 +25815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_client_packets" lineno="33357">
+<interface name="corenet_receive_http_client_packets" lineno="26146">
 <summary>
 Receive http_client packets.
 </summary>
@@ -31093,7 +25826,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="26165">
 <summary>
 Do not audit attempts to receive http_client packets.
 </summary>
@@ -31104,7 +25837,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33395">
+<interface name="corenet_sendrecv_http_client_packets" lineno="26184">
 <summary>
 Send and receive http_client packets.
 </summary>
@@ -31115,7 +25848,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="26200">
 <summary>
 Do not audit attempts to send and receive http_client packets.
 </summary>
@@ -31126,7 +25859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33426">
+<interface name="corenet_relabelto_http_client_packets" lineno="26215">
 <summary>
 Relabel packets to http_client the packet type.
 </summary>
@@ -31136,7 +25869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_server_packets" lineno="33446">
+<interface name="corenet_send_http_server_packets" lineno="26235">
 <summary>
 Send http_server packets.
 </summary>
@@ -31147,7 +25880,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="26254">
 <summary>
 Do not audit attempts to send http_server packets.
 </summary>
@@ -31158,7 +25891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_server_packets" lineno="33484">
+<interface name="corenet_receive_http_server_packets" lineno="26273">
 <summary>
 Receive http_server packets.
 </summary>
@@ -31169,7 +25902,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="26292">
 <summary>
 Do not audit attempts to receive http_server packets.
 </summary>
@@ -31180,7 +25913,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33522">
+<interface name="corenet_sendrecv_http_server_packets" lineno="26311">
 <summary>
 Send and receive http_server packets.
 </summary>
@@ -31191,7 +25924,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="26327">
 <summary>
 Do not audit attempts to send and receive http_server packets.
 </summary>
@@ -31202,7 +25935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33553">
+<interface name="corenet_relabelto_http_server_packets" lineno="26342">
 <summary>
 Relabel packets to http_server the packet type.
 </summary>
@@ -31212,85 +25945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575">
-<summary>
-Send and receive TCP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33590">
-<summary>
-Send UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605">
-<summary>
-Do not audit attempts to send UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33620">
-<summary>
-Receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635">
-<summary>
-Do not audit attempts to receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650">
-<summary>
-Send and receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33681">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="26364">
 <summary>
 Bind TCP sockets to the http_cache port.
 </summary>
@@ -31301,7 +25956,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33701">
+<interface name="corenet_udp_bind_http_cache_port" lineno="26384">
 <summary>
 Bind UDP sockets to the http_cache port.
 </summary>
@@ -31312,7 +25967,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33720">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="26403">
 <summary>
 Make a TCP connection to the http_cache port.
 </summary>
@@ -31322,7 +25977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33740">
+<interface name="corenet_send_http_cache_client_packets" lineno="26423">
 <summary>
 Send http_cache_client packets.
 </summary>
@@ -31333,7 +25988,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="26442">
 <summary>
 Do not audit attempts to send http_cache_client packets.
 </summary>
@@ -31344,7 +25999,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33778">
+<interface name="corenet_receive_http_cache_client_packets" lineno="26461">
 <summary>
 Receive http_cache_client packets.
 </summary>
@@ -31355,7 +26010,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="26480">
 <summary>
 Do not audit attempts to receive http_cache_client packets.
 </summary>
@@ -31366,7 +26021,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="26499">
 <summary>
 Send and receive http_cache_client packets.
 </summary>
@@ -31377,7 +26032,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="26515">
 <summary>
 Do not audit attempts to send and receive http_cache_client packets.
 </summary>
@@ -31388,7 +26043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="26530">
 <summary>
 Relabel packets to http_cache_client the packet type.
 </summary>
@@ -31398,7 +26053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33867">
+<interface name="corenet_send_http_cache_server_packets" lineno="26550">
 <summary>
 Send http_cache_server packets.
 </summary>
@@ -31409,7 +26064,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="26569">
 <summary>
 Do not audit attempts to send http_cache_server packets.
 </summary>
@@ -31420,7 +26075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33905">
+<interface name="corenet_receive_http_cache_server_packets" lineno="26588">
 <summary>
 Receive http_cache_server packets.
 </summary>
@@ -31431,7 +26086,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="26607">
 <summary>
 Do not audit attempts to receive http_cache_server packets.
 </summary>
@@ -31442,7 +26097,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="26626">
 <summary>
 Send and receive http_cache_server packets.
 </summary>
@@ -31453,7 +26108,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="26642">
 <summary>
 Do not audit attempts to send and receive http_cache_server packets.
 </summary>
@@ -31464,7 +26119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="26657">
 <summary>
 Relabel packets to http_cache_server the packet type.
 </summary>
@@ -31474,85 +26129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996">
-<summary>
-Send and receive TCP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="34011">
-<summary>
-Send UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026">
-<summary>
-Do not audit attempts to send UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="34041">
-<summary>
-Receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056">
-<summary>
-Do not audit attempts to receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071">
-<summary>
-Send and receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="26679">
 <summary>
 Bind TCP sockets to the i18n_input port.
 </summary>
@@ -31563,7 +26140,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="34122">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="26699">
 <summary>
 Bind UDP sockets to the i18n_input port.
 </summary>
@@ -31574,7 +26151,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="26718">
 <summary>
 Make a TCP connection to the i18n_input port.
 </summary>
@@ -31584,7 +26161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34161">
+<interface name="corenet_send_i18n_input_client_packets" lineno="26738">
 <summary>
 Send i18n_input_client packets.
 </summary>
@@ -31595,7 +26172,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="26757">
 <summary>
 Do not audit attempts to send i18n_input_client packets.
 </summary>
@@ -31606,7 +26183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34199">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="26776">
 <summary>
 Receive i18n_input_client packets.
 </summary>
@@ -31617,7 +26194,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="26795">
 <summary>
 Do not audit attempts to receive i18n_input_client packets.
 </summary>
@@ -31628,7 +26205,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="26814">
 <summary>
 Send and receive i18n_input_client packets.
 </summary>
@@ -31639,7 +26216,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="26830">
 <summary>
 Do not audit attempts to send and receive i18n_input_client packets.
 </summary>
@@ -31650,7 +26227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="26845">
 <summary>
 Relabel packets to i18n_input_client the packet type.
 </summary>
@@ -31660,7 +26237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34288">
+<interface name="corenet_send_i18n_input_server_packets" lineno="26865">
 <summary>
 Send i18n_input_server packets.
 </summary>
@@ -31671,7 +26248,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="26884">
 <summary>
 Do not audit attempts to send i18n_input_server packets.
 </summary>
@@ -31682,7 +26259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34326">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="26903">
 <summary>
 Receive i18n_input_server packets.
 </summary>
@@ -31693,7 +26270,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="26922">
 <summary>
 Do not audit attempts to receive i18n_input_server packets.
 </summary>
@@ -31704,7 +26281,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="26941">
 <summary>
 Send and receive i18n_input_server packets.
 </summary>
@@ -31715,7 +26292,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="26957">
 <summary>
 Do not audit attempts to send and receive i18n_input_server packets.
 </summary>
@@ -31726,7 +26303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="26972">
 <summary>
 Relabel packets to i18n_input_server the packet type.
 </summary>
@@ -31736,85 +26313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417">
-<summary>
-Send and receive TCP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34432">
-<summary>
-Send UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447">
-<summary>
-Do not audit attempts to send UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34462">
-<summary>
-Receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477">
-<summary>
-Do not audit attempts to receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492">
-<summary>
-Send and receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34523">
+<interface name="corenet_tcp_bind_imaze_port" lineno="26994">
 <summary>
 Bind TCP sockets to the imaze port.
 </summary>
@@ -31825,7 +26324,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34543">
+<interface name="corenet_udp_bind_imaze_port" lineno="27014">
 <summary>
 Bind UDP sockets to the imaze port.
 </summary>
@@ -31836,7 +26335,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34562">
+<interface name="corenet_tcp_connect_imaze_port" lineno="27033">
 <summary>
 Make a TCP connection to the imaze port.
 </summary>
@@ -31846,7 +26345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34582">
+<interface name="corenet_send_imaze_client_packets" lineno="27053">
 <summary>
 Send imaze_client packets.
 </summary>
@@ -31857,7 +26356,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="27072">
 <summary>
 Do not audit attempts to send imaze_client packets.
 </summary>
@@ -31868,7 +26367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34620">
+<interface name="corenet_receive_imaze_client_packets" lineno="27091">
 <summary>
 Receive imaze_client packets.
 </summary>
@@ -31879,7 +26378,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="27110">
 <summary>
 Do not audit attempts to receive imaze_client packets.
 </summary>
@@ -31890,7 +26389,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="27129">
 <summary>
 Send and receive imaze_client packets.
 </summary>
@@ -31901,7 +26400,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="27145">
 <summary>
 Do not audit attempts to send and receive imaze_client packets.
 </summary>
@@ -31912,7 +26411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34689">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="27160">
 <summary>
 Relabel packets to imaze_client the packet type.
 </summary>
@@ -31922,7 +26421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34709">
+<interface name="corenet_send_imaze_server_packets" lineno="27180">
 <summary>
 Send imaze_server packets.
 </summary>
@@ -31933,7 +26432,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="27199">
 <summary>
 Do not audit attempts to send imaze_server packets.
 </summary>
@@ -31944,7 +26443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34747">
+<interface name="corenet_receive_imaze_server_packets" lineno="27218">
 <summary>
 Receive imaze_server packets.
 </summary>
@@ -31955,7 +26454,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="27237">
 <summary>
 Do not audit attempts to receive imaze_server packets.
 </summary>
@@ -31966,7 +26465,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="27256">
 <summary>
 Send and receive imaze_server packets.
 </summary>
@@ -31977,7 +26476,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="27272">
 <summary>
 Do not audit attempts to send and receive imaze_server packets.
 </summary>
@@ -31988,7 +26487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34816">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="27287">
 <summary>
 Relabel packets to imaze_server the packet type.
 </summary>
@@ -31998,85 +26497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838">
-<summary>
-Send and receive TCP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34853">
-<summary>
-Send UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868">
-<summary>
-Do not audit attempts to send UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34883">
-<summary>
-Receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898">
-<summary>
-Do not audit attempts to receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913">
-<summary>
-Send and receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="27309">
 <summary>
 Bind TCP sockets to the inetd_child port.
 </summary>
@@ -32087,7 +26508,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34964">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="27329">
 <summary>
 Bind UDP sockets to the inetd_child port.
 </summary>
@@ -32098,7 +26519,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="27348">
 <summary>
 Make a TCP connection to the inetd_child port.
 </summary>
@@ -32108,7 +26529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="35003">
+<interface name="corenet_send_inetd_child_client_packets" lineno="27368">
 <summary>
 Send inetd_child_client packets.
 </summary>
@@ -32119,7 +26540,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="27387">
 <summary>
 Do not audit attempts to send inetd_child_client packets.
 </summary>
@@ -32130,7 +26551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="35041">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="27406">
 <summary>
 Receive inetd_child_client packets.
 </summary>
@@ -32141,7 +26562,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="27425">
 <summary>
 Do not audit attempts to receive inetd_child_client packets.
 </summary>
@@ -32152,7 +26573,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="27444">
 <summary>
 Send and receive inetd_child_client packets.
 </summary>
@@ -32163,7 +26584,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="27460">
 <summary>
 Do not audit attempts to send and receive inetd_child_client packets.
 </summary>
@@ -32174,7 +26595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="27475">
 <summary>
 Relabel packets to inetd_child_client the packet type.
 </summary>
@@ -32184,7 +26605,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="35130">
+<interface name="corenet_send_inetd_child_server_packets" lineno="27495">
 <summary>
 Send inetd_child_server packets.
 </summary>
@@ -32195,7 +26616,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="27514">
 <summary>
 Do not audit attempts to send inetd_child_server packets.
 </summary>
@@ -32206,7 +26627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35168">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="27533">
 <summary>
 Receive inetd_child_server packets.
 </summary>
@@ -32217,7 +26638,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="27552">
 <summary>
 Do not audit attempts to receive inetd_child_server packets.
 </summary>
@@ -32228,7 +26649,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="27571">
 <summary>
 Send and receive inetd_child_server packets.
 </summary>
@@ -32239,7 +26660,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="27587">
 <summary>
 Do not audit attempts to send and receive inetd_child_server packets.
 </summary>
@@ -32250,7 +26671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="27602">
 <summary>
 Relabel packets to inetd_child_server the packet type.
 </summary>
@@ -32260,85 +26681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259">
-<summary>
-Send and receive TCP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_innd_port" lineno="35274">
-<summary>
-Send UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289">
-<summary>
-Do not audit attempts to send UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35304">
-<summary>
-Receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319">
-<summary>
-Do not audit attempts to receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35334">
-<summary>
-Send and receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35365">
+<interface name="corenet_tcp_bind_innd_port" lineno="27624">
 <summary>
 Bind TCP sockets to the innd port.
 </summary>
@@ -32349,7 +26692,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35385">
+<interface name="corenet_udp_bind_innd_port" lineno="27644">
 <summary>
 Bind UDP sockets to the innd port.
 </summary>
@@ -32360,7 +26703,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35404">
+<interface name="corenet_tcp_connect_innd_port" lineno="27663">
 <summary>
 Make a TCP connection to the innd port.
 </summary>
@@ -32370,7 +26713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_client_packets" lineno="35424">
+<interface name="corenet_send_innd_client_packets" lineno="27683">
 <summary>
 Send innd_client packets.
 </summary>
@@ -32381,7 +26724,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="27702">
 <summary>
 Do not audit attempts to send innd_client packets.
 </summary>
@@ -32392,7 +26735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35462">
+<interface name="corenet_receive_innd_client_packets" lineno="27721">
 <summary>
 Receive innd_client packets.
 </summary>
@@ -32403,7 +26746,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="27740">
 <summary>
 Do not audit attempts to receive innd_client packets.
 </summary>
@@ -32414,7 +26757,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35500">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="27759">
 <summary>
 Send and receive innd_client packets.
 </summary>
@@ -32425,7 +26768,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="27775">
 <summary>
 Do not audit attempts to send and receive innd_client packets.
 </summary>
@@ -32436,7 +26779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35531">
+<interface name="corenet_relabelto_innd_client_packets" lineno="27790">
 <summary>
 Relabel packets to innd_client the packet type.
 </summary>
@@ -32446,7 +26789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_innd_server_packets" lineno="35551">
+<interface name="corenet_send_innd_server_packets" lineno="27810">
 <summary>
 Send innd_server packets.
 </summary>
@@ -32457,7 +26800,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="27829">
 <summary>
 Do not audit attempts to send innd_server packets.
 </summary>
@@ -32468,7 +26811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35589">
+<interface name="corenet_receive_innd_server_packets" lineno="27848">
 <summary>
 Receive innd_server packets.
 </summary>
@@ -32479,7 +26822,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="27867">
 <summary>
 Do not audit attempts to receive innd_server packets.
 </summary>
@@ -32490,7 +26833,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35627">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="27886">
 <summary>
 Send and receive innd_server packets.
 </summary>
@@ -32501,7 +26844,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="27902">
 <summary>
 Do not audit attempts to send and receive innd_server packets.
 </summary>
@@ -32512,7 +26855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35658">
+<interface name="corenet_relabelto_innd_server_packets" lineno="27917">
 <summary>
 Relabel packets to innd_server the packet type.
 </summary>
@@ -32522,85 +26865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680">
-<summary>
-Send and receive TCP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35695">
-<summary>
-Send UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710">
-<summary>
-Do not audit attempts to send UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35725">
-<summary>
-Receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740">
-<summary>
-Do not audit attempts to receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755">
-<summary>
-Send and receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35786">
+<interface name="corenet_tcp_bind_interwise_port" lineno="27939">
 <summary>
 Bind TCP sockets to the interwise port.
 </summary>
@@ -32611,7 +26876,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35806">
+<interface name="corenet_udp_bind_interwise_port" lineno="27959">
 <summary>
 Bind UDP sockets to the interwise port.
 </summary>
@@ -32622,7 +26887,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35825">
+<interface name="corenet_tcp_connect_interwise_port" lineno="27978">
 <summary>
 Make a TCP connection to the interwise port.
 </summary>
@@ -32632,7 +26897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35845">
+<interface name="corenet_send_interwise_client_packets" lineno="27998">
 <summary>
 Send interwise_client packets.
 </summary>
@@ -32643,7 +26908,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="28017">
 <summary>
 Do not audit attempts to send interwise_client packets.
 </summary>
@@ -32654,7 +26919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35883">
+<interface name="corenet_receive_interwise_client_packets" lineno="28036">
 <summary>
 Receive interwise_client packets.
 </summary>
@@ -32665,7 +26930,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="28055">
 <summary>
 Do not audit attempts to receive interwise_client packets.
 </summary>
@@ -32676,7 +26941,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="28074">
 <summary>
 Send and receive interwise_client packets.
 </summary>
@@ -32687,7 +26952,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="28090">
 <summary>
 Do not audit attempts to send and receive interwise_client packets.
 </summary>
@@ -32698,7 +26963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35952">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="28105">
 <summary>
 Relabel packets to interwise_client the packet type.
 </summary>
@@ -32708,7 +26973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35972">
+<interface name="corenet_send_interwise_server_packets" lineno="28125">
 <summary>
 Send interwise_server packets.
 </summary>
@@ -32719,7 +26984,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="28144">
 <summary>
 Do not audit attempts to send interwise_server packets.
 </summary>
@@ -32730,7 +26995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="36010">
+<interface name="corenet_receive_interwise_server_packets" lineno="28163">
 <summary>
 Receive interwise_server packets.
 </summary>
@@ -32741,7 +27006,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="28182">
 <summary>
 Do not audit attempts to receive interwise_server packets.
 </summary>
@@ -32752,7 +27017,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="28201">
 <summary>
 Send and receive interwise_server packets.
 </summary>
@@ -32763,7 +27028,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="28217">
 <summary>
 Do not audit attempts to send and receive interwise_server packets.
 </summary>
@@ -32774,7 +27039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="36079">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="28232">
 <summary>
 Relabel packets to interwise_server the packet type.
 </summary>
@@ -32784,85 +27049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101">
-<summary>
-Send and receive TCP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116">
-<summary>
-Send UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131">
-<summary>
-Do not audit attempts to send UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146">
-<summary>
-Receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161">
-<summary>
-Do not audit attempts to receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176">
-<summary>
-Send and receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="28254">
 <summary>
 Bind TCP sockets to the ionixnetmon port.
 </summary>
@@ -32873,7 +27060,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="28274">
 <summary>
 Bind UDP sockets to the ionixnetmon port.
 </summary>
@@ -32884,7 +27071,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="28293">
 <summary>
 Make a TCP connection to the ionixnetmon port.
 </summary>
@@ -32894,7 +27081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="28313">
 <summary>
 Send ionixnetmon_client packets.
 </summary>
@@ -32905,7 +27092,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="28332">
 <summary>
 Do not audit attempts to send ionixnetmon_client packets.
 </summary>
@@ -32916,7 +27103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="28351">
 <summary>
 Receive ionixnetmon_client packets.
 </summary>
@@ -32927,7 +27114,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="28370">
 <summary>
 Do not audit attempts to receive ionixnetmon_client packets.
 </summary>
@@ -32938,7 +27125,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="28389">
 <summary>
 Send and receive ionixnetmon_client packets.
 </summary>
@@ -32949,7 +27136,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="28405">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_client packets.
 </summary>
@@ -32960,7 +27147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="28420">
 <summary>
 Relabel packets to ionixnetmon_client the packet type.
 </summary>
@@ -32970,7 +27157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="28440">
 <summary>
 Send ionixnetmon_server packets.
 </summary>
@@ -32981,7 +27168,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="28459">
 <summary>
 Do not audit attempts to send ionixnetmon_server packets.
 </summary>
@@ -32992,7 +27179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="28478">
 <summary>
 Receive ionixnetmon_server packets.
 </summary>
@@ -33003,7 +27190,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="28497">
 <summary>
 Do not audit attempts to receive ionixnetmon_server packets.
 </summary>
@@ -33014,7 +27201,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="28516">
 <summary>
 Send and receive ionixnetmon_server packets.
 </summary>
@@ -33025,7 +27212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="28532">
 <summary>
 Do not audit attempts to send and receive ionixnetmon_server packets.
 </summary>
@@ -33036,7 +27223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="28547">
 <summary>
 Relabel packets to ionixnetmon_server the packet type.
 </summary>
@@ -33046,85 +27233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522">
-<summary>
-Send and receive TCP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36537">
-<summary>
-Send UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552">
-<summary>
-Do not audit attempts to send UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36567">
-<summary>
-Receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597">
-<summary>
-Send and receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36628">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="28569">
 <summary>
 Bind TCP sockets to the ipmi port.
 </summary>
@@ -33135,7 +27244,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36648">
+<interface name="corenet_udp_bind_ipmi_port" lineno="28589">
 <summary>
 Bind UDP sockets to the ipmi port.
 </summary>
@@ -33146,7 +27255,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36667">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="28608">
 <summary>
 Make a TCP connection to the ipmi port.
 </summary>
@@ -33156,7 +27265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36687">
+<interface name="corenet_send_ipmi_client_packets" lineno="28628">
 <summary>
 Send ipmi_client packets.
 </summary>
@@ -33167,7 +27276,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="28647">
 <summary>
 Do not audit attempts to send ipmi_client packets.
 </summary>
@@ -33178,7 +27287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36725">
+<interface name="corenet_receive_ipmi_client_packets" lineno="28666">
 <summary>
 Receive ipmi_client packets.
 </summary>
@@ -33189,7 +27298,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="28685">
 <summary>
 Do not audit attempts to receive ipmi_client packets.
 </summary>
@@ -33200,7 +27309,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="28704">
 <summary>
 Send and receive ipmi_client packets.
 </summary>
@@ -33211,7 +27320,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="28720">
 <summary>
 Do not audit attempts to send and receive ipmi_client packets.
 </summary>
@@ -33222,7 +27331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="28735">
 <summary>
 Relabel packets to ipmi_client the packet type.
 </summary>
@@ -33232,7 +27341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36814">
+<interface name="corenet_send_ipmi_server_packets" lineno="28755">
 <summary>
 Send ipmi_server packets.
 </summary>
@@ -33243,7 +27352,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="28774">
 <summary>
 Do not audit attempts to send ipmi_server packets.
 </summary>
@@ -33254,7 +27363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36852">
+<interface name="corenet_receive_ipmi_server_packets" lineno="28793">
 <summary>
 Receive ipmi_server packets.
 </summary>
@@ -33265,7 +27374,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="28812">
 <summary>
 Do not audit attempts to receive ipmi_server packets.
 </summary>
@@ -33276,7 +27385,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="28831">
 <summary>
 Send and receive ipmi_server packets.
 </summary>
@@ -33287,7 +27396,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="28847">
 <summary>
 Do not audit attempts to send and receive ipmi_server packets.
 </summary>
@@ -33298,7 +27407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="28862">
 <summary>
 Relabel packets to ipmi_server the packet type.
 </summary>
@@ -33308,85 +27417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943">
-<summary>
-Send and receive TCP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36958">
-<summary>
-Send UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973">
-<summary>
-Do not audit attempts to send UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36988">
-<summary>
-Receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018">
-<summary>
-Send and receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="37049">
+<interface name="corenet_tcp_bind_ipp_port" lineno="28884">
 <summary>
 Bind TCP sockets to the ipp port.
 </summary>
@@ -33397,7 +27428,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="37069">
+<interface name="corenet_udp_bind_ipp_port" lineno="28904">
 <summary>
 Bind UDP sockets to the ipp port.
 </summary>
@@ -33408,7 +27439,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="37088">
+<interface name="corenet_tcp_connect_ipp_port" lineno="28923">
 <summary>
 Make a TCP connection to the ipp port.
 </summary>
@@ -33418,7 +27449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_client_packets" lineno="37108">
+<interface name="corenet_send_ipp_client_packets" lineno="28943">
 <summary>
 Send ipp_client packets.
 </summary>
@@ -33429,7 +27460,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="28962">
 <summary>
 Do not audit attempts to send ipp_client packets.
 </summary>
@@ -33440,7 +27471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37146">
+<interface name="corenet_receive_ipp_client_packets" lineno="28981">
 <summary>
 Receive ipp_client packets.
 </summary>
@@ -33451,7 +27482,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="29000">
 <summary>
 Do not audit attempts to receive ipp_client packets.
 </summary>
@@ -33462,7 +27493,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="29019">
 <summary>
 Send and receive ipp_client packets.
 </summary>
@@ -33473,7 +27504,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="29035">
 <summary>
 Do not audit attempts to send and receive ipp_client packets.
 </summary>
@@ -33484,7 +27515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37215">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="29050">
 <summary>
 Relabel packets to ipp_client the packet type.
 </summary>
@@ -33494,7 +27525,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37235">
+<interface name="corenet_send_ipp_server_packets" lineno="29070">
 <summary>
 Send ipp_server packets.
 </summary>
@@ -33505,7 +27536,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="29089">
 <summary>
 Do not audit attempts to send ipp_server packets.
 </summary>
@@ -33516,7 +27547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37273">
+<interface name="corenet_receive_ipp_server_packets" lineno="29108">
 <summary>
 Receive ipp_server packets.
 </summary>
@@ -33527,7 +27558,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="29127">
 <summary>
 Do not audit attempts to receive ipp_server packets.
 </summary>
@@ -33538,7 +27569,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="29146">
 <summary>
 Send and receive ipp_server packets.
 </summary>
@@ -33549,7 +27580,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="29162">
 <summary>
 Do not audit attempts to send and receive ipp_server packets.
 </summary>
@@ -33560,7 +27591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37342">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="29177">
 <summary>
 Relabel packets to ipp_server the packet type.
 </summary>
@@ -33570,85 +27601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364">
-<summary>
-Send and receive TCP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37379">
-<summary>
-Send UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394">
-<summary>
-Do not audit attempts to send UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409">
-<summary>
-Receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439">
-<summary>
-Send and receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="29199">
 <summary>
 Bind TCP sockets to the ipsecnat port.
 </summary>
@@ -33659,7 +27612,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="29219">
 <summary>
 Bind UDP sockets to the ipsecnat port.
 </summary>
@@ -33670,7 +27623,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="29238">
 <summary>
 Make a TCP connection to the ipsecnat port.
 </summary>
@@ -33680,7 +27633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37529">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="29258">
 <summary>
 Send ipsecnat_client packets.
 </summary>
@@ -33691,7 +27644,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="29277">
 <summary>
 Do not audit attempts to send ipsecnat_client packets.
 </summary>
@@ -33702,7 +27655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="29296">
 <summary>
 Receive ipsecnat_client packets.
 </summary>
@@ -33713,7 +27666,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="29315">
 <summary>
 Do not audit attempts to receive ipsecnat_client packets.
 </summary>
@@ -33724,7 +27677,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="29334">
 <summary>
 Send and receive ipsecnat_client packets.
 </summary>
@@ -33735,7 +27688,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="29350">
 <summary>
 Do not audit attempts to send and receive ipsecnat_client packets.
 </summary>
@@ -33746,7 +27699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="29365">
 <summary>
 Relabel packets to ipsecnat_client the packet type.
 </summary>
@@ -33756,7 +27709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37656">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="29385">
 <summary>
 Send ipsecnat_server packets.
 </summary>
@@ -33767,7 +27720,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="29404">
 <summary>
 Do not audit attempts to send ipsecnat_server packets.
 </summary>
@@ -33778,7 +27731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="29423">
 <summary>
 Receive ipsecnat_server packets.
 </summary>
@@ -33789,7 +27742,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="29442">
 <summary>
 Do not audit attempts to receive ipsecnat_server packets.
 </summary>
@@ -33800,7 +27753,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="29461">
 <summary>
 Send and receive ipsecnat_server packets.
 </summary>
@@ -33811,7 +27764,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="29477">
 <summary>
 Do not audit attempts to send and receive ipsecnat_server packets.
 </summary>
@@ -33822,7 +27775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="29492">
 <summary>
 Relabel packets to ipsecnat_server the packet type.
 </summary>
@@ -33832,85 +27785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785">
-<summary>
-Send and receive TCP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37800">
-<summary>
-Send UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815">
-<summary>
-Do not audit attempts to send UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37830">
-<summary>
-Receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845">
-<summary>
-Do not audit attempts to receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860">
-<summary>
-Send and receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37891">
+<interface name="corenet_tcp_bind_ircd_port" lineno="29514">
 <summary>
 Bind TCP sockets to the ircd port.
 </summary>
@@ -33921,7 +27796,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37911">
+<interface name="corenet_udp_bind_ircd_port" lineno="29534">
 <summary>
 Bind UDP sockets to the ircd port.
 </summary>
@@ -33932,7 +27807,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37930">
+<interface name="corenet_tcp_connect_ircd_port" lineno="29553">
 <summary>
 Make a TCP connection to the ircd port.
 </summary>
@@ -33942,7 +27817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37950">
+<interface name="corenet_send_ircd_client_packets" lineno="29573">
 <summary>
 Send ircd_client packets.
 </summary>
@@ -33953,7 +27828,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="29592">
 <summary>
 Do not audit attempts to send ircd_client packets.
 </summary>
@@ -33964,7 +27839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37988">
+<interface name="corenet_receive_ircd_client_packets" lineno="29611">
 <summary>
 Receive ircd_client packets.
 </summary>
@@ -33975,7 +27850,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="29630">
 <summary>
 Do not audit attempts to receive ircd_client packets.
 </summary>
@@ -33986,7 +27861,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="29649">
 <summary>
 Send and receive ircd_client packets.
 </summary>
@@ -33997,7 +27872,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="29665">
 <summary>
 Do not audit attempts to send and receive ircd_client packets.
 </summary>
@@ -34008,7 +27883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="38057">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="29680">
 <summary>
 Relabel packets to ircd_client the packet type.
 </summary>
@@ -34018,7 +27893,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ircd_server_packets" lineno="38077">
+<interface name="corenet_send_ircd_server_packets" lineno="29700">
 <summary>
 Send ircd_server packets.
 </summary>
@@ -34029,7 +27904,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="29719">
 <summary>
 Do not audit attempts to send ircd_server packets.
 </summary>
@@ -34040,7 +27915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="38115">
+<interface name="corenet_receive_ircd_server_packets" lineno="29738">
 <summary>
 Receive ircd_server packets.
 </summary>
@@ -34051,7 +27926,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="29757">
 <summary>
 Do not audit attempts to receive ircd_server packets.
 </summary>
@@ -34062,7 +27937,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="29776">
 <summary>
 Send and receive ircd_server packets.
 </summary>
@@ -34073,7 +27948,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="29792">
 <summary>
 Do not audit attempts to send and receive ircd_server packets.
 </summary>
@@ -34084,7 +27959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38184">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="29807">
 <summary>
 Relabel packets to ircd_server the packet type.
 </summary>
@@ -34094,85 +27969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206">
-<summary>
-Send and receive TCP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38221">
-<summary>
-Send UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236">
-<summary>
-Do not audit attempts to send UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38251">
-<summary>
-Receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266">
-<summary>
-Do not audit attempts to receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281">
-<summary>
-Send and receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38312">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="29829">
 <summary>
 Bind TCP sockets to the isakmp port.
 </summary>
@@ -34183,7 +27980,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38332">
+<interface name="corenet_udp_bind_isakmp_port" lineno="29849">
 <summary>
 Bind UDP sockets to the isakmp port.
 </summary>
@@ -34194,7 +27991,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38351">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="29868">
 <summary>
 Make a TCP connection to the isakmp port.
 </summary>
@@ -34204,7 +28001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38371">
+<interface name="corenet_send_isakmp_client_packets" lineno="29888">
 <summary>
 Send isakmp_client packets.
 </summary>
@@ -34215,7 +28012,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="29907">
 <summary>
 Do not audit attempts to send isakmp_client packets.
 </summary>
@@ -34226,7 +28023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38409">
+<interface name="corenet_receive_isakmp_client_packets" lineno="29926">
 <summary>
 Receive isakmp_client packets.
 </summary>
@@ -34237,7 +28034,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="29945">
 <summary>
 Do not audit attempts to receive isakmp_client packets.
 </summary>
@@ -34248,7 +28045,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="29964">
 <summary>
 Send and receive isakmp_client packets.
 </summary>
@@ -34259,7 +28056,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="29980">
 <summary>
 Do not audit attempts to send and receive isakmp_client packets.
 </summary>
@@ -34270,7 +28067,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="29995">
 <summary>
 Relabel packets to isakmp_client the packet type.
 </summary>
@@ -34280,7 +28077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38498">
+<interface name="corenet_send_isakmp_server_packets" lineno="30015">
 <summary>
 Send isakmp_server packets.
 </summary>
@@ -34291,7 +28088,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="30034">
 <summary>
 Do not audit attempts to send isakmp_server packets.
 </summary>
@@ -34302,7 +28099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38536">
+<interface name="corenet_receive_isakmp_server_packets" lineno="30053">
 <summary>
 Receive isakmp_server packets.
 </summary>
@@ -34313,7 +28110,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="30072">
 <summary>
 Do not audit attempts to receive isakmp_server packets.
 </summary>
@@ -34324,7 +28121,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="30091">
 <summary>
 Send and receive isakmp_server packets.
 </summary>
@@ -34335,7 +28132,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="30107">
 <summary>
 Do not audit attempts to send and receive isakmp_server packets.
 </summary>
@@ -34346,7 +28143,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="30122">
 <summary>
 Relabel packets to isakmp_server the packet type.
 </summary>
@@ -34356,85 +28153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627">
-<summary>
-Send and receive TCP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38642">
-<summary>
-Send UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657">
-<summary>
-Do not audit attempts to send UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38672">
-<summary>
-Receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687">
-<summary>
-Do not audit attempts to receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702">
-<summary>
-Send and receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38733">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="30144">
 <summary>
 Bind TCP sockets to the iscsi port.
 </summary>
@@ -34445,7 +28164,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38753">
+<interface name="corenet_udp_bind_iscsi_port" lineno="30164">
 <summary>
 Bind UDP sockets to the iscsi port.
 </summary>
@@ -34456,7 +28175,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38772">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="30183">
 <summary>
 Make a TCP connection to the iscsi port.
 </summary>
@@ -34466,7 +28185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38792">
+<interface name="corenet_send_iscsi_client_packets" lineno="30203">
 <summary>
 Send iscsi_client packets.
 </summary>
@@ -34477,7 +28196,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="30222">
 <summary>
 Do not audit attempts to send iscsi_client packets.
 </summary>
@@ -34488,7 +28207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38830">
+<interface name="corenet_receive_iscsi_client_packets" lineno="30241">
 <summary>
 Receive iscsi_client packets.
 </summary>
@@ -34499,7 +28218,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="30260">
 <summary>
 Do not audit attempts to receive iscsi_client packets.
 </summary>
@@ -34510,7 +28229,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="30279">
 <summary>
 Send and receive iscsi_client packets.
 </summary>
@@ -34521,7 +28240,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="30295">
 <summary>
 Do not audit attempts to send and receive iscsi_client packets.
 </summary>
@@ -34532,7 +28251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="30310">
 <summary>
 Relabel packets to iscsi_client the packet type.
 </summary>
@@ -34542,7 +28261,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38919">
+<interface name="corenet_send_iscsi_server_packets" lineno="30330">
 <summary>
 Send iscsi_server packets.
 </summary>
@@ -34553,7 +28272,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="30349">
 <summary>
 Do not audit attempts to send iscsi_server packets.
 </summary>
@@ -34564,7 +28283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38957">
+<interface name="corenet_receive_iscsi_server_packets" lineno="30368">
 <summary>
 Receive iscsi_server packets.
 </summary>
@@ -34575,7 +28294,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="30387">
 <summary>
 Do not audit attempts to receive iscsi_server packets.
 </summary>
@@ -34586,7 +28305,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="30406">
 <summary>
 Send and receive iscsi_server packets.
 </summary>
@@ -34597,7 +28316,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="30422">
 <summary>
 Do not audit attempts to send and receive iscsi_server packets.
 </summary>
@@ -34608,7 +28327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="30437">
 <summary>
 Relabel packets to iscsi_server the packet type.
 </summary>
@@ -34618,85 +28337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048">
-<summary>
-Send and receive TCP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_isns_port" lineno="39063">
-<summary>
-Send UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078">
-<summary>
-Do not audit attempts to send UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_isns_port" lineno="39093">
-<summary>
-Receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108">
-<summary>
-Do not audit attempts to receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="39123">
-<summary>
-Send and receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39154">
+<interface name="corenet_tcp_bind_isns_port" lineno="30459">
 <summary>
 Bind TCP sockets to the isns port.
 </summary>
@@ -34707,7 +28348,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39174">
+<interface name="corenet_udp_bind_isns_port" lineno="30479">
 <summary>
 Bind UDP sockets to the isns port.
 </summary>
@@ -34718,7 +28359,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39193">
+<interface name="corenet_tcp_connect_isns_port" lineno="30498">
 <summary>
 Make a TCP connection to the isns port.
 </summary>
@@ -34728,7 +28369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_client_packets" lineno="39213">
+<interface name="corenet_send_isns_client_packets" lineno="30518">
 <summary>
 Send isns_client packets.
 </summary>
@@ -34739,7 +28380,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="30537">
 <summary>
 Do not audit attempts to send isns_client packets.
 </summary>
@@ -34750,7 +28391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39251">
+<interface name="corenet_receive_isns_client_packets" lineno="30556">
 <summary>
 Receive isns_client packets.
 </summary>
@@ -34761,7 +28402,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="30575">
 <summary>
 Do not audit attempts to receive isns_client packets.
 </summary>
@@ -34772,7 +28413,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39289">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="30594">
 <summary>
 Send and receive isns_client packets.
 </summary>
@@ -34783,7 +28424,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="30610">
 <summary>
 Do not audit attempts to send and receive isns_client packets.
 </summary>
@@ -34794,7 +28435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39320">
+<interface name="corenet_relabelto_isns_client_packets" lineno="30625">
 <summary>
 Relabel packets to isns_client the packet type.
 </summary>
@@ -34804,7 +28445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_isns_server_packets" lineno="39340">
+<interface name="corenet_send_isns_server_packets" lineno="30645">
 <summary>
 Send isns_server packets.
 </summary>
@@ -34815,7 +28456,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="30664">
 <summary>
 Do not audit attempts to send isns_server packets.
 </summary>
@@ -34826,7 +28467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39378">
+<interface name="corenet_receive_isns_server_packets" lineno="30683">
 <summary>
 Receive isns_server packets.
 </summary>
@@ -34837,7 +28478,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="30702">
 <summary>
 Do not audit attempts to receive isns_server packets.
 </summary>
@@ -34848,7 +28489,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39416">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="30721">
 <summary>
 Send and receive isns_server packets.
 </summary>
@@ -34859,7 +28500,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="30737">
 <summary>
 Do not audit attempts to send and receive isns_server packets.
 </summary>
@@ -34870,7 +28511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39447">
+<interface name="corenet_relabelto_isns_server_packets" lineno="30752">
 <summary>
 Relabel packets to isns_server the packet type.
 </summary>
@@ -34880,85 +28521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469">
-<summary>
-Send and receive TCP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39484">
-<summary>
-Send UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499">
-<summary>
-Do not audit attempts to send UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39514">
-<summary>
-Receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529">
-<summary>
-Do not audit attempts to receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544">
-<summary>
-Send and receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="30774">
 <summary>
 Bind TCP sockets to the jabber_client port.
 </summary>
@@ -34969,7 +28532,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39595">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="30794">
 <summary>
 Bind UDP sockets to the jabber_client port.
 </summary>
@@ -34980,7 +28543,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="30813">
 <summary>
 Make a TCP connection to the jabber_client port.
 </summary>
@@ -34990,7 +28553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39634">
+<interface name="corenet_send_jabber_client_client_packets" lineno="30833">
 <summary>
 Send jabber_client_client packets.
 </summary>
@@ -35001,7 +28564,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="30852">
 <summary>
 Do not audit attempts to send jabber_client_client packets.
 </summary>
@@ -35012,7 +28575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39672">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="30871">
 <summary>
 Receive jabber_client_client packets.
 </summary>
@@ -35023,7 +28586,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="30890">
 <summary>
 Do not audit attempts to receive jabber_client_client packets.
 </summary>
@@ -35034,7 +28597,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="30909">
 <summary>
 Send and receive jabber_client_client packets.
 </summary>
@@ -35045,7 +28608,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="30925">
 <summary>
 Do not audit attempts to send and receive jabber_client_client packets.
 </summary>
@@ -35056,7 +28619,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="30940">
 <summary>
 Relabel packets to jabber_client_client the packet type.
 </summary>
@@ -35066,7 +28629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39761">
+<interface name="corenet_send_jabber_client_server_packets" lineno="30960">
 <summary>
 Send jabber_client_server packets.
 </summary>
@@ -35077,7 +28640,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="30979">
 <summary>
 Do not audit attempts to send jabber_client_server packets.
 </summary>
@@ -35088,7 +28651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39799">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="30998">
 <summary>
 Receive jabber_client_server packets.
 </summary>
@@ -35099,7 +28662,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="31017">
 <summary>
 Do not audit attempts to receive jabber_client_server packets.
 </summary>
@@ -35110,7 +28673,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="31036">
 <summary>
 Send and receive jabber_client_server packets.
 </summary>
@@ -35121,7 +28684,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="31052">
 <summary>
 Do not audit attempts to send and receive jabber_client_server packets.
 </summary>
@@ -35132,7 +28695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="31067">
 <summary>
 Relabel packets to jabber_client_server the packet type.
 </summary>
@@ -35142,85 +28705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890">
-<summary>
-Send and receive TCP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905">
-<summary>
-Send UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920">
-<summary>
-Do not audit attempts to send UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935">
-<summary>
-Receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950">
-<summary>
-Do not audit attempts to receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965">
-<summary>
-Send and receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="31089">
 <summary>
 Bind TCP sockets to the jabber_interserver port.
 </summary>
@@ -35231,7 +28716,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="31109">
 <summary>
 Bind UDP sockets to the jabber_interserver port.
 </summary>
@@ -35242,7 +28727,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="31128">
 <summary>
 Make a TCP connection to the jabber_interserver port.
 </summary>
@@ -35252,7 +28737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="31148">
 <summary>
 Send jabber_interserver_client packets.
 </summary>
@@ -35263,7 +28748,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="31167">
 <summary>
 Do not audit attempts to send jabber_interserver_client packets.
 </summary>
@@ -35274,7 +28759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="31186">
 <summary>
 Receive jabber_interserver_client packets.
 </summary>
@@ -35285,7 +28770,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="31205">
 <summary>
 Do not audit attempts to receive jabber_interserver_client packets.
 </summary>
@@ -35296,7 +28781,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="31224">
 <summary>
 Send and receive jabber_interserver_client packets.
 </summary>
@@ -35307,7 +28792,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="31240">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_client packets.
 </summary>
@@ -35318,7 +28803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="31255">
 <summary>
 Relabel packets to jabber_interserver_client the packet type.
 </summary>
@@ -35328,7 +28813,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="31275">
 <summary>
 Send jabber_interserver_server packets.
 </summary>
@@ -35339,7 +28824,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="31294">
 <summary>
 Do not audit attempts to send jabber_interserver_server packets.
 </summary>
@@ -35350,7 +28835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="31313">
 <summary>
 Receive jabber_interserver_server packets.
 </summary>
@@ -35361,7 +28846,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="31332">
 <summary>
 Do not audit attempts to receive jabber_interserver_server packets.
 </summary>
@@ -35372,7 +28857,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="31351">
 <summary>
 Send and receive jabber_interserver_server packets.
 </summary>
@@ -35383,7 +28868,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="31367">
 <summary>
 Do not audit attempts to send and receive jabber_interserver_server packets.
 </summary>
@@ -35394,7 +28879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="31382">
 <summary>
 Relabel packets to jabber_interserver_server the packet type.
 </summary>
@@ -35404,85 +28889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311">
-<summary>
-Send and receive TCP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326">
-<summary>
-Send UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341">
-<summary>
-Do not audit attempts to send UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356">
-<summary>
-Receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371">
-<summary>
-Do not audit attempts to receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386">
-<summary>
-Send and receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="31404">
 <summary>
 Bind TCP sockets to the jboss_iiop port.
 </summary>
@@ -35493,7 +28900,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="31424">
 <summary>
 Bind UDP sockets to the jboss_iiop port.
 </summary>
@@ -35504,7 +28911,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="31443">
 <summary>
 Make a TCP connection to the jboss_iiop port.
 </summary>
@@ -35514,7 +28921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="31463">
 <summary>
 Send jboss_iiop_client packets.
 </summary>
@@ -35525,7 +28932,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="31482">
 <summary>
 Do not audit attempts to send jboss_iiop_client packets.
 </summary>
@@ -35536,7 +28943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="31501">
 <summary>
 Receive jboss_iiop_client packets.
 </summary>
@@ -35547,7 +28954,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="31520">
 <summary>
 Do not audit attempts to receive jboss_iiop_client packets.
 </summary>
@@ -35558,7 +28965,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="31539">
 <summary>
 Send and receive jboss_iiop_client packets.
 </summary>
@@ -35569,7 +28976,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="31555">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_client packets.
 </summary>
@@ -35580,7 +28987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="31570">
 <summary>
 Relabel packets to jboss_iiop_client the packet type.
 </summary>
@@ -35590,7 +28997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="31590">
 <summary>
 Send jboss_iiop_server packets.
 </summary>
@@ -35601,7 +29008,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="31609">
 <summary>
 Do not audit attempts to send jboss_iiop_server packets.
 </summary>
@@ -35612,7 +29019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="31628">
 <summary>
 Receive jboss_iiop_server packets.
 </summary>
@@ -35623,7 +29030,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="31647">
 <summary>
 Do not audit attempts to receive jboss_iiop_server packets.
 </summary>
@@ -35634,7 +29041,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="31666">
 <summary>
 Send and receive jboss_iiop_server packets.
 </summary>
@@ -35645,7 +29052,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="31682">
 <summary>
 Do not audit attempts to send and receive jboss_iiop_server packets.
 </summary>
@@ -35656,7 +29063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="31697">
 <summary>
 Relabel packets to jboss_iiop_server the packet type.
 </summary>
@@ -35666,85 +29073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732">
-<summary>
-Send and receive TCP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40747">
-<summary>
-Send UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40777">
-<summary>
-Receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807">
-<summary>
-Send and receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40838">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="31719">
 <summary>
 Bind TCP sockets to the kerberos port.
 </summary>
@@ -35755,7 +29084,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40858">
+<interface name="corenet_udp_bind_kerberos_port" lineno="31739">
 <summary>
 Bind UDP sockets to the kerberos port.
 </summary>
@@ -35766,7 +29095,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40877">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="31758">
 <summary>
 Make a TCP connection to the kerberos port.
 </summary>
@@ -35776,7 +29105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40897">
+<interface name="corenet_send_kerberos_client_packets" lineno="31778">
 <summary>
 Send kerberos_client packets.
 </summary>
@@ -35787,7 +29116,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="31797">
 <summary>
 Do not audit attempts to send kerberos_client packets.
 </summary>
@@ -35798,7 +29127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40935">
+<interface name="corenet_receive_kerberos_client_packets" lineno="31816">
 <summary>
 Receive kerberos_client packets.
 </summary>
@@ -35809,7 +29138,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="31835">
 <summary>
 Do not audit attempts to receive kerberos_client packets.
 </summary>
@@ -35820,7 +29149,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="31854">
 <summary>
 Send and receive kerberos_client packets.
 </summary>
@@ -35831,7 +29160,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="31870">
 <summary>
 Do not audit attempts to send and receive kerberos_client packets.
 </summary>
@@ -35842,7 +29171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="31885">
 <summary>
 Relabel packets to kerberos_client the packet type.
 </summary>
@@ -35852,7 +29181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="41024">
+<interface name="corenet_send_kerberos_server_packets" lineno="31905">
 <summary>
 Send kerberos_server packets.
 </summary>
@@ -35863,7 +29192,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="31924">
 <summary>
 Do not audit attempts to send kerberos_server packets.
 </summary>
@@ -35874,7 +29203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="41062">
+<interface name="corenet_receive_kerberos_server_packets" lineno="31943">
 <summary>
 Receive kerberos_server packets.
 </summary>
@@ -35885,7 +29214,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="31962">
 <summary>
 Do not audit attempts to receive kerberos_server packets.
 </summary>
@@ -35896,7 +29225,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="31981">
 <summary>
 Send and receive kerberos_server packets.
 </summary>
@@ -35907,7 +29236,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="31997">
 <summary>
 Do not audit attempts to send and receive kerberos_server packets.
 </summary>
@@ -35918,7 +29247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="32012">
 <summary>
 Relabel packets to kerberos_server the packet type.
 </summary>
@@ -35928,85 +29257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153">
-<summary>
-Send and receive TCP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168">
-<summary>
-Send UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198">
-<summary>
-Receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228">
-<summary>
-Send and receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="32034">
 <summary>
 Bind TCP sockets to the kerberos_admin port.
 </summary>
@@ -36017,7 +29268,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="32054">
 <summary>
 Bind UDP sockets to the kerberos_admin port.
 </summary>
@@ -36028,7 +29279,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="32073">
 <summary>
 Make a TCP connection to the kerberos_admin port.
 </summary>
@@ -36038,7 +29289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="32093">
 <summary>
 Send kerberos_admin_client packets.
 </summary>
@@ -36049,7 +29300,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="32112">
 <summary>
 Do not audit attempts to send kerberos_admin_client packets.
 </summary>
@@ -36060,7 +29311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="32131">
 <summary>
 Receive kerberos_admin_client packets.
 </summary>
@@ -36071,7 +29322,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="32150">
 <summary>
 Do not audit attempts to receive kerberos_admin_client packets.
 </summary>
@@ -36082,7 +29333,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="32169">
 <summary>
 Send and receive kerberos_admin_client packets.
 </summary>
@@ -36093,7 +29344,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="32185">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_client packets.
 </summary>
@@ -36104,7 +29355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="32200">
 <summary>
 Relabel packets to kerberos_admin_client the packet type.
 </summary>
@@ -36114,7 +29365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="32220">
 <summary>
 Send kerberos_admin_server packets.
 </summary>
@@ -36125,7 +29376,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="32239">
 <summary>
 Do not audit attempts to send kerberos_admin_server packets.
 </summary>
@@ -36136,7 +29387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="32258">
 <summary>
 Receive kerberos_admin_server packets.
 </summary>
@@ -36147,7 +29398,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="32277">
 <summary>
 Do not audit attempts to receive kerberos_admin_server packets.
 </summary>
@@ -36158,7 +29409,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="32296">
 <summary>
 Send and receive kerberos_admin_server packets.
 </summary>
@@ -36169,7 +29420,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="32312">
 <summary>
 Do not audit attempts to send and receive kerberos_admin_server packets.
 </summary>
@@ -36180,7 +29431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="32327">
 <summary>
 Relabel packets to kerberos_admin_server the packet type.
 </summary>
@@ -36190,85 +29441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574">
-<summary>
-Send and receive TCP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41589">
-<summary>
-Send UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619">
-<summary>
-Receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649">
-<summary>
-Send and receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="32349">
 <summary>
 Bind TCP sockets to the kerberos_master port.
 </summary>
@@ -36279,7 +29452,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="32369">
 <summary>
 Bind UDP sockets to the kerberos_master port.
 </summary>
@@ -36290,7 +29463,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="32388">
 <summary>
 Make a TCP connection to the kerberos_master port.
 </summary>
@@ -36300,7 +29473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41739">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="32408">
 <summary>
 Send kerberos_master_client packets.
 </summary>
@@ -36311,7 +29484,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="32427">
 <summary>
 Do not audit attempts to send kerberos_master_client packets.
 </summary>
@@ -36322,7 +29495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="32446">
 <summary>
 Receive kerberos_master_client packets.
 </summary>
@@ -36333,7 +29506,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="32465">
 <summary>
 Do not audit attempts to receive kerberos_master_client packets.
 </summary>
@@ -36344,7 +29517,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="32484">
 <summary>
 Send and receive kerberos_master_client packets.
 </summary>
@@ -36355,7 +29528,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="32500">
 <summary>
 Do not audit attempts to send and receive kerberos_master_client packets.
 </summary>
@@ -36366,7 +29539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="32515">
 <summary>
 Relabel packets to kerberos_master_client the packet type.
 </summary>
@@ -36376,7 +29549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41866">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="32535">
 <summary>
 Send kerberos_master_server packets.
 </summary>
@@ -36387,7 +29560,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="32554">
 <summary>
 Do not audit attempts to send kerberos_master_server packets.
 </summary>
@@ -36398,7 +29571,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="32573">
 <summary>
 Receive kerberos_master_server packets.
 </summary>
@@ -36409,7 +29582,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="32592">
 <summary>
 Do not audit attempts to receive kerberos_master_server packets.
 </summary>
@@ -36420,7 +29593,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="32611">
 <summary>
 Send and receive kerberos_master_server packets.
 </summary>
@@ -36431,7 +29604,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="32627">
 <summary>
 Do not audit attempts to send and receive kerberos_master_server packets.
 </summary>
@@ -36442,7 +29615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="32642">
 <summary>
 Relabel packets to kerberos_master_server the packet type.
 </summary>
@@ -36452,85 +29625,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995">
-<summary>
-Send and receive TCP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kismet_port" lineno="42010">
-<summary>
-Send UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025">
-<summary>
-Do not audit attempts to send UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="42040">
-<summary>
-Receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055">
-<summary>
-Do not audit attempts to receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070">
-<summary>
-Send and receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="42101">
+<interface name="corenet_tcp_bind_kismet_port" lineno="32664">
 <summary>
 Bind TCP sockets to the kismet port.
 </summary>
@@ -36541,7 +29636,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="42121">
+<interface name="corenet_udp_bind_kismet_port" lineno="32684">
 <summary>
 Bind UDP sockets to the kismet port.
 </summary>
@@ -36552,7 +29647,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="42140">
+<interface name="corenet_tcp_connect_kismet_port" lineno="32703">
 <summary>
 Make a TCP connection to the kismet port.
 </summary>
@@ -36562,7 +29657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42160">
+<interface name="corenet_send_kismet_client_packets" lineno="32723">
 <summary>
 Send kismet_client packets.
 </summary>
@@ -36573,7 +29668,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="32742">
 <summary>
 Do not audit attempts to send kismet_client packets.
 </summary>
@@ -36584,7 +29679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42198">
+<interface name="corenet_receive_kismet_client_packets" lineno="32761">
 <summary>
 Receive kismet_client packets.
 </summary>
@@ -36595,7 +29690,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="32780">
 <summary>
 Do not audit attempts to receive kismet_client packets.
 </summary>
@@ -36606,7 +29701,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="32799">
 <summary>
 Send and receive kismet_client packets.
 </summary>
@@ -36617,7 +29712,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="32815">
 <summary>
 Do not audit attempts to send and receive kismet_client packets.
 </summary>
@@ -36628,7 +29723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42267">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="32830">
 <summary>
 Relabel packets to kismet_client the packet type.
 </summary>
@@ -36638,7 +29733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42287">
+<interface name="corenet_send_kismet_server_packets" lineno="32850">
 <summary>
 Send kismet_server packets.
 </summary>
@@ -36649,7 +29744,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="32869">
 <summary>
 Do not audit attempts to send kismet_server packets.
 </summary>
@@ -36660,7 +29755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42325">
+<interface name="corenet_receive_kismet_server_packets" lineno="32888">
 <summary>
 Receive kismet_server packets.
 </summary>
@@ -36671,7 +29766,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="32907">
 <summary>
 Do not audit attempts to receive kismet_server packets.
 </summary>
@@ -36682,7 +29777,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="32926">
 <summary>
 Send and receive kismet_server packets.
 </summary>
@@ -36693,7 +29788,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="32942">
 <summary>
 Do not audit attempts to send and receive kismet_server packets.
 </summary>
@@ -36704,7 +29799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42394">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="32957">
 <summary>
 Relabel packets to kismet_server the packet type.
 </summary>
@@ -36714,85 +29809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416">
-<summary>
-Send and receive TCP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42431">
-<summary>
-Send UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446">
-<summary>
-Do not audit attempts to send UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461">
-<summary>
-Receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476">
-<summary>
-Do not audit attempts to receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491">
-<summary>
-Send and receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="32979">
 <summary>
 Bind TCP sockets to the kdeconnect port.
 </summary>
@@ -36803,7 +29820,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="32999">
 <summary>
 Bind UDP sockets to the kdeconnect port.
 </summary>
@@ -36814,7 +29831,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="33018">
 <summary>
 Make a TCP connection to the kdeconnect port.
 </summary>
@@ -36824,7 +29841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42581">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="33038">
 <summary>
 Send kdeconnect_client packets.
 </summary>
@@ -36835,7 +29852,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="33057">
 <summary>
 Do not audit attempts to send kdeconnect_client packets.
 </summary>
@@ -36846,7 +29863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="33076">
 <summary>
 Receive kdeconnect_client packets.
 </summary>
@@ -36857,7 +29874,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="33095">
 <summary>
 Do not audit attempts to receive kdeconnect_client packets.
 </summary>
@@ -36868,7 +29885,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="33114">
 <summary>
 Send and receive kdeconnect_client packets.
 </summary>
@@ -36879,7 +29896,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="33130">
 <summary>
 Do not audit attempts to send and receive kdeconnect_client packets.
 </summary>
@@ -36890,7 +29907,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="33145">
 <summary>
 Relabel packets to kdeconnect_client the packet type.
 </summary>
@@ -36900,7 +29917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42708">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="33165">
 <summary>
 Send kdeconnect_server packets.
 </summary>
@@ -36911,7 +29928,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="33184">
 <summary>
 Do not audit attempts to send kdeconnect_server packets.
 </summary>
@@ -36922,7 +29939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="33203">
 <summary>
 Receive kdeconnect_server packets.
 </summary>
@@ -36933,7 +29950,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="33222">
 <summary>
 Do not audit attempts to receive kdeconnect_server packets.
 </summary>
@@ -36944,7 +29961,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="33241">
 <summary>
 Send and receive kdeconnect_server packets.
 </summary>
@@ -36955,7 +29972,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="33257">
 <summary>
 Do not audit attempts to send and receive kdeconnect_server packets.
 </summary>
@@ -36966,7 +29983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="33272">
 <summary>
 Relabel packets to kdeconnect_server the packet type.
 </summary>
@@ -36976,85 +29993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837">
-<summary>
-Send and receive TCP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42852">
-<summary>
-Send UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867">
-<summary>
-Do not audit attempts to send UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42882">
-<summary>
-Receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897">
-<summary>
-Do not audit attempts to receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912">
-<summary>
-Send and receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42943">
+<interface name="corenet_tcp_bind_kprop_port" lineno="33294">
 <summary>
 Bind TCP sockets to the kprop port.
 </summary>
@@ -37065,7 +30004,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42963">
+<interface name="corenet_udp_bind_kprop_port" lineno="33314">
 <summary>
 Bind UDP sockets to the kprop port.
 </summary>
@@ -37076,7 +30015,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42982">
+<interface name="corenet_tcp_connect_kprop_port" lineno="33333">
 <summary>
 Make a TCP connection to the kprop port.
 </summary>
@@ -37086,7 +30025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_client_packets" lineno="43002">
+<interface name="corenet_send_kprop_client_packets" lineno="33353">
 <summary>
 Send kprop_client packets.
 </summary>
@@ -37097,7 +30036,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="33372">
 <summary>
 Do not audit attempts to send kprop_client packets.
 </summary>
@@ -37108,7 +30047,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="43040">
+<interface name="corenet_receive_kprop_client_packets" lineno="33391">
 <summary>
 Receive kprop_client packets.
 </summary>
@@ -37119,7 +30058,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="33410">
 <summary>
 Do not audit attempts to receive kprop_client packets.
 </summary>
@@ -37130,7 +30069,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="33429">
 <summary>
 Send and receive kprop_client packets.
 </summary>
@@ -37141,7 +30080,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="33445">
 <summary>
 Do not audit attempts to send and receive kprop_client packets.
 </summary>
@@ -37152,7 +30091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="43109">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="33460">
 <summary>
 Relabel packets to kprop_client the packet type.
 </summary>
@@ -37162,7 +30101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_kprop_server_packets" lineno="43129">
+<interface name="corenet_send_kprop_server_packets" lineno="33480">
 <summary>
 Send kprop_server packets.
 </summary>
@@ -37173,7 +30112,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="33499">
 <summary>
 Do not audit attempts to send kprop_server packets.
 </summary>
@@ -37184,7 +30123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43167">
+<interface name="corenet_receive_kprop_server_packets" lineno="33518">
 <summary>
 Receive kprop_server packets.
 </summary>
@@ -37195,7 +30134,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="33537">
 <summary>
 Do not audit attempts to receive kprop_server packets.
 </summary>
@@ -37206,7 +30145,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="33556">
 <summary>
 Send and receive kprop_server packets.
 </summary>
@@ -37217,7 +30156,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="33572">
 <summary>
 Do not audit attempts to send and receive kprop_server packets.
 </summary>
@@ -37228,7 +30167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43236">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="33587">
 <summary>
 Relabel packets to kprop_server the packet type.
 </summary>
@@ -37238,53 +30177,52 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="33609">
 <summary>
-Send and receive TCP traffic on the ktalkd port.
+Bind TCP sockets to the ktalkd port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43273">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="33629">
 <summary>
-Send UDP traffic on the ktalkd port.
+Bind UDP sockets to the ktalkd port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="33648">
 <summary>
-Do not audit attempts to send UDP traffic on the ktalkd port.
+Make a TCP connection to the ktalkd port.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
-<infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43303">
+<interface name="corenet_send_ktalkd_client_packets" lineno="33668">
 <summary>
-Receive UDP traffic on the ktalkd port.
+Send ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="read" weight="10"/>
+<infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="33687">
 <summary>
-Do not audit attempts to receive UDP traffic on the ktalkd port.
+Do not audit attempts to send ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37293,54 +30231,53 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="33706">
 <summary>
-Send and receive UDP traffic on the ktalkd port.
+Receive ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="33725">
 <summary>
-Do not audit attempts to send and receive
-UDP traffic on the ktalkd port.
+Do not audit attempts to receive ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="33744">
 <summary>
-Bind TCP sockets to the ktalkd port.
+Send and receive ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="none"/>
+<infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43384">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="33760">
 <summary>
-Bind UDP sockets to the ktalkd port.
+Do not audit attempts to send and receive ktalkd_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain to not audit.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="33775">
 <summary>
-Make a TCP connection to the ktalkd port.
+Relabel packets to ktalkd_client the packet type.
 </summary>
 <param name="domain">
 <summary>
@@ -37348,9 +30285,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43423">
+<interface name="corenet_send_ktalkd_server_packets" lineno="33795">
 <summary>
-Send ktalkd_client packets.
+Send ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37359,9 +30296,9 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="33814">
 <summary>
-Do not audit attempts to send ktalkd_client packets.
+Do not audit attempts to send ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37370,9 +30307,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43461">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="33833">
 <summary>
-Receive ktalkd_client packets.
+Receive ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37381,9 +30318,9 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="33852">
 <summary>
-Do not audit attempts to receive ktalkd_client packets.
+Do not audit attempts to receive ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37392,9 +30329,9 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="33871">
 <summary>
-Send and receive ktalkd_client packets.
+Send and receive ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37403,9 +30340,9 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="33887">
 <summary>
-Do not audit attempts to send and receive ktalkd_client packets.
+Do not audit attempts to send and receive ktalkd_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37414,9 +30351,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="33902">
 <summary>
-Relabel packets to ktalkd_client the packet type.
+Relabel packets to ktalkd_server the packet type.
 </summary>
 <param name="domain">
 <summary>
@@ -37424,96 +30361,117 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43550">
+<interface name="corenet_tcp_bind_kubernetes_port" lineno="33924">
 <summary>
-Send ktalkd_server packets.
+Bind TCP sockets to the kubernetes port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569">
+<interface name="corenet_udp_bind_kubernetes_port" lineno="33944">
 <summary>
-Do not audit attempts to send ktalkd_server packets.
+Bind UDP sockets to the kubernetes port.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43588">
+<interface name="corenet_tcp_connect_kubernetes_port" lineno="33963">
 <summary>
-Receive ktalkd_server packets.
+Make a TCP connection to the kubernetes port.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607">
+<interface name="corenet_send_kubernetes_client_packets" lineno="33983">
 <summary>
-Do not audit attempts to receive ktalkd_server packets.
+Send kubernetes_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_kubernetes_client_packets" lineno="34002">
+<summary>
+Do not audit attempts to send kubernetes_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626">
+<interface name="corenet_receive_kubernetes_client_packets" lineno="34021">
 <summary>
-Send and receive ktalkd_server packets.
+Receive kubernetes_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642">
+<interface name="corenet_dontaudit_receive_kubernetes_client_packets" lineno="34040">
 <summary>
-Do not audit attempts to send and receive ktalkd_server packets.
+Do not audit attempts to receive kubernetes_client packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657">
+<interface name="corenet_sendrecv_kubernetes_client_packets" lineno="34059">
 <summary>
-Relabel packets to ktalkd_server the packet type.
+Send and receive kubernetes_client packets.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_kubernetes_client_packets" lineno="34075">
+<summary>
+Do not audit attempts to send and receive kubernetes_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679">
+<interface name="corenet_relabelto_kubernetes_client_packets" lineno="34090">
 <summary>
-Send and receive TCP traffic on the l2tp port.
+Relabel packets to kubernetes_client the packet type.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
-<infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43694">
+<interface name="corenet_send_kubernetes_server_packets" lineno="34110">
 <summary>
-Send UDP traffic on the l2tp port.
+Send kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37522,9 +30480,9 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709">
+<interface name="corenet_dontaudit_send_kubernetes_server_packets" lineno="34129">
 <summary>
-Do not audit attempts to send UDP traffic on the l2tp port.
+Do not audit attempts to send kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37533,9 +30491,9 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43724">
+<interface name="corenet_receive_kubernetes_server_packets" lineno="34148">
 <summary>
-Receive UDP traffic on the l2tp port.
+Receive kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37544,20 +30502,20 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739">
+<interface name="corenet_dontaudit_receive_kubernetes_server_packets" lineno="34167">
 <summary>
-Do not audit attempts to receive UDP traffic on the l2tp port.
+Do not audit attempts to receive kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
 </summary>
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754">
+<interface name="corenet_sendrecv_kubernetes_server_packets" lineno="34186">
 <summary>
-Send and receive UDP traffic on the l2tp port.
+Send and receive kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37566,10 +30524,9 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770">
+<interface name="corenet_dontaudit_sendrecv_kubernetes_server_packets" lineno="34202">
 <summary>
-Do not audit attempts to send and receive
-UDP traffic on the l2tp port.
+Do not audit attempts to send and receive kubernetes_server packets.
 </summary>
 <param name="domain">
 <summary>
@@ -37578,7 +30535,17 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43785">
+<interface name="corenet_relabelto_kubernetes_server_packets" lineno="34217">
+<summary>
+Relabel packets to kubernetes_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_bind_l2tp_port" lineno="34239">
 <summary>
 Bind TCP sockets to the l2tp port.
 </summary>
@@ -37589,7 +30556,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43805">
+<interface name="corenet_udp_bind_l2tp_port" lineno="34259">
 <summary>
 Bind UDP sockets to the l2tp port.
 </summary>
@@ -37600,7 +30567,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43824">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="34278">
 <summary>
 Make a TCP connection to the l2tp port.
 </summary>
@@ -37610,7 +30577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43844">
+<interface name="corenet_send_l2tp_client_packets" lineno="34298">
 <summary>
 Send l2tp_client packets.
 </summary>
@@ -37621,7 +30588,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="34317">
 <summary>
 Do not audit attempts to send l2tp_client packets.
 </summary>
@@ -37632,7 +30599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43882">
+<interface name="corenet_receive_l2tp_client_packets" lineno="34336">
 <summary>
 Receive l2tp_client packets.
 </summary>
@@ -37643,7 +30610,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="34355">
 <summary>
 Do not audit attempts to receive l2tp_client packets.
 </summary>
@@ -37654,7 +30621,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="34374">
 <summary>
 Send and receive l2tp_client packets.
 </summary>
@@ -37665,7 +30632,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="34390">
 <summary>
 Do not audit attempts to send and receive l2tp_client packets.
 </summary>
@@ -37676,7 +30643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="34405">
 <summary>
 Relabel packets to l2tp_client the packet type.
 </summary>
@@ -37686,7 +30653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43971">
+<interface name="corenet_send_l2tp_server_packets" lineno="34425">
 <summary>
 Send l2tp_server packets.
 </summary>
@@ -37697,7 +30664,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="34444">
 <summary>
 Do not audit attempts to send l2tp_server packets.
 </summary>
@@ -37708,7 +30675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="44009">
+<interface name="corenet_receive_l2tp_server_packets" lineno="34463">
 <summary>
 Receive l2tp_server packets.
 </summary>
@@ -37719,7 +30686,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="34482">
 <summary>
 Do not audit attempts to receive l2tp_server packets.
 </summary>
@@ -37730,7 +30697,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="34501">
 <summary>
 Send and receive l2tp_server packets.
 </summary>
@@ -37741,7 +30708,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="34517">
 <summary>
 Do not audit attempts to send and receive l2tp_server packets.
 </summary>
@@ -37752,7 +30719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="34532">
 <summary>
 Relabel packets to l2tp_server the packet type.
 </summary>
@@ -37762,85 +30729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100">
-<summary>
-Send and receive TCP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ldap_port" lineno="44115">
-<summary>
-Send UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130">
-<summary>
-Do not audit attempts to send UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44145">
-<summary>
-Receive UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160">
-<summary>
-Do not audit attempts to receive UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175">
-<summary>
-Send and receive UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ldap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44206">
+<interface name="corenet_tcp_bind_ldap_port" lineno="34554">
 <summary>
 Bind TCP sockets to the ldap port.
 </summary>
@@ -37851,7 +30740,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44226">
+<interface name="corenet_udp_bind_ldap_port" lineno="34574">
 <summary>
 Bind UDP sockets to the ldap port.
 </summary>
@@ -37862,7 +30751,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44245">
+<interface name="corenet_tcp_connect_ldap_port" lineno="34593">
 <summary>
 Make a TCP connection to the ldap port.
 </summary>
@@ -37872,7 +30761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44265">
+<interface name="corenet_send_ldap_client_packets" lineno="34613">
 <summary>
 Send ldap_client packets.
 </summary>
@@ -37883,7 +30772,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="34632">
 <summary>
 Do not audit attempts to send ldap_client packets.
 </summary>
@@ -37894,7 +30783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44303">
+<interface name="corenet_receive_ldap_client_packets" lineno="34651">
 <summary>
 Receive ldap_client packets.
 </summary>
@@ -37905,7 +30794,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="34670">
 <summary>
 Do not audit attempts to receive ldap_client packets.
 </summary>
@@ -37916,7 +30805,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="34689">
 <summary>
 Send and receive ldap_client packets.
 </summary>
@@ -37927,7 +30816,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="34705">
 <summary>
 Do not audit attempts to send and receive ldap_client packets.
 </summary>
@@ -37938,7 +30827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44372">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="34720">
 <summary>
 Relabel packets to ldap_client the packet type.
 </summary>
@@ -37948,7 +30837,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44392">
+<interface name="corenet_send_ldap_server_packets" lineno="34740">
 <summary>
 Send ldap_server packets.
 </summary>
@@ -37959,7 +30848,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="34759">
 <summary>
 Do not audit attempts to send ldap_server packets.
 </summary>
@@ -37970,7 +30859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44430">
+<interface name="corenet_receive_ldap_server_packets" lineno="34778">
 <summary>
 Receive ldap_server packets.
 </summary>
@@ -37981,7 +30870,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="34797">
 <summary>
 Do not audit attempts to receive ldap_server packets.
 </summary>
@@ -37992,7 +30881,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="34816">
 <summary>
 Send and receive ldap_server packets.
 </summary>
@@ -38003,7 +30892,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="34832">
 <summary>
 Do not audit attempts to send and receive ldap_server packets.
 </summary>
@@ -38014,7 +30903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44499">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="34847">
 <summary>
 Relabel packets to ldap_server the packet type.
 </summary>
@@ -38024,85 +30913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521">
-<summary>
-Send and receive TCP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44536">
-<summary>
-Send UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551">
-<summary>
-Do not audit attempts to send UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44566">
-<summary>
-Receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581">
-<summary>
-Do not audit attempts to receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596">
-<summary>
-Send and receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44627">
+<interface name="corenet_tcp_bind_lirc_port" lineno="34869">
 <summary>
 Bind TCP sockets to the lirc port.
 </summary>
@@ -38113,7 +30924,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44647">
+<interface name="corenet_udp_bind_lirc_port" lineno="34889">
 <summary>
 Bind UDP sockets to the lirc port.
 </summary>
@@ -38124,7 +30935,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44666">
+<interface name="corenet_tcp_connect_lirc_port" lineno="34908">
 <summary>
 Make a TCP connection to the lirc port.
 </summary>
@@ -38134,7 +30945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44686">
+<interface name="corenet_send_lirc_client_packets" lineno="34928">
 <summary>
 Send lirc_client packets.
 </summary>
@@ -38145,7 +30956,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="34947">
 <summary>
 Do not audit attempts to send lirc_client packets.
 </summary>
@@ -38156,7 +30967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44724">
+<interface name="corenet_receive_lirc_client_packets" lineno="34966">
 <summary>
 Receive lirc_client packets.
 </summary>
@@ -38167,7 +30978,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="34985">
 <summary>
 Do not audit attempts to receive lirc_client packets.
 </summary>
@@ -38178,7 +30989,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="35004">
 <summary>
 Send and receive lirc_client packets.
 </summary>
@@ -38189,7 +31000,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="35020">
 <summary>
 Do not audit attempts to send and receive lirc_client packets.
 </summary>
@@ -38200,7 +31011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44793">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="35035">
 <summary>
 Relabel packets to lirc_client the packet type.
 </summary>
@@ -38210,7 +31021,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44813">
+<interface name="corenet_send_lirc_server_packets" lineno="35055">
 <summary>
 Send lirc_server packets.
 </summary>
@@ -38221,7 +31032,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="35074">
 <summary>
 Do not audit attempts to send lirc_server packets.
 </summary>
@@ -38232,7 +31043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44851">
+<interface name="corenet_receive_lirc_server_packets" lineno="35093">
 <summary>
 Receive lirc_server packets.
 </summary>
@@ -38243,7 +31054,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="35112">
 <summary>
 Do not audit attempts to receive lirc_server packets.
 </summary>
@@ -38254,7 +31065,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="35131">
 <summary>
 Send and receive lirc_server packets.
 </summary>
@@ -38265,7 +31076,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="35147">
 <summary>
 Do not audit attempts to send and receive lirc_server packets.
 </summary>
@@ -38276,7 +31087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44920">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="35162">
 <summary>
 Relabel packets to lirc_server the packet type.
 </summary>
@@ -38286,85 +31097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942">
-<summary>
-Send and receive TCP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44957">
-<summary>
-Send UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972">
-<summary>
-Do not audit attempts to send UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44987">
-<summary>
-Receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002">
-<summary>
-Do not audit attempts to receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017">
-<summary>
-Send and receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="45048">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="35184">
 <summary>
 Bind TCP sockets to the llmnr port.
 </summary>
@@ -38375,7 +31108,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="45068">
+<interface name="corenet_udp_bind_llmnr_port" lineno="35204">
 <summary>
 Bind UDP sockets to the llmnr port.
 </summary>
@@ -38386,7 +31119,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="45087">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="35223">
 <summary>
 Make a TCP connection to the llmnr port.
 </summary>
@@ -38396,7 +31129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="45107">
+<interface name="corenet_send_llmnr_client_packets" lineno="35243">
 <summary>
 Send llmnr_client packets.
 </summary>
@@ -38407,7 +31140,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="35262">
 <summary>
 Do not audit attempts to send llmnr_client packets.
 </summary>
@@ -38418,7 +31151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45145">
+<interface name="corenet_receive_llmnr_client_packets" lineno="35281">
 <summary>
 Receive llmnr_client packets.
 </summary>
@@ -38429,7 +31162,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="35300">
 <summary>
 Do not audit attempts to receive llmnr_client packets.
 </summary>
@@ -38440,7 +31173,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="35319">
 <summary>
 Send and receive llmnr_client packets.
 </summary>
@@ -38451,7 +31184,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="35335">
 <summary>
 Do not audit attempts to send and receive llmnr_client packets.
 </summary>
@@ -38462,7 +31195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="35350">
 <summary>
 Relabel packets to llmnr_client the packet type.
 </summary>
@@ -38472,7 +31205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45234">
+<interface name="corenet_send_llmnr_server_packets" lineno="35370">
 <summary>
 Send llmnr_server packets.
 </summary>
@@ -38483,7 +31216,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="35389">
 <summary>
 Do not audit attempts to send llmnr_server packets.
 </summary>
@@ -38494,7 +31227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45272">
+<interface name="corenet_receive_llmnr_server_packets" lineno="35408">
 <summary>
 Receive llmnr_server packets.
 </summary>
@@ -38505,7 +31238,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="35427">
 <summary>
 Do not audit attempts to receive llmnr_server packets.
 </summary>
@@ -38516,7 +31249,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="35446">
 <summary>
 Send and receive llmnr_server packets.
 </summary>
@@ -38527,7 +31260,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="35462">
 <summary>
 Do not audit attempts to send and receive llmnr_server packets.
 </summary>
@@ -38538,7 +31271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="35477">
 <summary>
 Relabel packets to llmnr_server the packet type.
 </summary>
@@ -38548,85 +31281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363">
-<summary>
-Send and receive TCP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45378">
-<summary>
-Send UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393">
-<summary>
-Do not audit attempts to send UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45408">
-<summary>
-Receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423">
-<summary>
-Do not audit attempts to receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438">
-<summary>
-Send and receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45469">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="35499">
 <summary>
 Bind TCP sockets to the lmtp port.
 </summary>
@@ -38637,7 +31292,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45489">
+<interface name="corenet_udp_bind_lmtp_port" lineno="35519">
 <summary>
 Bind UDP sockets to the lmtp port.
 </summary>
@@ -38648,7 +31303,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45508">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="35538">
 <summary>
 Make a TCP connection to the lmtp port.
 </summary>
@@ -38658,7 +31313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45528">
+<interface name="corenet_send_lmtp_client_packets" lineno="35558">
 <summary>
 Send lmtp_client packets.
 </summary>
@@ -38669,7 +31324,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="35577">
 <summary>
 Do not audit attempts to send lmtp_client packets.
 </summary>
@@ -38680,7 +31335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45566">
+<interface name="corenet_receive_lmtp_client_packets" lineno="35596">
 <summary>
 Receive lmtp_client packets.
 </summary>
@@ -38691,7 +31346,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="35615">
 <summary>
 Do not audit attempts to receive lmtp_client packets.
 </summary>
@@ -38702,7 +31357,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="35634">
 <summary>
 Send and receive lmtp_client packets.
 </summary>
@@ -38713,7 +31368,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="35650">
 <summary>
 Do not audit attempts to send and receive lmtp_client packets.
 </summary>
@@ -38724,7 +31379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="35665">
 <summary>
 Relabel packets to lmtp_client the packet type.
 </summary>
@@ -38734,7 +31389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45655">
+<interface name="corenet_send_lmtp_server_packets" lineno="35685">
 <summary>
 Send lmtp_server packets.
 </summary>
@@ -38745,7 +31400,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="35704">
 <summary>
 Do not audit attempts to send lmtp_server packets.
 </summary>
@@ -38756,7 +31411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45693">
+<interface name="corenet_receive_lmtp_server_packets" lineno="35723">
 <summary>
 Receive lmtp_server packets.
 </summary>
@@ -38767,7 +31422,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="35742">
 <summary>
 Do not audit attempts to receive lmtp_server packets.
 </summary>
@@ -38778,7 +31433,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="35761">
 <summary>
 Send and receive lmtp_server packets.
 </summary>
@@ -38789,7 +31444,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="35777">
 <summary>
 Do not audit attempts to send and receive lmtp_server packets.
 </summary>
@@ -38800,7 +31455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="35792">
 <summary>
 Relabel packets to lmtp_server the packet type.
 </summary>
@@ -38810,85 +31465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784">
-<summary>
-Send and receive TCP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45799">
-<summary>
-Send UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814">
-<summary>
-Do not audit attempts to send UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45829">
-<summary>
-Receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844">
-<summary>
-Do not audit attempts to receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859">
-<summary>
-Send and receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45890">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="35814">
 <summary>
 Bind TCP sockets to the lrrd port.
 </summary>
@@ -38899,7 +31476,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45910">
+<interface name="corenet_udp_bind_lrrd_port" lineno="35834">
 <summary>
 Bind UDP sockets to the lrrd port.
 </summary>
@@ -38910,7 +31487,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45929">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="35853">
 <summary>
 Make a TCP connection to the lrrd port.
 </summary>
@@ -38920,7 +31497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45949">
+<interface name="corenet_send_lrrd_client_packets" lineno="35873">
 <summary>
 Send lrrd_client packets.
 </summary>
@@ -38931,7 +31508,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="35892">
 <summary>
 Do not audit attempts to send lrrd_client packets.
 </summary>
@@ -38942,7 +31519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45987">
+<interface name="corenet_receive_lrrd_client_packets" lineno="35911">
 <summary>
 Receive lrrd_client packets.
 </summary>
@@ -38953,7 +31530,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="35930">
 <summary>
 Do not audit attempts to receive lrrd_client packets.
 </summary>
@@ -38964,7 +31541,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="35949">
 <summary>
 Send and receive lrrd_client packets.
 </summary>
@@ -38975,7 +31552,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="35965">
 <summary>
 Do not audit attempts to send and receive lrrd_client packets.
 </summary>
@@ -38986,7 +31563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="35980">
 <summary>
 Relabel packets to lrrd_client the packet type.
 </summary>
@@ -38996,7 +31573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="46076">
+<interface name="corenet_send_lrrd_server_packets" lineno="36000">
 <summary>
 Send lrrd_server packets.
 </summary>
@@ -39007,7 +31584,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="36019">
 <summary>
 Do not audit attempts to send lrrd_server packets.
 </summary>
@@ -39018,7 +31595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="46114">
+<interface name="corenet_receive_lrrd_server_packets" lineno="36038">
 <summary>
 Receive lrrd_server packets.
 </summary>
@@ -39029,7 +31606,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="36057">
 <summary>
 Do not audit attempts to receive lrrd_server packets.
 </summary>
@@ -39040,7 +31617,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="36076">
 <summary>
 Send and receive lrrd_server packets.
 </summary>
@@ -39051,7 +31628,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="36092">
 <summary>
 Do not audit attempts to send and receive lrrd_server packets.
 </summary>
@@ -39062,7 +31639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="36107">
 <summary>
 Relabel packets to lrrd_server the packet type.
 </summary>
@@ -39072,85 +31649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205">
-<summary>
-Send and receive TCP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mail_port" lineno="46220">
-<summary>
-Send UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235">
-<summary>
-Do not audit attempts to send UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46250">
-<summary>
-Receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265">
-<summary>
-Do not audit attempts to receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46280">
-<summary>
-Send and receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46311">
+<interface name="corenet_tcp_bind_mail_port" lineno="36129">
 <summary>
 Bind TCP sockets to the mail port.
 </summary>
@@ -39161,7 +31660,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46331">
+<interface name="corenet_udp_bind_mail_port" lineno="36149">
 <summary>
 Bind UDP sockets to the mail port.
 </summary>
@@ -39172,7 +31671,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46350">
+<interface name="corenet_tcp_connect_mail_port" lineno="36168">
 <summary>
 Make a TCP connection to the mail port.
 </summary>
@@ -39182,7 +31681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_client_packets" lineno="46370">
+<interface name="corenet_send_mail_client_packets" lineno="36188">
 <summary>
 Send mail_client packets.
 </summary>
@@ -39193,7 +31692,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="36207">
 <summary>
 Do not audit attempts to send mail_client packets.
 </summary>
@@ -39204,7 +31703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46408">
+<interface name="corenet_receive_mail_client_packets" lineno="36226">
 <summary>
 Receive mail_client packets.
 </summary>
@@ -39215,7 +31714,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="36245">
 <summary>
 Do not audit attempts to receive mail_client packets.
 </summary>
@@ -39226,7 +31725,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46446">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="36264">
 <summary>
 Send and receive mail_client packets.
 </summary>
@@ -39237,7 +31736,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="36280">
 <summary>
 Do not audit attempts to send and receive mail_client packets.
 </summary>
@@ -39248,7 +31747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46477">
+<interface name="corenet_relabelto_mail_client_packets" lineno="36295">
 <summary>
 Relabel packets to mail_client the packet type.
 </summary>
@@ -39258,7 +31757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mail_server_packets" lineno="46497">
+<interface name="corenet_send_mail_server_packets" lineno="36315">
 <summary>
 Send mail_server packets.
 </summary>
@@ -39269,7 +31768,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="36334">
 <summary>
 Do not audit attempts to send mail_server packets.
 </summary>
@@ -39280,7 +31779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46535">
+<interface name="corenet_receive_mail_server_packets" lineno="36353">
 <summary>
 Receive mail_server packets.
 </summary>
@@ -39291,7 +31790,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="36372">
 <summary>
 Do not audit attempts to receive mail_server packets.
 </summary>
@@ -39302,7 +31801,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46573">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="36391">
 <summary>
 Send and receive mail_server packets.
 </summary>
@@ -39313,7 +31812,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="36407">
 <summary>
 Do not audit attempts to send and receive mail_server packets.
 </summary>
@@ -39324,7 +31823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46604">
+<interface name="corenet_relabelto_mail_server_packets" lineno="36422">
 <summary>
 Relabel packets to mail_server the packet type.
 </summary>
@@ -39334,85 +31833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626">
-<summary>
-Send and receive TCP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46641">
-<summary>
-Send UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656">
-<summary>
-Do not audit attempts to send UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46671">
-<summary>
-Receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686">
-<summary>
-Do not audit attempts to receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701">
-<summary>
-Send and receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46732">
+<interface name="corenet_tcp_bind_matahari_port" lineno="36444">
 <summary>
 Bind TCP sockets to the matahari port.
 </summary>
@@ -39423,7 +31844,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46752">
+<interface name="corenet_udp_bind_matahari_port" lineno="36464">
 <summary>
 Bind UDP sockets to the matahari port.
 </summary>
@@ -39434,7 +31855,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46771">
+<interface name="corenet_tcp_connect_matahari_port" lineno="36483">
 <summary>
 Make a TCP connection to the matahari port.
 </summary>
@@ -39444,7 +31865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46791">
+<interface name="corenet_send_matahari_client_packets" lineno="36503">
 <summary>
 Send matahari_client packets.
 </summary>
@@ -39455,7 +31876,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="36522">
 <summary>
 Do not audit attempts to send matahari_client packets.
 </summary>
@@ -39466,7 +31887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46829">
+<interface name="corenet_receive_matahari_client_packets" lineno="36541">
 <summary>
 Receive matahari_client packets.
 </summary>
@@ -39477,7 +31898,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="36560">
 <summary>
 Do not audit attempts to receive matahari_client packets.
 </summary>
@@ -39488,7 +31909,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="36579">
 <summary>
 Send and receive matahari_client packets.
 </summary>
@@ -39499,7 +31920,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="36595">
 <summary>
 Do not audit attempts to send and receive matahari_client packets.
 </summary>
@@ -39510,7 +31931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46898">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="36610">
 <summary>
 Relabel packets to matahari_client the packet type.
 </summary>
@@ -39520,7 +31941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46918">
+<interface name="corenet_send_matahari_server_packets" lineno="36630">
 <summary>
 Send matahari_server packets.
 </summary>
@@ -39531,7 +31952,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="36649">
 <summary>
 Do not audit attempts to send matahari_server packets.
 </summary>
@@ -39542,7 +31963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46956">
+<interface name="corenet_receive_matahari_server_packets" lineno="36668">
 <summary>
 Receive matahari_server packets.
 </summary>
@@ -39553,7 +31974,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="36687">
 <summary>
 Do not audit attempts to receive matahari_server packets.
 </summary>
@@ -39564,7 +31985,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="36706">
 <summary>
 Send and receive matahari_server packets.
 </summary>
@@ -39575,7 +31996,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="36722">
 <summary>
 Do not audit attempts to send and receive matahari_server packets.
 </summary>
@@ -39586,7 +32007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="47025">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="36737">
 <summary>
 Relabel packets to matahari_server the packet type.
 </summary>
@@ -39596,85 +32017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047">
-<summary>
-Send and receive TCP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_memcache_port" lineno="47062">
-<summary>
-Send UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077">
-<summary>
-Do not audit attempts to send UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="47092">
-<summary>
-Receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107">
-<summary>
-Do not audit attempts to receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122">
-<summary>
-Send and receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47153">
+<interface name="corenet_tcp_bind_memcache_port" lineno="36759">
 <summary>
 Bind TCP sockets to the memcache port.
 </summary>
@@ -39685,7 +32028,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47173">
+<interface name="corenet_udp_bind_memcache_port" lineno="36779">
 <summary>
 Bind UDP sockets to the memcache port.
 </summary>
@@ -39696,7 +32039,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47192">
+<interface name="corenet_tcp_connect_memcache_port" lineno="36798">
 <summary>
 Make a TCP connection to the memcache port.
 </summary>
@@ -39706,7 +32049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47212">
+<interface name="corenet_send_memcache_client_packets" lineno="36818">
 <summary>
 Send memcache_client packets.
 </summary>
@@ -39717,7 +32060,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="36837">
 <summary>
 Do not audit attempts to send memcache_client packets.
 </summary>
@@ -39728,7 +32071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47250">
+<interface name="corenet_receive_memcache_client_packets" lineno="36856">
 <summary>
 Receive memcache_client packets.
 </summary>
@@ -39739,7 +32082,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="36875">
 <summary>
 Do not audit attempts to receive memcache_client packets.
 </summary>
@@ -39750,7 +32093,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="36894">
 <summary>
 Send and receive memcache_client packets.
 </summary>
@@ -39761,7 +32104,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="36910">
 <summary>
 Do not audit attempts to send and receive memcache_client packets.
 </summary>
@@ -39772,7 +32115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47319">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="36925">
 <summary>
 Relabel packets to memcache_client the packet type.
 </summary>
@@ -39782,7 +32125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47339">
+<interface name="corenet_send_memcache_server_packets" lineno="36945">
 <summary>
 Send memcache_server packets.
 </summary>
@@ -39793,7 +32136,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="36964">
 <summary>
 Do not audit attempts to send memcache_server packets.
 </summary>
@@ -39804,7 +32147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47377">
+<interface name="corenet_receive_memcache_server_packets" lineno="36983">
 <summary>
 Receive memcache_server packets.
 </summary>
@@ -39815,7 +32158,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="37002">
 <summary>
 Do not audit attempts to receive memcache_server packets.
 </summary>
@@ -39826,7 +32169,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="37021">
 <summary>
 Send and receive memcache_server packets.
 </summary>
@@ -39837,7 +32180,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="37037">
 <summary>
 Do not audit attempts to send and receive memcache_server packets.
 </summary>
@@ -39848,7 +32191,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47446">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="37052">
 <summary>
 Relabel packets to memcache_server the packet type.
 </summary>
@@ -39858,85 +32201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468">
-<summary>
-Send and receive TCP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_milter_port" lineno="47483">
-<summary>
-Send UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498">
-<summary>
-Do not audit attempts to send UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47513">
-<summary>
-Receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528">
-<summary>
-Do not audit attempts to receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47543">
-<summary>
-Send and receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47574">
+<interface name="corenet_tcp_bind_milter_port" lineno="37074">
 <summary>
 Bind TCP sockets to the milter port.
 </summary>
@@ -39947,7 +32212,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47594">
+<interface name="corenet_udp_bind_milter_port" lineno="37094">
 <summary>
 Bind UDP sockets to the milter port.
 </summary>
@@ -39958,7 +32223,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47613">
+<interface name="corenet_tcp_connect_milter_port" lineno="37113">
 <summary>
 Make a TCP connection to the milter port.
 </summary>
@@ -39968,7 +32233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_client_packets" lineno="47633">
+<interface name="corenet_send_milter_client_packets" lineno="37133">
 <summary>
 Send milter_client packets.
 </summary>
@@ -39979,7 +32244,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="37152">
 <summary>
 Do not audit attempts to send milter_client packets.
 </summary>
@@ -39990,7 +32255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47671">
+<interface name="corenet_receive_milter_client_packets" lineno="37171">
 <summary>
 Receive milter_client packets.
 </summary>
@@ -40001,7 +32266,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="37190">
 <summary>
 Do not audit attempts to receive milter_client packets.
 </summary>
@@ -40012,7 +32277,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47709">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="37209">
 <summary>
 Send and receive milter_client packets.
 </summary>
@@ -40023,7 +32288,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="37225">
 <summary>
 Do not audit attempts to send and receive milter_client packets.
 </summary>
@@ -40034,7 +32299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47740">
+<interface name="corenet_relabelto_milter_client_packets" lineno="37240">
 <summary>
 Relabel packets to milter_client the packet type.
 </summary>
@@ -40044,7 +32309,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_milter_server_packets" lineno="47760">
+<interface name="corenet_send_milter_server_packets" lineno="37260">
 <summary>
 Send milter_server packets.
 </summary>
@@ -40055,7 +32320,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="37279">
 <summary>
 Do not audit attempts to send milter_server packets.
 </summary>
@@ -40066,7 +32331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47798">
+<interface name="corenet_receive_milter_server_packets" lineno="37298">
 <summary>
 Receive milter_server packets.
 </summary>
@@ -40077,7 +32342,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="37317">
 <summary>
 Do not audit attempts to receive milter_server packets.
 </summary>
@@ -40088,7 +32353,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47836">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="37336">
 <summary>
 Send and receive milter_server packets.
 </summary>
@@ -40099,7 +32364,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="37352">
 <summary>
 Do not audit attempts to send and receive milter_server packets.
 </summary>
@@ -40110,7 +32375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47867">
+<interface name="corenet_relabelto_milter_server_packets" lineno="37367">
 <summary>
 Relabel packets to milter_server the packet type.
 </summary>
@@ -40120,85 +32385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889">
-<summary>
-Send and receive TCP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47904">
-<summary>
-Send UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919">
-<summary>
-Do not audit attempts to send UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47934">
-<summary>
-Receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949">
-<summary>
-Do not audit attempts to receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964">
-<summary>
-Send and receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47995">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="37389">
 <summary>
 Bind TCP sockets to the mmcc port.
 </summary>
@@ -40209,7 +32396,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="48015">
+<interface name="corenet_udp_bind_mmcc_port" lineno="37409">
 <summary>
 Bind UDP sockets to the mmcc port.
 </summary>
@@ -40220,7 +32407,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="48034">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="37428">
 <summary>
 Make a TCP connection to the mmcc port.
 </summary>
@@ -40230,7 +32417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="48054">
+<interface name="corenet_send_mmcc_client_packets" lineno="37448">
 <summary>
 Send mmcc_client packets.
 </summary>
@@ -40241,7 +32428,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="37467">
 <summary>
 Do not audit attempts to send mmcc_client packets.
 </summary>
@@ -40252,7 +32439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="48092">
+<interface name="corenet_receive_mmcc_client_packets" lineno="37486">
 <summary>
 Receive mmcc_client packets.
 </summary>
@@ -40263,7 +32450,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="37505">
 <summary>
 Do not audit attempts to receive mmcc_client packets.
 </summary>
@@ -40274,7 +32461,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="37524">
 <summary>
 Send and receive mmcc_client packets.
 </summary>
@@ -40285,7 +32472,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="37540">
 <summary>
 Do not audit attempts to send and receive mmcc_client packets.
 </summary>
@@ -40296,7 +32483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="37555">
 <summary>
 Relabel packets to mmcc_client the packet type.
 </summary>
@@ -40306,7 +32493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48181">
+<interface name="corenet_send_mmcc_server_packets" lineno="37575">
 <summary>
 Send mmcc_server packets.
 </summary>
@@ -40317,7 +32504,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="37594">
 <summary>
 Do not audit attempts to send mmcc_server packets.
 </summary>
@@ -40328,7 +32515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48219">
+<interface name="corenet_receive_mmcc_server_packets" lineno="37613">
 <summary>
 Receive mmcc_server packets.
 </summary>
@@ -40339,7 +32526,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="37632">
 <summary>
 Do not audit attempts to receive mmcc_server packets.
 </summary>
@@ -40350,7 +32537,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="37651">
 <summary>
 Send and receive mmcc_server packets.
 </summary>
@@ -40361,7 +32548,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="37667">
 <summary>
 Do not audit attempts to send and receive mmcc_server packets.
 </summary>
@@ -40372,7 +32559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="37682">
 <summary>
 Relabel packets to mmcc_server the packet type.
 </summary>
@@ -40382,85 +32569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310">
-<summary>
-Send and receive TCP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mon_port" lineno="48325">
-<summary>
-Send UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340">
-<summary>
-Do not audit attempts to send UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48355">
-<summary>
-Receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370">
-<summary>
-Do not audit attempts to receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48385">
-<summary>
-Send and receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48416">
+<interface name="corenet_tcp_bind_mon_port" lineno="37704">
 <summary>
 Bind TCP sockets to the mon port.
 </summary>
@@ -40471,7 +32580,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48436">
+<interface name="corenet_udp_bind_mon_port" lineno="37724">
 <summary>
 Bind UDP sockets to the mon port.
 </summary>
@@ -40482,7 +32591,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48455">
+<interface name="corenet_tcp_connect_mon_port" lineno="37743">
 <summary>
 Make a TCP connection to the mon port.
 </summary>
@@ -40492,7 +32601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_client_packets" lineno="48475">
+<interface name="corenet_send_mon_client_packets" lineno="37763">
 <summary>
 Send mon_client packets.
 </summary>
@@ -40503,7 +32612,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="37782">
 <summary>
 Do not audit attempts to send mon_client packets.
 </summary>
@@ -40514,7 +32623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48513">
+<interface name="corenet_receive_mon_client_packets" lineno="37801">
 <summary>
 Receive mon_client packets.
 </summary>
@@ -40525,7 +32634,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="37820">
 <summary>
 Do not audit attempts to receive mon_client packets.
 </summary>
@@ -40536,7 +32645,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48551">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="37839">
 <summary>
 Send and receive mon_client packets.
 </summary>
@@ -40547,7 +32656,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="37855">
 <summary>
 Do not audit attempts to send and receive mon_client packets.
 </summary>
@@ -40558,7 +32667,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48582">
+<interface name="corenet_relabelto_mon_client_packets" lineno="37870">
 <summary>
 Relabel packets to mon_client the packet type.
 </summary>
@@ -40568,7 +32677,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mon_server_packets" lineno="48602">
+<interface name="corenet_send_mon_server_packets" lineno="37890">
 <summary>
 Send mon_server packets.
 </summary>
@@ -40579,7 +32688,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="37909">
 <summary>
 Do not audit attempts to send mon_server packets.
 </summary>
@@ -40590,7 +32699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48640">
+<interface name="corenet_receive_mon_server_packets" lineno="37928">
 <summary>
 Receive mon_server packets.
 </summary>
@@ -40601,7 +32710,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="37947">
 <summary>
 Do not audit attempts to receive mon_server packets.
 </summary>
@@ -40612,7 +32721,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48678">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="37966">
 <summary>
 Send and receive mon_server packets.
 </summary>
@@ -40623,7 +32732,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="37982">
 <summary>
 Do not audit attempts to send and receive mon_server packets.
 </summary>
@@ -40634,7 +32743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48709">
+<interface name="corenet_relabelto_mon_server_packets" lineno="37997">
 <summary>
 Relabel packets to mon_server the packet type.
 </summary>
@@ -40644,85 +32753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731">
-<summary>
-Send and receive TCP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_monit_port" lineno="48746">
-<summary>
-Send UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761">
-<summary>
-Do not audit attempts to send UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48776">
-<summary>
-Receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791">
-<summary>
-Do not audit attempts to receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48806">
-<summary>
-Send and receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48837">
+<interface name="corenet_tcp_bind_monit_port" lineno="38019">
 <summary>
 Bind TCP sockets to the monit port.
 </summary>
@@ -40733,7 +32764,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48857">
+<interface name="corenet_udp_bind_monit_port" lineno="38039">
 <summary>
 Bind UDP sockets to the monit port.
 </summary>
@@ -40744,7 +32775,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48876">
+<interface name="corenet_tcp_connect_monit_port" lineno="38058">
 <summary>
 Make a TCP connection to the monit port.
 </summary>
@@ -40754,7 +32785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_client_packets" lineno="48896">
+<interface name="corenet_send_monit_client_packets" lineno="38078">
 <summary>
 Send monit_client packets.
 </summary>
@@ -40765,7 +32796,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="38097">
 <summary>
 Do not audit attempts to send monit_client packets.
 </summary>
@@ -40776,7 +32807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48934">
+<interface name="corenet_receive_monit_client_packets" lineno="38116">
 <summary>
 Receive monit_client packets.
 </summary>
@@ -40787,7 +32818,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="38135">
 <summary>
 Do not audit attempts to receive monit_client packets.
 </summary>
@@ -40798,7 +32829,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48972">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="38154">
 <summary>
 Send and receive monit_client packets.
 </summary>
@@ -40809,7 +32840,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="38170">
 <summary>
 Do not audit attempts to send and receive monit_client packets.
 </summary>
@@ -40820,7 +32851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="49003">
+<interface name="corenet_relabelto_monit_client_packets" lineno="38185">
 <summary>
 Relabel packets to monit_client the packet type.
 </summary>
@@ -40830,7 +32861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monit_server_packets" lineno="49023">
+<interface name="corenet_send_monit_server_packets" lineno="38205">
 <summary>
 Send monit_server packets.
 </summary>
@@ -40841,7 +32872,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="38224">
 <summary>
 Do not audit attempts to send monit_server packets.
 </summary>
@@ -40852,7 +32883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monit_server_packets" lineno="49061">
+<interface name="corenet_receive_monit_server_packets" lineno="38243">
 <summary>
 Receive monit_server packets.
 </summary>
@@ -40863,7 +32894,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="38262">
 <summary>
 Do not audit attempts to receive monit_server packets.
 </summary>
@@ -40874,7 +32905,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="49099">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="38281">
 <summary>
 Send and receive monit_server packets.
 </summary>
@@ -40885,7 +32916,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="38297">
 <summary>
 Do not audit attempts to send and receive monit_server packets.
 </summary>
@@ -40896,7 +32927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="49130">
+<interface name="corenet_relabelto_monit_server_packets" lineno="38312">
 <summary>
 Relabel packets to monit_server the packet type.
 </summary>
@@ -40906,85 +32937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152">
-<summary>
-Send and receive TCP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49167">
-<summary>
-Send UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182">
-<summary>
-Do not audit attempts to send UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49197">
-<summary>
-Receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212">
-<summary>
-Do not audit attempts to receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227">
-<summary>
-Send and receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49258">
+<interface name="corenet_tcp_bind_monopd_port" lineno="38334">
 <summary>
 Bind TCP sockets to the monopd port.
 </summary>
@@ -40995,7 +32948,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49278">
+<interface name="corenet_udp_bind_monopd_port" lineno="38354">
 <summary>
 Bind UDP sockets to the monopd port.
 </summary>
@@ -41006,7 +32959,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49297">
+<interface name="corenet_tcp_connect_monopd_port" lineno="38373">
 <summary>
 Make a TCP connection to the monopd port.
 </summary>
@@ -41016,7 +32969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49317">
+<interface name="corenet_send_monopd_client_packets" lineno="38393">
 <summary>
 Send monopd_client packets.
 </summary>
@@ -41027,7 +32980,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="38412">
 <summary>
 Do not audit attempts to send monopd_client packets.
 </summary>
@@ -41038,7 +32991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49355">
+<interface name="corenet_receive_monopd_client_packets" lineno="38431">
 <summary>
 Receive monopd_client packets.
 </summary>
@@ -41049,7 +33002,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="38450">
 <summary>
 Do not audit attempts to receive monopd_client packets.
 </summary>
@@ -41060,7 +33013,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="38469">
 <summary>
 Send and receive monopd_client packets.
 </summary>
@@ -41071,7 +33024,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="38485">
 <summary>
 Do not audit attempts to send and receive monopd_client packets.
 </summary>
@@ -41082,7 +33035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49424">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="38500">
 <summary>
 Relabel packets to monopd_client the packet type.
 </summary>
@@ -41092,7 +33045,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49444">
+<interface name="corenet_send_monopd_server_packets" lineno="38520">
 <summary>
 Send monopd_server packets.
 </summary>
@@ -41103,7 +33056,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="38539">
 <summary>
 Do not audit attempts to send monopd_server packets.
 </summary>
@@ -41114,7 +33067,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49482">
+<interface name="corenet_receive_monopd_server_packets" lineno="38558">
 <summary>
 Receive monopd_server packets.
 </summary>
@@ -41125,7 +33078,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="38577">
 <summary>
 Do not audit attempts to receive monopd_server packets.
 </summary>
@@ -41136,7 +33089,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="38596">
 <summary>
 Send and receive monopd_server packets.
 </summary>
@@ -41147,7 +33100,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="38612">
 <summary>
 Do not audit attempts to send and receive monopd_server packets.
 </summary>
@@ -41158,7 +33111,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49551">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="38627">
 <summary>
 Relabel packets to monopd_server the packet type.
 </summary>
@@ -41168,85 +33121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573">
-<summary>
-Send and receive TCP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49588">
-<summary>
-Send UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603">
-<summary>
-Do not audit attempts to send UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49618">
-<summary>
-Receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633">
-<summary>
-Do not audit attempts to receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648">
-<summary>
-Send and receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49679">
+<interface name="corenet_tcp_bind_mountd_port" lineno="38649">
 <summary>
 Bind TCP sockets to the mountd port.
 </summary>
@@ -41257,7 +33132,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49699">
+<interface name="corenet_udp_bind_mountd_port" lineno="38669">
 <summary>
 Bind UDP sockets to the mountd port.
 </summary>
@@ -41268,7 +33143,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49718">
+<interface name="corenet_tcp_connect_mountd_port" lineno="38688">
 <summary>
 Make a TCP connection to the mountd port.
 </summary>
@@ -41278,7 +33153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49738">
+<interface name="corenet_send_mountd_client_packets" lineno="38708">
 <summary>
 Send mountd_client packets.
 </summary>
@@ -41289,7 +33164,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="38727">
 <summary>
 Do not audit attempts to send mountd_client packets.
 </summary>
@@ -41300,7 +33175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49776">
+<interface name="corenet_receive_mountd_client_packets" lineno="38746">
 <summary>
 Receive mountd_client packets.
 </summary>
@@ -41311,7 +33186,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="38765">
 <summary>
 Do not audit attempts to receive mountd_client packets.
 </summary>
@@ -41322,7 +33197,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="38784">
 <summary>
 Send and receive mountd_client packets.
 </summary>
@@ -41333,7 +33208,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="38800">
 <summary>
 Do not audit attempts to send and receive mountd_client packets.
 </summary>
@@ -41344,7 +33219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49845">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="38815">
 <summary>
 Relabel packets to mountd_client the packet type.
 </summary>
@@ -41354,7 +33229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49865">
+<interface name="corenet_send_mountd_server_packets" lineno="38835">
 <summary>
 Send mountd_server packets.
 </summary>
@@ -41365,7 +33240,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="38854">
 <summary>
 Do not audit attempts to send mountd_server packets.
 </summary>
@@ -41376,7 +33251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49903">
+<interface name="corenet_receive_mountd_server_packets" lineno="38873">
 <summary>
 Receive mountd_server packets.
 </summary>
@@ -41387,7 +33262,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="38892">
 <summary>
 Do not audit attempts to receive mountd_server packets.
 </summary>
@@ -41398,7 +33273,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="38911">
 <summary>
 Send and receive mountd_server packets.
 </summary>
@@ -41409,7 +33284,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="38927">
 <summary>
 Do not audit attempts to send and receive mountd_server packets.
 </summary>
@@ -41420,7 +33295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49972">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="38942">
 <summary>
 Relabel packets to mountd_server the packet type.
 </summary>
@@ -41430,85 +33305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994">
-<summary>
-Send and receive TCP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009">
-<summary>
-Send UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024">
-<summary>
-Do not audit attempts to send UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039">
-<summary>
-Receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054">
-<summary>
-Do not audit attempts to receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069">
-<summary>
-Send and receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="38964">
 <summary>
 Bind TCP sockets to the movaz_ssc port.
 </summary>
@@ -41519,7 +33316,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="38984">
 <summary>
 Bind UDP sockets to the movaz_ssc port.
 </summary>
@@ -41530,7 +33327,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="39003">
 <summary>
 Make a TCP connection to the movaz_ssc port.
 </summary>
@@ -41540,7 +33337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="39023">
 <summary>
 Send movaz_ssc_client packets.
 </summary>
@@ -41551,7 +33348,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="39042">
 <summary>
 Do not audit attempts to send movaz_ssc_client packets.
 </summary>
@@ -41562,7 +33359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="39061">
 <summary>
 Receive movaz_ssc_client packets.
 </summary>
@@ -41573,7 +33370,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="39080">
 <summary>
 Do not audit attempts to receive movaz_ssc_client packets.
 </summary>
@@ -41584,7 +33381,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="39099">
 <summary>
 Send and receive movaz_ssc_client packets.
 </summary>
@@ -41595,7 +33392,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="39115">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_client packets.
 </summary>
@@ -41606,7 +33403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="39130">
 <summary>
 Relabel packets to movaz_ssc_client the packet type.
 </summary>
@@ -41616,7 +33413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="39150">
 <summary>
 Send movaz_ssc_server packets.
 </summary>
@@ -41627,7 +33424,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="39169">
 <summary>
 Do not audit attempts to send movaz_ssc_server packets.
 </summary>
@@ -41638,7 +33435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="39188">
 <summary>
 Receive movaz_ssc_server packets.
 </summary>
@@ -41649,7 +33446,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="39207">
 <summary>
 Do not audit attempts to receive movaz_ssc_server packets.
 </summary>
@@ -41660,7 +33457,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="39226">
 <summary>
 Send and receive movaz_ssc_server packets.
 </summary>
@@ -41671,7 +33468,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="39242">
 <summary>
 Do not audit attempts to send and receive movaz_ssc_server packets.
 </summary>
@@ -41682,7 +33479,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="39257">
 <summary>
 Relabel packets to movaz_ssc_server the packet type.
 </summary>
@@ -41692,85 +33489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415">
-<summary>
-Send and receive TCP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50430">
-<summary>
-Send UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445">
-<summary>
-Do not audit attempts to send UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50460">
-<summary>
-Receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475">
-<summary>
-Do not audit attempts to receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490">
-<summary>
-Send and receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50521">
+<interface name="corenet_tcp_bind_mpd_port" lineno="39279">
 <summary>
 Bind TCP sockets to the mpd port.
 </summary>
@@ -41781,7 +33500,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50541">
+<interface name="corenet_udp_bind_mpd_port" lineno="39299">
 <summary>
 Bind UDP sockets to the mpd port.
 </summary>
@@ -41792,7 +33511,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50560">
+<interface name="corenet_tcp_connect_mpd_port" lineno="39318">
 <summary>
 Make a TCP connection to the mpd port.
 </summary>
@@ -41802,7 +33521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50580">
+<interface name="corenet_send_mpd_client_packets" lineno="39338">
 <summary>
 Send mpd_client packets.
 </summary>
@@ -41813,7 +33532,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="39357">
 <summary>
 Do not audit attempts to send mpd_client packets.
 </summary>
@@ -41824,7 +33543,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50618">
+<interface name="corenet_receive_mpd_client_packets" lineno="39376">
 <summary>
 Receive mpd_client packets.
 </summary>
@@ -41835,7 +33554,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="39395">
 <summary>
 Do not audit attempts to receive mpd_client packets.
 </summary>
@@ -41846,7 +33565,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="39414">
 <summary>
 Send and receive mpd_client packets.
 </summary>
@@ -41857,7 +33576,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="39430">
 <summary>
 Do not audit attempts to send and receive mpd_client packets.
 </summary>
@@ -41868,7 +33587,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50687">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="39445">
 <summary>
 Relabel packets to mpd_client the packet type.
 </summary>
@@ -41878,7 +33597,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50707">
+<interface name="corenet_send_mpd_server_packets" lineno="39465">
 <summary>
 Send mpd_server packets.
 </summary>
@@ -41889,7 +33608,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="39484">
 <summary>
 Do not audit attempts to send mpd_server packets.
 </summary>
@@ -41900,7 +33619,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50745">
+<interface name="corenet_receive_mpd_server_packets" lineno="39503">
 <summary>
 Receive mpd_server packets.
 </summary>
@@ -41911,7 +33630,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="39522">
 <summary>
 Do not audit attempts to receive mpd_server packets.
 </summary>
@@ -41922,7 +33641,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="39541">
 <summary>
 Send and receive mpd_server packets.
 </summary>
@@ -41933,7 +33652,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="39557">
 <summary>
 Do not audit attempts to send and receive mpd_server packets.
 </summary>
@@ -41944,7 +33663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50814">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="39572">
 <summary>
 Relabel packets to mpd_server the packet type.
 </summary>
@@ -41954,85 +33673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836">
-<summary>
-Send and receive TCP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50851">
-<summary>
-Send UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866">
-<summary>
-Do not audit attempts to send UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881">
-<summary>
-Receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896">
-<summary>
-Do not audit attempts to receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911">
-<summary>
-Send and receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="39594">
 <summary>
 Bind TCP sockets to the msgsrvr port.
 </summary>
@@ -42043,7 +33684,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="39614">
 <summary>
 Bind UDP sockets to the msgsrvr port.
 </summary>
@@ -42054,7 +33695,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="39633">
 <summary>
 Make a TCP connection to the msgsrvr port.
 </summary>
@@ -42064,7 +33705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="51001">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="39653">
 <summary>
 Send msgsrvr_client packets.
 </summary>
@@ -42075,7 +33716,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="39672">
 <summary>
 Do not audit attempts to send msgsrvr_client packets.
 </summary>
@@ -42086,7 +33727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="39691">
 <summary>
 Receive msgsrvr_client packets.
 </summary>
@@ -42097,7 +33738,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="39710">
 <summary>
 Do not audit attempts to receive msgsrvr_client packets.
 </summary>
@@ -42108,7 +33749,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="39729">
 <summary>
 Send and receive msgsrvr_client packets.
 </summary>
@@ -42119,7 +33760,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="39745">
 <summary>
 Do not audit attempts to send and receive msgsrvr_client packets.
 </summary>
@@ -42130,7 +33771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="39760">
 <summary>
 Relabel packets to msgsrvr_client the packet type.
 </summary>
@@ -42140,7 +33781,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="51128">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="39780">
 <summary>
 Send msgsrvr_server packets.
 </summary>
@@ -42151,7 +33792,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="39799">
 <summary>
 Do not audit attempts to send msgsrvr_server packets.
 </summary>
@@ -42162,7 +33803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="39818">
 <summary>
 Receive msgsrvr_server packets.
 </summary>
@@ -42173,7 +33814,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="39837">
 <summary>
 Do not audit attempts to receive msgsrvr_server packets.
 </summary>
@@ -42184,7 +33825,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="39856">
 <summary>
 Send and receive msgsrvr_server packets.
 </summary>
@@ -42195,7 +33836,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="39872">
 <summary>
 Do not audit attempts to send and receive msgsrvr_server packets.
 </summary>
@@ -42206,7 +33847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="39887">
 <summary>
 Relabel packets to msgsrvr_server the packet type.
 </summary>
@@ -42216,85 +33857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257">
-<summary>
-Send and receive TCP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51272">
-<summary>
-Send UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287">
-<summary>
-Do not audit attempts to send UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51302">
-<summary>
-Receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317">
-<summary>
-Do not audit attempts to receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332">
-<summary>
-Send and receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51363">
+<interface name="corenet_tcp_bind_msnp_port" lineno="39909">
 <summary>
 Bind TCP sockets to the msnp port.
 </summary>
@@ -42305,7 +33868,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51383">
+<interface name="corenet_udp_bind_msnp_port" lineno="39929">
 <summary>
 Bind UDP sockets to the msnp port.
 </summary>
@@ -42316,7 +33879,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51402">
+<interface name="corenet_tcp_connect_msnp_port" lineno="39948">
 <summary>
 Make a TCP connection to the msnp port.
 </summary>
@@ -42326,7 +33889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51422">
+<interface name="corenet_send_msnp_client_packets" lineno="39968">
 <summary>
 Send msnp_client packets.
 </summary>
@@ -42337,7 +33900,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="39987">
 <summary>
 Do not audit attempts to send msnp_client packets.
 </summary>
@@ -42348,7 +33911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51460">
+<interface name="corenet_receive_msnp_client_packets" lineno="40006">
 <summary>
 Receive msnp_client packets.
 </summary>
@@ -42359,7 +33922,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="40025">
 <summary>
 Do not audit attempts to receive msnp_client packets.
 </summary>
@@ -42370,7 +33933,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="40044">
 <summary>
 Send and receive msnp_client packets.
 </summary>
@@ -42381,7 +33944,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="40060">
 <summary>
 Do not audit attempts to send and receive msnp_client packets.
 </summary>
@@ -42392,7 +33955,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51529">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="40075">
 <summary>
 Relabel packets to msnp_client the packet type.
 </summary>
@@ -42402,7 +33965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51549">
+<interface name="corenet_send_msnp_server_packets" lineno="40095">
 <summary>
 Send msnp_server packets.
 </summary>
@@ -42413,7 +33976,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="40114">
 <summary>
 Do not audit attempts to send msnp_server packets.
 </summary>
@@ -42424,7 +33987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51587">
+<interface name="corenet_receive_msnp_server_packets" lineno="40133">
 <summary>
 Receive msnp_server packets.
 </summary>
@@ -42435,7 +33998,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="40152">
 <summary>
 Do not audit attempts to receive msnp_server packets.
 </summary>
@@ -42446,7 +34009,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="40171">
 <summary>
 Send and receive msnp_server packets.
 </summary>
@@ -42457,7 +34020,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="40187">
 <summary>
 Do not audit attempts to send and receive msnp_server packets.
 </summary>
@@ -42468,7 +34031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51656">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="40202">
 <summary>
 Relabel packets to msnp_server the packet type.
 </summary>
@@ -42478,85 +34041,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678">
-<summary>
-Send and receive TCP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51693">
-<summary>
-Send UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708">
-<summary>
-Do not audit attempts to send UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51723">
-<summary>
-Receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738">
-<summary>
-Do not audit attempts to receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753">
-<summary>
-Send and receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51784">
+<interface name="corenet_tcp_bind_mssql_port" lineno="40224">
 <summary>
 Bind TCP sockets to the mssql port.
 </summary>
@@ -42567,7 +34052,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51804">
+<interface name="corenet_udp_bind_mssql_port" lineno="40244">
 <summary>
 Bind UDP sockets to the mssql port.
 </summary>
@@ -42578,7 +34063,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51823">
+<interface name="corenet_tcp_connect_mssql_port" lineno="40263">
 <summary>
 Make a TCP connection to the mssql port.
 </summary>
@@ -42588,7 +34073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51843">
+<interface name="corenet_send_mssql_client_packets" lineno="40283">
 <summary>
 Send mssql_client packets.
 </summary>
@@ -42599,7 +34084,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="40302">
 <summary>
 Do not audit attempts to send mssql_client packets.
 </summary>
@@ -42610,7 +34095,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51881">
+<interface name="corenet_receive_mssql_client_packets" lineno="40321">
 <summary>
 Receive mssql_client packets.
 </summary>
@@ -42621,7 +34106,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="40340">
 <summary>
 Do not audit attempts to receive mssql_client packets.
 </summary>
@@ -42632,7 +34117,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="40359">
 <summary>
 Send and receive mssql_client packets.
 </summary>
@@ -42643,7 +34128,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="40375">
 <summary>
 Do not audit attempts to send and receive mssql_client packets.
 </summary>
@@ -42654,7 +34139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51950">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="40390">
 <summary>
 Relabel packets to mssql_client the packet type.
 </summary>
@@ -42664,7 +34149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51970">
+<interface name="corenet_send_mssql_server_packets" lineno="40410">
 <summary>
 Send mssql_server packets.
 </summary>
@@ -42675,7 +34160,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="40429">
 <summary>
 Do not audit attempts to send mssql_server packets.
 </summary>
@@ -42686,7 +34171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="52008">
+<interface name="corenet_receive_mssql_server_packets" lineno="40448">
 <summary>
 Receive mssql_server packets.
 </summary>
@@ -42697,7 +34182,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="40467">
 <summary>
 Do not audit attempts to receive mssql_server packets.
 </summary>
@@ -42708,7 +34193,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="40486">
 <summary>
 Send and receive mssql_server packets.
 </summary>
@@ -42719,7 +34204,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="40502">
 <summary>
 Do not audit attempts to send and receive mssql_server packets.
 </summary>
@@ -42730,7 +34215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="52077">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="40517">
 <summary>
 Relabel packets to mssql_server the packet type.
 </summary>
@@ -42740,85 +34225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099">
-<summary>
-Send and receive TCP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="52114">
-<summary>
-Send UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129">
-<summary>
-Do not audit attempts to send UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144">
-<summary>
-Receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159">
-<summary>
-Do not audit attempts to receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174">
-<summary>
-Send and receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="40539">
 <summary>
 Bind TCP sockets to the ms_streaming port.
 </summary>
@@ -42829,7 +34236,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="40559">
 <summary>
 Bind UDP sockets to the ms_streaming port.
 </summary>
@@ -42840,7 +34247,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="40578">
 <summary>
 Make a TCP connection to the ms_streaming port.
 </summary>
@@ -42850,7 +34257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52264">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="40598">
 <summary>
 Send ms_streaming_client packets.
 </summary>
@@ -42861,7 +34268,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="40617">
 <summary>
 Do not audit attempts to send ms_streaming_client packets.
 </summary>
@@ -42872,7 +34279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="40636">
 <summary>
 Receive ms_streaming_client packets.
 </summary>
@@ -42883,7 +34290,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="40655">
 <summary>
 Do not audit attempts to receive ms_streaming_client packets.
 </summary>
@@ -42894,7 +34301,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="40674">
 <summary>
 Send and receive ms_streaming_client packets.
 </summary>
@@ -42905,7 +34312,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="40690">
 <summary>
 Do not audit attempts to send and receive ms_streaming_client packets.
 </summary>
@@ -42916,7 +34323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="40705">
 <summary>
 Relabel packets to ms_streaming_client the packet type.
 </summary>
@@ -42926,7 +34333,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52391">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="40725">
 <summary>
 Send ms_streaming_server packets.
 </summary>
@@ -42937,7 +34344,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="40744">
 <summary>
 Do not audit attempts to send ms_streaming_server packets.
 </summary>
@@ -42948,7 +34355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="40763">
 <summary>
 Receive ms_streaming_server packets.
 </summary>
@@ -42959,7 +34366,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="40782">
 <summary>
 Do not audit attempts to receive ms_streaming_server packets.
 </summary>
@@ -42970,7 +34377,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="40801">
 <summary>
 Send and receive ms_streaming_server packets.
 </summary>
@@ -42981,7 +34388,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="40817">
 <summary>
 Do not audit attempts to send and receive ms_streaming_server packets.
 </summary>
@@ -42992,7 +34399,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="40832">
 <summary>
 Relabel packets to ms_streaming_server the packet type.
 </summary>
@@ -43002,85 +34409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520">
-<summary>
-Send and receive TCP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_munin_port" lineno="52535">
-<summary>
-Send UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550">
-<summary>
-Do not audit attempts to send UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52565">
-<summary>
-Receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580">
-<summary>
-Do not audit attempts to receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52595">
-<summary>
-Send and receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52626">
+<interface name="corenet_tcp_bind_munin_port" lineno="40854">
 <summary>
 Bind TCP sockets to the munin port.
 </summary>
@@ -43091,7 +34420,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52646">
+<interface name="corenet_udp_bind_munin_port" lineno="40874">
 <summary>
 Bind UDP sockets to the munin port.
 </summary>
@@ -43102,7 +34431,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52665">
+<interface name="corenet_tcp_connect_munin_port" lineno="40893">
 <summary>
 Make a TCP connection to the munin port.
 </summary>
@@ -43112,7 +34441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_client_packets" lineno="52685">
+<interface name="corenet_send_munin_client_packets" lineno="40913">
 <summary>
 Send munin_client packets.
 </summary>
@@ -43123,7 +34452,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="40932">
 <summary>
 Do not audit attempts to send munin_client packets.
 </summary>
@@ -43134,7 +34463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52723">
+<interface name="corenet_receive_munin_client_packets" lineno="40951">
 <summary>
 Receive munin_client packets.
 </summary>
@@ -43145,7 +34474,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="40970">
 <summary>
 Do not audit attempts to receive munin_client packets.
 </summary>
@@ -43156,7 +34485,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52761">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="40989">
 <summary>
 Send and receive munin_client packets.
 </summary>
@@ -43167,7 +34496,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="41005">
 <summary>
 Do not audit attempts to send and receive munin_client packets.
 </summary>
@@ -43178,7 +34507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52792">
+<interface name="corenet_relabelto_munin_client_packets" lineno="41020">
 <summary>
 Relabel packets to munin_client the packet type.
 </summary>
@@ -43188,7 +34517,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_munin_server_packets" lineno="52812">
+<interface name="corenet_send_munin_server_packets" lineno="41040">
 <summary>
 Send munin_server packets.
 </summary>
@@ -43199,7 +34528,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="41059">
 <summary>
 Do not audit attempts to send munin_server packets.
 </summary>
@@ -43210,7 +34539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52850">
+<interface name="corenet_receive_munin_server_packets" lineno="41078">
 <summary>
 Receive munin_server packets.
 </summary>
@@ -43221,7 +34550,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="41097">
 <summary>
 Do not audit attempts to receive munin_server packets.
 </summary>
@@ -43232,7 +34561,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52888">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="41116">
 <summary>
 Send and receive munin_server packets.
 </summary>
@@ -43243,7 +34572,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="41132">
 <summary>
 Do not audit attempts to send and receive munin_server packets.
 </summary>
@@ -43254,7 +34583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52919">
+<interface name="corenet_relabelto_munin_server_packets" lineno="41147">
 <summary>
 Relabel packets to munin_server the packet type.
 </summary>
@@ -43264,85 +34593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941">
-<summary>
-Send and receive TCP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52956">
-<summary>
-Send UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971">
-<summary>
-Do not audit attempts to send UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52986">
-<summary>
-Receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001">
-<summary>
-Do not audit attempts to receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016">
-<summary>
-Send and receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="53047">
+<interface name="corenet_tcp_bind_mxi_port" lineno="41169">
 <summary>
 Bind TCP sockets to the mxi port.
 </summary>
@@ -43353,7 +34604,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="53067">
+<interface name="corenet_udp_bind_mxi_port" lineno="41189">
 <summary>
 Bind UDP sockets to the mxi port.
 </summary>
@@ -43364,7 +34615,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="53086">
+<interface name="corenet_tcp_connect_mxi_port" lineno="41208">
 <summary>
 Make a TCP connection to the mxi port.
 </summary>
@@ -43374,7 +34625,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_client_packets" lineno="53106">
+<interface name="corenet_send_mxi_client_packets" lineno="41228">
 <summary>
 Send mxi_client packets.
 </summary>
@@ -43385,7 +34636,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="41247">
 <summary>
 Do not audit attempts to send mxi_client packets.
 </summary>
@@ -43396,7 +34647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53144">
+<interface name="corenet_receive_mxi_client_packets" lineno="41266">
 <summary>
 Receive mxi_client packets.
 </summary>
@@ -43407,7 +34658,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="41285">
 <summary>
 Do not audit attempts to receive mxi_client packets.
 </summary>
@@ -43418,7 +34669,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="41304">
 <summary>
 Send and receive mxi_client packets.
 </summary>
@@ -43429,7 +34680,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="41320">
 <summary>
 Do not audit attempts to send and receive mxi_client packets.
 </summary>
@@ -43440,7 +34691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53213">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="41335">
 <summary>
 Relabel packets to mxi_client the packet type.
 </summary>
@@ -43450,7 +34701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53233">
+<interface name="corenet_send_mxi_server_packets" lineno="41355">
 <summary>
 Send mxi_server packets.
 </summary>
@@ -43461,7 +34712,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="41374">
 <summary>
 Do not audit attempts to send mxi_server packets.
 </summary>
@@ -43472,7 +34723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53271">
+<interface name="corenet_receive_mxi_server_packets" lineno="41393">
 <summary>
 Receive mxi_server packets.
 </summary>
@@ -43483,7 +34734,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="41412">
 <summary>
 Do not audit attempts to receive mxi_server packets.
 </summary>
@@ -43494,7 +34745,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="41431">
 <summary>
 Send and receive mxi_server packets.
 </summary>
@@ -43505,7 +34756,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="41447">
 <summary>
 Do not audit attempts to send and receive mxi_server packets.
 </summary>
@@ -43516,7 +34767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53340">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="41462">
 <summary>
 Relabel packets to mxi_server the packet type.
 </summary>
@@ -43526,85 +34777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362">
-<summary>
-Send and receive TCP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53377">
-<summary>
-Send UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392">
-<summary>
-Do not audit attempts to send UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53407">
-<summary>
-Receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422">
-<summary>
-Do not audit attempts to receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437">
-<summary>
-Send and receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53468">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="41484">
 <summary>
 Bind TCP sockets to the mysqld port.
 </summary>
@@ -43615,7 +34788,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53488">
+<interface name="corenet_udp_bind_mysqld_port" lineno="41504">
 <summary>
 Bind UDP sockets to the mysqld port.
 </summary>
@@ -43626,7 +34799,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53507">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="41523">
 <summary>
 Make a TCP connection to the mysqld port.
 </summary>
@@ -43636,7 +34809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53527">
+<interface name="corenet_send_mysqld_client_packets" lineno="41543">
 <summary>
 Send mysqld_client packets.
 </summary>
@@ -43647,7 +34820,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="41562">
 <summary>
 Do not audit attempts to send mysqld_client packets.
 </summary>
@@ -43658,7 +34831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53565">
+<interface name="corenet_receive_mysqld_client_packets" lineno="41581">
 <summary>
 Receive mysqld_client packets.
 </summary>
@@ -43669,7 +34842,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="41600">
 <summary>
 Do not audit attempts to receive mysqld_client packets.
 </summary>
@@ -43680,7 +34853,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="41619">
 <summary>
 Send and receive mysqld_client packets.
 </summary>
@@ -43691,7 +34864,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="41635">
 <summary>
 Do not audit attempts to send and receive mysqld_client packets.
 </summary>
@@ -43702,7 +34875,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="41650">
 <summary>
 Relabel packets to mysqld_client the packet type.
 </summary>
@@ -43712,7 +34885,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53654">
+<interface name="corenet_send_mysqld_server_packets" lineno="41670">
 <summary>
 Send mysqld_server packets.
 </summary>
@@ -43723,7 +34896,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="41689">
 <summary>
 Do not audit attempts to send mysqld_server packets.
 </summary>
@@ -43734,7 +34907,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53692">
+<interface name="corenet_receive_mysqld_server_packets" lineno="41708">
 <summary>
 Receive mysqld_server packets.
 </summary>
@@ -43745,7 +34918,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="41727">
 <summary>
 Do not audit attempts to receive mysqld_server packets.
 </summary>
@@ -43756,7 +34929,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="41746">
 <summary>
 Send and receive mysqld_server packets.
 </summary>
@@ -43767,7 +34940,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="41762">
 <summary>
 Do not audit attempts to send and receive mysqld_server packets.
 </summary>
@@ -43778,7 +34951,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="41777">
 <summary>
 Relabel packets to mysqld_server the packet type.
 </summary>
@@ -43788,85 +34961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783">
-<summary>
-Send and receive TCP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798">
-<summary>
-Send UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813">
-<summary>
-Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828">
-<summary>
-Receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843">
-<summary>
-Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858">
-<summary>
-Send and receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="41799">
 <summary>
 Bind TCP sockets to the mysqlmanagerd port.
 </summary>
@@ -43877,7 +34972,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="41819">
 <summary>
 Bind UDP sockets to the mysqlmanagerd port.
 </summary>
@@ -43888,7 +34983,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="41838">
 <summary>
 Make a TCP connection to the mysqlmanagerd port.
 </summary>
@@ -43898,7 +34993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="41858">
 <summary>
 Send mysqlmanagerd_client packets.
 </summary>
@@ -43909,7 +35004,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="41877">
 <summary>
 Do not audit attempts to send mysqlmanagerd_client packets.
 </summary>
@@ -43920,7 +35015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="41896">
 <summary>
 Receive mysqlmanagerd_client packets.
 </summary>
@@ -43931,7 +35026,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="41915">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_client packets.
 </summary>
@@ -43942,7 +35037,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="41934">
 <summary>
 Send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43953,7 +35048,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="41950">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_client packets.
 </summary>
@@ -43964,7 +35059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="41965">
 <summary>
 Relabel packets to mysqlmanagerd_client the packet type.
 </summary>
@@ -43974,7 +35069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="41985">
 <summary>
 Send mysqlmanagerd_server packets.
 </summary>
@@ -43985,7 +35080,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="42004">
 <summary>
 Do not audit attempts to send mysqlmanagerd_server packets.
 </summary>
@@ -43996,7 +35091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="42023">
 <summary>
 Receive mysqlmanagerd_server packets.
 </summary>
@@ -44007,7 +35102,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="42042">
 <summary>
 Do not audit attempts to receive mysqlmanagerd_server packets.
 </summary>
@@ -44018,7 +35113,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="42061">
 <summary>
 Send and receive mysqlmanagerd_server packets.
 </summary>
@@ -44029,7 +35124,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="42077">
 <summary>
 Do not audit attempts to send and receive mysqlmanagerd_server packets.
 </summary>
@@ -44040,7 +35135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="42092">
 <summary>
 Relabel packets to mysqlmanagerd_server the packet type.
 </summary>
@@ -44050,85 +35145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204">
-<summary>
-Send and receive TCP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54219">
-<summary>
-Send UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234">
-<summary>
-Do not audit attempts to send UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54249">
-<summary>
-Receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264">
-<summary>
-Do not audit attempts to receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279">
-<summary>
-Send and receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54310">
+<interface name="corenet_tcp_bind_nessus_port" lineno="42114">
 <summary>
 Bind TCP sockets to the nessus port.
 </summary>
@@ -44139,7 +35156,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54330">
+<interface name="corenet_udp_bind_nessus_port" lineno="42134">
 <summary>
 Bind UDP sockets to the nessus port.
 </summary>
@@ -44150,7 +35167,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54349">
+<interface name="corenet_tcp_connect_nessus_port" lineno="42153">
 <summary>
 Make a TCP connection to the nessus port.
 </summary>
@@ -44160,7 +35177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54369">
+<interface name="corenet_send_nessus_client_packets" lineno="42173">
 <summary>
 Send nessus_client packets.
 </summary>
@@ -44171,7 +35188,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="42192">
 <summary>
 Do not audit attempts to send nessus_client packets.
 </summary>
@@ -44182,7 +35199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54407">
+<interface name="corenet_receive_nessus_client_packets" lineno="42211">
 <summary>
 Receive nessus_client packets.
 </summary>
@@ -44193,7 +35210,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="42230">
 <summary>
 Do not audit attempts to receive nessus_client packets.
 </summary>
@@ -44204,7 +35221,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="42249">
 <summary>
 Send and receive nessus_client packets.
 </summary>
@@ -44215,7 +35232,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="42265">
 <summary>
 Do not audit attempts to send and receive nessus_client packets.
 </summary>
@@ -44226,7 +35243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54476">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="42280">
 <summary>
 Relabel packets to nessus_client the packet type.
 </summary>
@@ -44236,7 +35253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54496">
+<interface name="corenet_send_nessus_server_packets" lineno="42300">
 <summary>
 Send nessus_server packets.
 </summary>
@@ -44247,7 +35264,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="42319">
 <summary>
 Do not audit attempts to send nessus_server packets.
 </summary>
@@ -44258,7 +35275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54534">
+<interface name="corenet_receive_nessus_server_packets" lineno="42338">
 <summary>
 Receive nessus_server packets.
 </summary>
@@ -44269,7 +35286,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="42357">
 <summary>
 Do not audit attempts to receive nessus_server packets.
 </summary>
@@ -44280,7 +35297,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="42376">
 <summary>
 Send and receive nessus_server packets.
 </summary>
@@ -44291,7 +35308,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="42392">
 <summary>
 Do not audit attempts to send and receive nessus_server packets.
 </summary>
@@ -44302,7 +35319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54603">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="42407">
 <summary>
 Relabel packets to nessus_server the packet type.
 </summary>
@@ -44312,85 +35329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625">
-<summary>
-Send and receive TCP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_netport_port" lineno="54640">
-<summary>
-Send UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655">
-<summary>
-Do not audit attempts to send UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54670">
-<summary>
-Receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685">
-<summary>
-Do not audit attempts to receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54700">
-<summary>
-Send and receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54731">
+<interface name="corenet_tcp_bind_netport_port" lineno="42429">
 <summary>
 Bind TCP sockets to the netport port.
 </summary>
@@ -44401,7 +35340,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54751">
+<interface name="corenet_udp_bind_netport_port" lineno="42449">
 <summary>
 Bind UDP sockets to the netport port.
 </summary>
@@ -44412,7 +35351,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54770">
+<interface name="corenet_tcp_connect_netport_port" lineno="42468">
 <summary>
 Make a TCP connection to the netport port.
 </summary>
@@ -44422,7 +35361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_client_packets" lineno="54790">
+<interface name="corenet_send_netport_client_packets" lineno="42488">
 <summary>
 Send netport_client packets.
 </summary>
@@ -44433,7 +35372,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="42507">
 <summary>
 Do not audit attempts to send netport_client packets.
 </summary>
@@ -44444,7 +35383,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54828">
+<interface name="corenet_receive_netport_client_packets" lineno="42526">
 <summary>
 Receive netport_client packets.
 </summary>
@@ -44455,7 +35394,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="42545">
 <summary>
 Do not audit attempts to receive netport_client packets.
 </summary>
@@ -44466,7 +35405,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54866">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="42564">
 <summary>
 Send and receive netport_client packets.
 </summary>
@@ -44477,7 +35416,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="42580">
 <summary>
 Do not audit attempts to send and receive netport_client packets.
 </summary>
@@ -44488,7 +35427,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54897">
+<interface name="corenet_relabelto_netport_client_packets" lineno="42595">
 <summary>
 Relabel packets to netport_client the packet type.
 </summary>
@@ -44498,7 +35437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netport_server_packets" lineno="54917">
+<interface name="corenet_send_netport_server_packets" lineno="42615">
 <summary>
 Send netport_server packets.
 </summary>
@@ -44509,7 +35448,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="42634">
 <summary>
 Do not audit attempts to send netport_server packets.
 </summary>
@@ -44520,7 +35459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54955">
+<interface name="corenet_receive_netport_server_packets" lineno="42653">
 <summary>
 Receive netport_server packets.
 </summary>
@@ -44531,7 +35470,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="42672">
 <summary>
 Do not audit attempts to receive netport_server packets.
 </summary>
@@ -44542,7 +35481,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54993">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="42691">
 <summary>
 Send and receive netport_server packets.
 </summary>
@@ -44553,7 +35492,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="42707">
 <summary>
 Do not audit attempts to send and receive netport_server packets.
 </summary>
@@ -44564,7 +35503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="55024">
+<interface name="corenet_relabelto_netport_server_packets" lineno="42722">
 <summary>
 Relabel packets to netport_server the packet type.
 </summary>
@@ -44574,85 +35513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046">
-<summary>
-Send and receive TCP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="55061">
-<summary>
-Send UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076">
-<summary>
-Do not audit attempts to send UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="55091">
-<summary>
-Receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106">
-<summary>
-Do not audit attempts to receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121">
-<summary>
-Send and receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55152">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="42744">
 <summary>
 Bind TCP sockets to the netsupport port.
 </summary>
@@ -44663,7 +35524,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55172">
+<interface name="corenet_udp_bind_netsupport_port" lineno="42764">
 <summary>
 Bind UDP sockets to the netsupport port.
 </summary>
@@ -44674,7 +35535,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55191">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="42783">
 <summary>
 Make a TCP connection to the netsupport port.
 </summary>
@@ -44684,7 +35545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55211">
+<interface name="corenet_send_netsupport_client_packets" lineno="42803">
 <summary>
 Send netsupport_client packets.
 </summary>
@@ -44695,7 +35556,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="42822">
 <summary>
 Do not audit attempts to send netsupport_client packets.
 </summary>
@@ -44706,7 +35567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55249">
+<interface name="corenet_receive_netsupport_client_packets" lineno="42841">
 <summary>
 Receive netsupport_client packets.
 </summary>
@@ -44717,7 +35578,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="42860">
 <summary>
 Do not audit attempts to receive netsupport_client packets.
 </summary>
@@ -44728,7 +35589,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="42879">
 <summary>
 Send and receive netsupport_client packets.
 </summary>
@@ -44739,7 +35600,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="42895">
 <summary>
 Do not audit attempts to send and receive netsupport_client packets.
 </summary>
@@ -44750,7 +35611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="42910">
 <summary>
 Relabel packets to netsupport_client the packet type.
 </summary>
@@ -44760,7 +35621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55338">
+<interface name="corenet_send_netsupport_server_packets" lineno="42930">
 <summary>
 Send netsupport_server packets.
 </summary>
@@ -44771,7 +35632,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="42949">
 <summary>
 Do not audit attempts to send netsupport_server packets.
 </summary>
@@ -44782,7 +35643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55376">
+<interface name="corenet_receive_netsupport_server_packets" lineno="42968">
 <summary>
 Receive netsupport_server packets.
 </summary>
@@ -44793,7 +35654,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="42987">
 <summary>
 Do not audit attempts to receive netsupport_server packets.
 </summary>
@@ -44804,7 +35665,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="43006">
 <summary>
 Send and receive netsupport_server packets.
 </summary>
@@ -44815,7 +35676,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="43022">
 <summary>
 Do not audit attempts to send and receive netsupport_server packets.
 </summary>
@@ -44826,7 +35687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="43037">
 <summary>
 Relabel packets to netsupport_server the packet type.
 </summary>
@@ -44836,85 +35697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467">
-<summary>
-Send and receive TCP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55482">
-<summary>
-Send UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497">
-<summary>
-Do not audit attempts to send UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55512">
-<summary>
-Receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527">
-<summary>
-Do not audit attempts to receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542">
-<summary>
-Send and receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55573">
+<interface name="corenet_tcp_bind_nfs_port" lineno="43059">
 <summary>
 Bind TCP sockets to the nfs port.
 </summary>
@@ -44925,7 +35708,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55593">
+<interface name="corenet_udp_bind_nfs_port" lineno="43079">
 <summary>
 Bind UDP sockets to the nfs port.
 </summary>
@@ -44936,7 +35719,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55612">
+<interface name="corenet_tcp_connect_nfs_port" lineno="43098">
 <summary>
 Make a TCP connection to the nfs port.
 </summary>
@@ -44946,7 +35729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55632">
+<interface name="corenet_send_nfs_client_packets" lineno="43118">
 <summary>
 Send nfs_client packets.
 </summary>
@@ -44957,7 +35740,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="43137">
 <summary>
 Do not audit attempts to send nfs_client packets.
 </summary>
@@ -44968,7 +35751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55670">
+<interface name="corenet_receive_nfs_client_packets" lineno="43156">
 <summary>
 Receive nfs_client packets.
 </summary>
@@ -44979,7 +35762,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="43175">
 <summary>
 Do not audit attempts to receive nfs_client packets.
 </summary>
@@ -44990,7 +35773,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="43194">
 <summary>
 Send and receive nfs_client packets.
 </summary>
@@ -45001,7 +35784,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="43210">
 <summary>
 Do not audit attempts to send and receive nfs_client packets.
 </summary>
@@ -45012,7 +35795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55739">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="43225">
 <summary>
 Relabel packets to nfs_client the packet type.
 </summary>
@@ -45022,7 +35805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55759">
+<interface name="corenet_send_nfs_server_packets" lineno="43245">
 <summary>
 Send nfs_server packets.
 </summary>
@@ -45033,7 +35816,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="43264">
 <summary>
 Do not audit attempts to send nfs_server packets.
 </summary>
@@ -45044,7 +35827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55797">
+<interface name="corenet_receive_nfs_server_packets" lineno="43283">
 <summary>
 Receive nfs_server packets.
 </summary>
@@ -45055,7 +35838,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="43302">
 <summary>
 Do not audit attempts to receive nfs_server packets.
 </summary>
@@ -45066,7 +35849,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="43321">
 <summary>
 Send and receive nfs_server packets.
 </summary>
@@ -45077,7 +35860,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="43337">
 <summary>
 Do not audit attempts to send and receive nfs_server packets.
 </summary>
@@ -45088,7 +35871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55866">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="43352">
 <summary>
 Relabel packets to nfs_server the packet type.
 </summary>
@@ -45098,85 +35881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888">
-<summary>
-Send and receive TCP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55903">
-<summary>
-Send UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918">
-<summary>
-Do not audit attempts to send UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933">
-<summary>
-Receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948">
-<summary>
-Do not audit attempts to receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963">
-<summary>
-Send and receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="43374">
 <summary>
 Bind TCP sockets to the nfsrdma port.
 </summary>
@@ -45187,7 +35892,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="43394">
 <summary>
 Bind UDP sockets to the nfsrdma port.
 </summary>
@@ -45198,7 +35903,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="43413">
 <summary>
 Make a TCP connection to the nfsrdma port.
 </summary>
@@ -45208,7 +35913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="56053">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="43433">
 <summary>
 Send nfsrdma_client packets.
 </summary>
@@ -45219,7 +35924,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="43452">
 <summary>
 Do not audit attempts to send nfsrdma_client packets.
 </summary>
@@ -45230,7 +35935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="43471">
 <summary>
 Receive nfsrdma_client packets.
 </summary>
@@ -45241,7 +35946,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="43490">
 <summary>
 Do not audit attempts to receive nfsrdma_client packets.
 </summary>
@@ -45252,7 +35957,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="43509">
 <summary>
 Send and receive nfsrdma_client packets.
 </summary>
@@ -45263,7 +35968,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="43525">
 <summary>
 Do not audit attempts to send and receive nfsrdma_client packets.
 </summary>
@@ -45274,7 +35979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="43540">
 <summary>
 Relabel packets to nfsrdma_client the packet type.
 </summary>
@@ -45284,7 +35989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56180">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="43560">
 <summary>
 Send nfsrdma_server packets.
 </summary>
@@ -45295,7 +36000,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="43579">
 <summary>
 Do not audit attempts to send nfsrdma_server packets.
 </summary>
@@ -45306,7 +36011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="43598">
 <summary>
 Receive nfsrdma_server packets.
 </summary>
@@ -45317,7 +36022,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="43617">
 <summary>
 Do not audit attempts to receive nfsrdma_server packets.
 </summary>
@@ -45328,7 +36033,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="43636">
 <summary>
 Send and receive nfsrdma_server packets.
 </summary>
@@ -45339,7 +36044,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="43652">
 <summary>
 Do not audit attempts to send and receive nfsrdma_server packets.
 </summary>
@@ -45350,7 +36055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="43667">
 <summary>
 Relabel packets to nfsrdma_server the packet type.
 </summary>
@@ -45360,85 +36065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309">
-<summary>
-Send and receive TCP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56324">
-<summary>
-Send UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339">
-<summary>
-Do not audit attempts to send UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56354">
-<summary>
-Receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369">
-<summary>
-Do not audit attempts to receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384">
-<summary>
-Send and receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56415">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="43689">
 <summary>
 Bind TCP sockets to the nmbd port.
 </summary>
@@ -45449,7 +36076,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56435">
+<interface name="corenet_udp_bind_nmbd_port" lineno="43709">
 <summary>
 Bind UDP sockets to the nmbd port.
 </summary>
@@ -45460,7 +36087,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56454">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="43728">
 <summary>
 Make a TCP connection to the nmbd port.
 </summary>
@@ -45470,7 +36097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56474">
+<interface name="corenet_send_nmbd_client_packets" lineno="43748">
 <summary>
 Send nmbd_client packets.
 </summary>
@@ -45481,7 +36108,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="43767">
 <summary>
 Do not audit attempts to send nmbd_client packets.
 </summary>
@@ -45492,7 +36119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56512">
+<interface name="corenet_receive_nmbd_client_packets" lineno="43786">
 <summary>
 Receive nmbd_client packets.
 </summary>
@@ -45503,7 +36130,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="43805">
 <summary>
 Do not audit attempts to receive nmbd_client packets.
 </summary>
@@ -45514,7 +36141,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="43824">
 <summary>
 Send and receive nmbd_client packets.
 </summary>
@@ -45525,7 +36152,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="43840">
 <summary>
 Do not audit attempts to send and receive nmbd_client packets.
 </summary>
@@ -45536,7 +36163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="43855">
 <summary>
 Relabel packets to nmbd_client the packet type.
 </summary>
@@ -45546,7 +36173,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56601">
+<interface name="corenet_send_nmbd_server_packets" lineno="43875">
 <summary>
 Send nmbd_server packets.
 </summary>
@@ -45557,7 +36184,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="43894">
 <summary>
 Do not audit attempts to send nmbd_server packets.
 </summary>
@@ -45568,7 +36195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56639">
+<interface name="corenet_receive_nmbd_server_packets" lineno="43913">
 <summary>
 Receive nmbd_server packets.
 </summary>
@@ -45579,7 +36206,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="43932">
 <summary>
 Do not audit attempts to receive nmbd_server packets.
 </summary>
@@ -45590,7 +36217,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="43951">
 <summary>
 Send and receive nmbd_server packets.
 </summary>
@@ -45601,7 +36228,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="43967">
 <summary>
 Do not audit attempts to send and receive nmbd_server packets.
 </summary>
@@ -45612,7 +36239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="43982">
 <summary>
 Relabel packets to nmbd_server the packet type.
 </summary>
@@ -45622,85 +36249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730">
-<summary>
-Send and receive TCP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56745">
-<summary>
-Send UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760">
-<summary>
-Do not audit attempts to send UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56775">
-<summary>
-Receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805">
-<summary>
-Send and receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56836">
+<interface name="corenet_tcp_bind_ntop_port" lineno="44004">
 <summary>
 Bind TCP sockets to the ntop port.
 </summary>
@@ -45711,7 +36260,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56856">
+<interface name="corenet_udp_bind_ntop_port" lineno="44024">
 <summary>
 Bind UDP sockets to the ntop port.
 </summary>
@@ -45722,7 +36271,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56875">
+<interface name="corenet_tcp_connect_ntop_port" lineno="44043">
 <summary>
 Make a TCP connection to the ntop port.
 </summary>
@@ -45732,7 +36281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56895">
+<interface name="corenet_send_ntop_client_packets" lineno="44063">
 <summary>
 Send ntop_client packets.
 </summary>
@@ -45743,7 +36292,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="44082">
 <summary>
 Do not audit attempts to send ntop_client packets.
 </summary>
@@ -45754,7 +36303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56933">
+<interface name="corenet_receive_ntop_client_packets" lineno="44101">
 <summary>
 Receive ntop_client packets.
 </summary>
@@ -45765,7 +36314,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="44120">
 <summary>
 Do not audit attempts to receive ntop_client packets.
 </summary>
@@ -45776,7 +36325,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="44139">
 <summary>
 Send and receive ntop_client packets.
 </summary>
@@ -45787,7 +36336,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="44155">
 <summary>
 Do not audit attempts to send and receive ntop_client packets.
 </summary>
@@ -45798,7 +36347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="57002">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="44170">
 <summary>
 Relabel packets to ntop_client the packet type.
 </summary>
@@ -45808,7 +36357,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntop_server_packets" lineno="57022">
+<interface name="corenet_send_ntop_server_packets" lineno="44190">
 <summary>
 Send ntop_server packets.
 </summary>
@@ -45819,7 +36368,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="44209">
 <summary>
 Do not audit attempts to send ntop_server packets.
 </summary>
@@ -45830,7 +36379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="57060">
+<interface name="corenet_receive_ntop_server_packets" lineno="44228">
 <summary>
 Receive ntop_server packets.
 </summary>
@@ -45841,7 +36390,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="44247">
 <summary>
 Do not audit attempts to receive ntop_server packets.
 </summary>
@@ -45852,7 +36401,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="44266">
 <summary>
 Send and receive ntop_server packets.
 </summary>
@@ -45863,7 +36412,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="44282">
 <summary>
 Do not audit attempts to send and receive ntop_server packets.
 </summary>
@@ -45874,7 +36423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="57129">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="44297">
 <summary>
 Relabel packets to ntop_server the packet type.
 </summary>
@@ -45884,85 +36433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151">
-<summary>
-Send and receive TCP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57166">
-<summary>
-Send UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181">
-<summary>
-Do not audit attempts to send UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57196">
-<summary>
-Receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226">
-<summary>
-Send and receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57257">
+<interface name="corenet_tcp_bind_ntp_port" lineno="44319">
 <summary>
 Bind TCP sockets to the ntp port.
 </summary>
@@ -45973,7 +36444,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57277">
+<interface name="corenet_udp_bind_ntp_port" lineno="44339">
 <summary>
 Bind UDP sockets to the ntp port.
 </summary>
@@ -45984,7 +36455,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57296">
+<interface name="corenet_tcp_connect_ntp_port" lineno="44358">
 <summary>
 Make a TCP connection to the ntp port.
 </summary>
@@ -45994,7 +36465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57316">
+<interface name="corenet_send_ntp_client_packets" lineno="44378">
 <summary>
 Send ntp_client packets.
 </summary>
@@ -46005,7 +36476,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="44397">
 <summary>
 Do not audit attempts to send ntp_client packets.
 </summary>
@@ -46016,7 +36487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57354">
+<interface name="corenet_receive_ntp_client_packets" lineno="44416">
 <summary>
 Receive ntp_client packets.
 </summary>
@@ -46027,7 +36498,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="44435">
 <summary>
 Do not audit attempts to receive ntp_client packets.
 </summary>
@@ -46038,7 +36509,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="44454">
 <summary>
 Send and receive ntp_client packets.
 </summary>
@@ -46049,7 +36520,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="44470">
 <summary>
 Do not audit attempts to send and receive ntp_client packets.
 </summary>
@@ -46060,7 +36531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57423">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="44485">
 <summary>
 Relabel packets to ntp_client the packet type.
 </summary>
@@ -46070,7 +36541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57443">
+<interface name="corenet_send_ntp_server_packets" lineno="44505">
 <summary>
 Send ntp_server packets.
 </summary>
@@ -46081,7 +36552,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="44524">
 <summary>
 Do not audit attempts to send ntp_server packets.
 </summary>
@@ -46092,7 +36563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57481">
+<interface name="corenet_receive_ntp_server_packets" lineno="44543">
 <summary>
 Receive ntp_server packets.
 </summary>
@@ -46103,7 +36574,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="44562">
 <summary>
 Do not audit attempts to receive ntp_server packets.
 </summary>
@@ -46114,7 +36585,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="44581">
 <summary>
 Send and receive ntp_server packets.
 </summary>
@@ -46125,7 +36596,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="44597">
 <summary>
 Do not audit attempts to send and receive ntp_server packets.
 </summary>
@@ -46136,7 +36607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57550">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="44612">
 <summary>
 Relabel packets to ntp_server the packet type.
 </summary>
@@ -46146,85 +36617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572">
-<summary>
-Send and receive TCP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntske_port" lineno="57587">
-<summary>
-Send UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602">
-<summary>
-Do not audit attempts to send UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntske_port" lineno="57617">
-<summary>
-Receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647">
-<summary>
-Send and receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntske_port" lineno="57678">
+<interface name="corenet_tcp_bind_ntske_port" lineno="44634">
 <summary>
 Bind TCP sockets to the ntske port.
 </summary>
@@ -46235,7 +36628,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ntske_port" lineno="57698">
+<interface name="corenet_udp_bind_ntske_port" lineno="44654">
 <summary>
 Bind UDP sockets to the ntske port.
 </summary>
@@ -46246,7 +36639,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ntske_port" lineno="57717">
+<interface name="corenet_tcp_connect_ntske_port" lineno="44673">
 <summary>
 Make a TCP connection to the ntske port.
 </summary>
@@ -46256,7 +36649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntske_client_packets" lineno="57737">
+<interface name="corenet_send_ntske_client_packets" lineno="44693">
 <summary>
 Send ntske_client packets.
 </summary>
@@ -46267,7 +36660,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756">
+<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="44712">
 <summary>
 Do not audit attempts to send ntske_client packets.
 </summary>
@@ -46278,7 +36671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntske_client_packets" lineno="57775">
+<interface name="corenet_receive_ntske_client_packets" lineno="44731">
 <summary>
 Receive ntske_client packets.
 </summary>
@@ -46289,7 +36682,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794">
+<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="44750">
 <summary>
 Do not audit attempts to receive ntske_client packets.
 </summary>
@@ -46300,7 +36693,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813">
+<interface name="corenet_sendrecv_ntske_client_packets" lineno="44769">
 <summary>
 Send and receive ntske_client packets.
 </summary>
@@ -46311,7 +36704,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829">
+<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="44785">
 <summary>
 Do not audit attempts to send and receive ntske_client packets.
 </summary>
@@ -46322,7 +36715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntske_client_packets" lineno="57844">
+<interface name="corenet_relabelto_ntske_client_packets" lineno="44800">
 <summary>
 Relabel packets to ntske_client the packet type.
 </summary>
@@ -46332,7 +36725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ntske_server_packets" lineno="57864">
+<interface name="corenet_send_ntske_server_packets" lineno="44820">
 <summary>
 Send ntske_server packets.
 </summary>
@@ -46343,7 +36736,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883">
+<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="44839">
 <summary>
 Do not audit attempts to send ntske_server packets.
 </summary>
@@ -46354,7 +36747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ntske_server_packets" lineno="57902">
+<interface name="corenet_receive_ntske_server_packets" lineno="44858">
 <summary>
 Receive ntske_server packets.
 </summary>
@@ -46365,7 +36758,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921">
+<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="44877">
 <summary>
 Do not audit attempts to receive ntske_server packets.
 </summary>
@@ -46376,7 +36769,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940">
+<interface name="corenet_sendrecv_ntske_server_packets" lineno="44896">
 <summary>
 Send and receive ntske_server packets.
 </summary>
@@ -46387,7 +36780,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956">
+<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="44912">
 <summary>
 Do not audit attempts to send and receive ntske_server packets.
 </summary>
@@ -46398,7 +36791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ntske_server_packets" lineno="57971">
+<interface name="corenet_relabelto_ntske_server_packets" lineno="44927">
 <summary>
 Relabel packets to ntske_server the packet type.
 </summary>
@@ -46408,85 +36801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993">
-<summary>
-Send and receive TCP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="58008">
-<summary>
-Send UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023">
-<summary>
-Do not audit attempts to send UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="58038">
-<summary>
-Receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053">
-<summary>
-Do not audit attempts to receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068">
-<summary>
-Send and receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="58099">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="44949">
 <summary>
 Bind TCP sockets to the oa_system port.
 </summary>
@@ -46497,7 +36812,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="58119">
+<interface name="corenet_udp_bind_oa_system_port" lineno="44969">
 <summary>
 Bind UDP sockets to the oa_system port.
 </summary>
@@ -46508,7 +36823,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="58138">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="44988">
 <summary>
 Make a TCP connection to the oa_system port.
 </summary>
@@ -46518,7 +36833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="58158">
+<interface name="corenet_send_oa_system_client_packets" lineno="45008">
 <summary>
 Send oa_system_client packets.
 </summary>
@@ -46529,7 +36844,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="45027">
 <summary>
 Do not audit attempts to send oa_system_client packets.
 </summary>
@@ -46540,7 +36855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="58196">
+<interface name="corenet_receive_oa_system_client_packets" lineno="45046">
 <summary>
 Receive oa_system_client packets.
 </summary>
@@ -46551,7 +36866,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="45065">
 <summary>
 Do not audit attempts to receive oa_system_client packets.
 </summary>
@@ -46562,7 +36877,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="45084">
 <summary>
 Send and receive oa_system_client packets.
 </summary>
@@ -46573,7 +36888,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="45100">
 <summary>
 Do not audit attempts to send and receive oa_system_client packets.
 </summary>
@@ -46584,7 +36899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="45115">
 <summary>
 Relabel packets to oa_system_client the packet type.
 </summary>
@@ -46594,7 +36909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="58285">
+<interface name="corenet_send_oa_system_server_packets" lineno="45135">
 <summary>
 Send oa_system_server packets.
 </summary>
@@ -46605,7 +36920,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="45154">
 <summary>
 Do not audit attempts to send oa_system_server packets.
 </summary>
@@ -46616,7 +36931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="58323">
+<interface name="corenet_receive_oa_system_server_packets" lineno="45173">
 <summary>
 Receive oa_system_server packets.
 </summary>
@@ -46627,7 +36942,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="45192">
 <summary>
 Do not audit attempts to receive oa_system_server packets.
 </summary>
@@ -46638,7 +36953,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="45211">
 <summary>
 Send and receive oa_system_server packets.
 </summary>
@@ -46649,7 +36964,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="45227">
 <summary>
 Do not audit attempts to send and receive oa_system_server packets.
 </summary>
@@ -46660,7 +36975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="45242">
 <summary>
 Relabel packets to oa_system_server the packet type.
 </summary>
@@ -46670,85 +36985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414">
-<summary>
-Send and receive TCP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="58429">
-<summary>
-Send UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444">
-<summary>
-Do not audit attempts to send UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="58459">
-<summary>
-Receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474">
-<summary>
-Do not audit attempts to receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489">
-<summary>
-Send and receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="58520">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="45264">
 <summary>
 Bind TCP sockets to the oracledb port.
 </summary>
@@ -46759,7 +36996,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="58540">
+<interface name="corenet_udp_bind_oracledb_port" lineno="45284">
 <summary>
 Bind UDP sockets to the oracledb port.
 </summary>
@@ -46770,7 +37007,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="58559">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="45303">
 <summary>
 Make a TCP connection to the oracledb port.
 </summary>
@@ -46780,7 +37017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58579">
+<interface name="corenet_send_oracledb_client_packets" lineno="45323">
 <summary>
 Send oracledb_client packets.
 </summary>
@@ -46791,7 +37028,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="45342">
 <summary>
 Do not audit attempts to send oracledb_client packets.
 </summary>
@@ -46802,7 +37039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58617">
+<interface name="corenet_receive_oracledb_client_packets" lineno="45361">
 <summary>
 Receive oracledb_client packets.
 </summary>
@@ -46813,7 +37050,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="45380">
 <summary>
 Do not audit attempts to receive oracledb_client packets.
 </summary>
@@ -46824,7 +37061,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="45399">
 <summary>
 Send and receive oracledb_client packets.
 </summary>
@@ -46835,7 +37072,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="45415">
 <summary>
 Do not audit attempts to send and receive oracledb_client packets.
 </summary>
@@ -46846,7 +37083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="45430">
 <summary>
 Relabel packets to oracledb_client the packet type.
 </summary>
@@ -46856,7 +37093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58706">
+<interface name="corenet_send_oracledb_server_packets" lineno="45450">
 <summary>
 Send oracledb_server packets.
 </summary>
@@ -46867,7 +37104,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="45469">
 <summary>
 Do not audit attempts to send oracledb_server packets.
 </summary>
@@ -46878,7 +37115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58744">
+<interface name="corenet_receive_oracledb_server_packets" lineno="45488">
 <summary>
 Receive oracledb_server packets.
 </summary>
@@ -46889,7 +37126,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="45507">
 <summary>
 Do not audit attempts to receive oracledb_server packets.
 </summary>
@@ -46900,7 +37137,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="45526">
 <summary>
 Send and receive oracledb_server packets.
 </summary>
@@ -46911,7 +37148,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="45542">
 <summary>
 Do not audit attempts to send and receive oracledb_server packets.
 </summary>
@@ -46922,7 +37159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="45557">
 <summary>
 Relabel packets to oracledb_server the packet type.
 </summary>
@@ -46932,85 +37169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835">
-<summary>
-Send and receive TCP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58850">
-<summary>
-Send UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865">
-<summary>
-Do not audit attempts to send UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58880">
-<summary>
-Receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895">
-<summary>
-Do not audit attempts to receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910">
-<summary>
-Send and receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58941">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="45579">
 <summary>
 Bind TCP sockets to the ocsp port.
 </summary>
@@ -47021,7 +37180,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58961">
+<interface name="corenet_udp_bind_ocsp_port" lineno="45599">
 <summary>
 Bind UDP sockets to the ocsp port.
 </summary>
@@ -47032,7 +37191,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58980">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="45618">
 <summary>
 Make a TCP connection to the ocsp port.
 </summary>
@@ -47042,7 +37201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="59000">
+<interface name="corenet_send_ocsp_client_packets" lineno="45638">
 <summary>
 Send ocsp_client packets.
 </summary>
@@ -47053,7 +37212,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="45657">
 <summary>
 Do not audit attempts to send ocsp_client packets.
 </summary>
@@ -47064,7 +37223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="59038">
+<interface name="corenet_receive_ocsp_client_packets" lineno="45676">
 <summary>
 Receive ocsp_client packets.
 </summary>
@@ -47075,7 +37234,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="45695">
 <summary>
 Do not audit attempts to receive ocsp_client packets.
 </summary>
@@ -47086,7 +37245,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="45714">
 <summary>
 Send and receive ocsp_client packets.
 </summary>
@@ -47097,7 +37256,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="45730">
 <summary>
 Do not audit attempts to send and receive ocsp_client packets.
 </summary>
@@ -47108,7 +37267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="45745">
 <summary>
 Relabel packets to ocsp_client the packet type.
 </summary>
@@ -47118,7 +37277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="59127">
+<interface name="corenet_send_ocsp_server_packets" lineno="45765">
 <summary>
 Send ocsp_server packets.
 </summary>
@@ -47129,7 +37288,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="45784">
 <summary>
 Do not audit attempts to send ocsp_server packets.
 </summary>
@@ -47140,7 +37299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="59165">
+<interface name="corenet_receive_ocsp_server_packets" lineno="45803">
 <summary>
 Receive ocsp_server packets.
 </summary>
@@ -47151,7 +37310,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="45822">
 <summary>
 Do not audit attempts to receive ocsp_server packets.
 </summary>
@@ -47162,7 +37321,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="45841">
 <summary>
 Send and receive ocsp_server packets.
 </summary>
@@ -47173,7 +37332,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="45857">
 <summary>
 Do not audit attempts to send and receive ocsp_server packets.
 </summary>
@@ -47184,7 +37343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="45872">
 <summary>
 Relabel packets to ocsp_server the packet type.
 </summary>
@@ -47194,85 +37353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256">
-<summary>
-Send and receive TCP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="59271">
-<summary>
-Send UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286">
-<summary>
-Do not audit attempts to send UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="59301">
-<summary>
-Receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316">
-<summary>
-Do not audit attempts to receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331">
-<summary>
-Send and receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="59362">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="45894">
 <summary>
 Bind TCP sockets to the openhpid port.
 </summary>
@@ -47283,7 +37364,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="59382">
+<interface name="corenet_udp_bind_openhpid_port" lineno="45914">
 <summary>
 Bind UDP sockets to the openhpid port.
 </summary>
@@ -47294,7 +37375,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="59401">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="45933">
 <summary>
 Make a TCP connection to the openhpid port.
 </summary>
@@ -47304,7 +37385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="59421">
+<interface name="corenet_send_openhpid_client_packets" lineno="45953">
 <summary>
 Send openhpid_client packets.
 </summary>
@@ -47315,7 +37396,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="45972">
 <summary>
 Do not audit attempts to send openhpid_client packets.
 </summary>
@@ -47326,7 +37407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="59459">
+<interface name="corenet_receive_openhpid_client_packets" lineno="45991">
 <summary>
 Receive openhpid_client packets.
 </summary>
@@ -47337,7 +37418,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="46010">
 <summary>
 Do not audit attempts to receive openhpid_client packets.
 </summary>
@@ -47348,7 +37429,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="46029">
 <summary>
 Send and receive openhpid_client packets.
 </summary>
@@ -47359,7 +37440,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="46045">
 <summary>
 Do not audit attempts to send and receive openhpid_client packets.
 </summary>
@@ -47370,7 +37451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="46060">
 <summary>
 Relabel packets to openhpid_client the packet type.
 </summary>
@@ -47380,7 +37461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="59548">
+<interface name="corenet_send_openhpid_server_packets" lineno="46080">
 <summary>
 Send openhpid_server packets.
 </summary>
@@ -47391,7 +37472,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="46099">
 <summary>
 Do not audit attempts to send openhpid_server packets.
 </summary>
@@ -47402,7 +37483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59586">
+<interface name="corenet_receive_openhpid_server_packets" lineno="46118">
 <summary>
 Receive openhpid_server packets.
 </summary>
@@ -47413,7 +37494,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="46137">
 <summary>
 Do not audit attempts to receive openhpid_server packets.
 </summary>
@@ -47424,7 +37505,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="46156">
 <summary>
 Send and receive openhpid_server packets.
 </summary>
@@ -47435,7 +37516,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="46172">
 <summary>
 Do not audit attempts to send and receive openhpid_server packets.
 </summary>
@@ -47446,7 +37527,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="46187">
 <summary>
 Relabel packets to openhpid_server the packet type.
 </summary>
@@ -47456,85 +37537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677">
-<summary>
-Send and receive TCP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59692">
-<summary>
-Send UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707">
-<summary>
-Do not audit attempts to send UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59722">
-<summary>
-Receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737">
-<summary>
-Do not audit attempts to receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752">
-<summary>
-Send and receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59783">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="46209">
 <summary>
 Bind TCP sockets to the openvpn port.
 </summary>
@@ -47545,7 +37548,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59803">
+<interface name="corenet_udp_bind_openvpn_port" lineno="46229">
 <summary>
 Bind UDP sockets to the openvpn port.
 </summary>
@@ -47556,7 +37559,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59822">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="46248">
 <summary>
 Make a TCP connection to the openvpn port.
 </summary>
@@ -47566,7 +37569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59842">
+<interface name="corenet_send_openvpn_client_packets" lineno="46268">
 <summary>
 Send openvpn_client packets.
 </summary>
@@ -47577,7 +37580,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="46287">
 <summary>
 Do not audit attempts to send openvpn_client packets.
 </summary>
@@ -47588,7 +37591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59880">
+<interface name="corenet_receive_openvpn_client_packets" lineno="46306">
 <summary>
 Receive openvpn_client packets.
 </summary>
@@ -47599,7 +37602,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="46325">
 <summary>
 Do not audit attempts to receive openvpn_client packets.
 </summary>
@@ -47610,7 +37613,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="46344">
 <summary>
 Send and receive openvpn_client packets.
 </summary>
@@ -47621,7 +37624,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="46360">
 <summary>
 Do not audit attempts to send and receive openvpn_client packets.
 </summary>
@@ -47632,7 +37635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="46375">
 <summary>
 Relabel packets to openvpn_client the packet type.
 </summary>
@@ -47642,7 +37645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59969">
+<interface name="corenet_send_openvpn_server_packets" lineno="46395">
 <summary>
 Send openvpn_server packets.
 </summary>
@@ -47653,7 +37656,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="46414">
 <summary>
 Do not audit attempts to send openvpn_server packets.
 </summary>
@@ -47664,7 +37667,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="60007">
+<interface name="corenet_receive_openvpn_server_packets" lineno="46433">
 <summary>
 Receive openvpn_server packets.
 </summary>
@@ -47675,7 +37678,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="46452">
 <summary>
 Do not audit attempts to receive openvpn_server packets.
 </summary>
@@ -47686,7 +37689,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="46471">
 <summary>
 Send and receive openvpn_server packets.
 </summary>
@@ -47697,7 +37700,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="46487">
 <summary>
 Do not audit attempts to send and receive openvpn_server packets.
 </summary>
@@ -47708,7 +37711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="46502">
 <summary>
 Relabel packets to openvpn_server the packet type.
 </summary>
@@ -47718,85 +37721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098">
-<summary>
-Send and receive TCP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pdps_port" lineno="60113">
-<summary>
-Send UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128">
-<summary>
-Do not audit attempts to send UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="60143">
-<summary>
-Receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158">
-<summary>
-Do not audit attempts to receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173">
-<summary>
-Send and receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="60204">
+<interface name="corenet_tcp_bind_pdps_port" lineno="46524">
 <summary>
 Bind TCP sockets to the pdps port.
 </summary>
@@ -47807,7 +37732,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="60224">
+<interface name="corenet_udp_bind_pdps_port" lineno="46544">
 <summary>
 Bind UDP sockets to the pdps port.
 </summary>
@@ -47818,7 +37743,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="60243">
+<interface name="corenet_tcp_connect_pdps_port" lineno="46563">
 <summary>
 Make a TCP connection to the pdps port.
 </summary>
@@ -47828,7 +37753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_client_packets" lineno="60263">
+<interface name="corenet_send_pdps_client_packets" lineno="46583">
 <summary>
 Send pdps_client packets.
 </summary>
@@ -47839,7 +37764,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="46602">
 <summary>
 Do not audit attempts to send pdps_client packets.
 </summary>
@@ -47850,7 +37775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="60301">
+<interface name="corenet_receive_pdps_client_packets" lineno="46621">
 <summary>
 Receive pdps_client packets.
 </summary>
@@ -47861,7 +37786,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="46640">
 <summary>
 Do not audit attempts to receive pdps_client packets.
 </summary>
@@ -47872,7 +37797,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="46659">
 <summary>
 Send and receive pdps_client packets.
 </summary>
@@ -47883,7 +37808,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="46675">
 <summary>
 Do not audit attempts to send and receive pdps_client packets.
 </summary>
@@ -47894,7 +37819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="60370">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="46690">
 <summary>
 Relabel packets to pdps_client the packet type.
 </summary>
@@ -47904,7 +37829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pdps_server_packets" lineno="60390">
+<interface name="corenet_send_pdps_server_packets" lineno="46710">
 <summary>
 Send pdps_server packets.
 </summary>
@@ -47915,7 +37840,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="46729">
 <summary>
 Do not audit attempts to send pdps_server packets.
 </summary>
@@ -47926,7 +37851,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="60428">
+<interface name="corenet_receive_pdps_server_packets" lineno="46748">
 <summary>
 Receive pdps_server packets.
 </summary>
@@ -47937,7 +37862,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="46767">
 <summary>
 Do not audit attempts to receive pdps_server packets.
 </summary>
@@ -47948,7 +37873,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="46786">
 <summary>
 Send and receive pdps_server packets.
 </summary>
@@ -47959,7 +37884,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="46802">
 <summary>
 Do not audit attempts to send and receive pdps_server packets.
 </summary>
@@ -47970,7 +37895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="60497">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="46817">
 <summary>
 Relabel packets to pdps_server the packet type.
 </summary>
@@ -47980,85 +37905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519">
-<summary>
-Send and receive TCP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="60534">
-<summary>
-Send UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549">
-<summary>
-Do not audit attempts to send UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564">
-<summary>
-Receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579">
-<summary>
-Do not audit attempts to receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594">
-<summary>
-Send and receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="46839">
 <summary>
 Bind TCP sockets to the pegasus_http port.
 </summary>
@@ -48069,7 +37916,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="46859">
 <summary>
 Bind UDP sockets to the pegasus_http port.
 </summary>
@@ -48080,7 +37927,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="46878">
 <summary>
 Make a TCP connection to the pegasus_http port.
 </summary>
@@ -48090,7 +37937,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60684">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="46898">
 <summary>
 Send pegasus_http_client packets.
 </summary>
@@ -48101,7 +37948,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="46917">
 <summary>
 Do not audit attempts to send pegasus_http_client packets.
 </summary>
@@ -48112,7 +37959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="46936">
 <summary>
 Receive pegasus_http_client packets.
 </summary>
@@ -48123,7 +37970,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="46955">
 <summary>
 Do not audit attempts to receive pegasus_http_client packets.
 </summary>
@@ -48134,7 +37981,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="46974">
 <summary>
 Send and receive pegasus_http_client packets.
 </summary>
@@ -48145,7 +37992,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="46990">
 <summary>
 Do not audit attempts to send and receive pegasus_http_client packets.
 </summary>
@@ -48156,7 +38003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="47005">
 <summary>
 Relabel packets to pegasus_http_client the packet type.
 </summary>
@@ -48166,7 +38013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60811">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="47025">
 <summary>
 Send pegasus_http_server packets.
 </summary>
@@ -48177,7 +38024,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="47044">
 <summary>
 Do not audit attempts to send pegasus_http_server packets.
 </summary>
@@ -48188,7 +38035,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="47063">
 <summary>
 Receive pegasus_http_server packets.
 </summary>
@@ -48199,7 +38046,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="47082">
 <summary>
 Do not audit attempts to receive pegasus_http_server packets.
 </summary>
@@ -48210,7 +38057,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="47101">
 <summary>
 Send and receive pegasus_http_server packets.
 </summary>
@@ -48221,7 +38068,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="47117">
 <summary>
 Do not audit attempts to send and receive pegasus_http_server packets.
 </summary>
@@ -48232,7 +38079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="47132">
 <summary>
 Relabel packets to pegasus_http_server the packet type.
 </summary>
@@ -48242,85 +38089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940">
-<summary>
-Send and receive TCP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60955">
-<summary>
-Send UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970">
-<summary>
-Do not audit attempts to send UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985">
-<summary>
-Receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000">
-<summary>
-Do not audit attempts to receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015">
-<summary>
-Send and receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="47154">
 <summary>
 Bind TCP sockets to the pegasus_https port.
 </summary>
@@ -48331,7 +38100,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="47174">
 <summary>
 Bind UDP sockets to the pegasus_https port.
 </summary>
@@ -48342,7 +38111,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="47193">
 <summary>
 Make a TCP connection to the pegasus_https port.
 </summary>
@@ -48352,7 +38121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="61105">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="47213">
 <summary>
 Send pegasus_https_client packets.
 </summary>
@@ -48363,7 +38132,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="47232">
 <summary>
 Do not audit attempts to send pegasus_https_client packets.
 </summary>
@@ -48374,7 +38143,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="47251">
 <summary>
 Receive pegasus_https_client packets.
 </summary>
@@ -48385,7 +38154,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="47270">
 <summary>
 Do not audit attempts to receive pegasus_https_client packets.
 </summary>
@@ -48396,7 +38165,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="47289">
 <summary>
 Send and receive pegasus_https_client packets.
 </summary>
@@ -48407,7 +38176,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="47305">
 <summary>
 Do not audit attempts to send and receive pegasus_https_client packets.
 </summary>
@@ -48418,7 +38187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="47320">
 <summary>
 Relabel packets to pegasus_https_client the packet type.
 </summary>
@@ -48428,7 +38197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="61232">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="47340">
 <summary>
 Send pegasus_https_server packets.
 </summary>
@@ -48439,7 +38208,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="47359">
 <summary>
 Do not audit attempts to send pegasus_https_server packets.
 </summary>
@@ -48450,7 +38219,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="47378">
 <summary>
 Receive pegasus_https_server packets.
 </summary>
@@ -48461,7 +38230,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="47397">
 <summary>
 Do not audit attempts to receive pegasus_https_server packets.
 </summary>
@@ -48472,7 +38241,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="47416">
 <summary>
 Send and receive pegasus_https_server packets.
 </summary>
@@ -48483,7 +38252,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="47432">
 <summary>
 Do not audit attempts to send and receive pegasus_https_server packets.
 </summary>
@@ -48494,7 +38263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="47447">
 <summary>
 Relabel packets to pegasus_https_server the packet type.
 </summary>
@@ -48504,85 +38273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361">
-<summary>
-Send and receive TCP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376">
-<summary>
-Send UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391">
-<summary>
-Do not audit attempts to send UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406">
-<summary>
-Receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421">
-<summary>
-Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436">
-<summary>
-Send and receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="47469">
 <summary>
 Bind TCP sockets to the pgpkeyserver port.
 </summary>
@@ -48593,7 +38284,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="47489">
 <summary>
 Bind UDP sockets to the pgpkeyserver port.
 </summary>
@@ -48604,7 +38295,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="47508">
 <summary>
 Make a TCP connection to the pgpkeyserver port.
 </summary>
@@ -48614,7 +38305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="47528">
 <summary>
 Send pgpkeyserver_client packets.
 </summary>
@@ -48625,7 +38316,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="47547">
 <summary>
 Do not audit attempts to send pgpkeyserver_client packets.
 </summary>
@@ -48636,7 +38327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="47566">
 <summary>
 Receive pgpkeyserver_client packets.
 </summary>
@@ -48647,7 +38338,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="47585">
 <summary>
 Do not audit attempts to receive pgpkeyserver_client packets.
 </summary>
@@ -48658,7 +38349,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="47604">
 <summary>
 Send and receive pgpkeyserver_client packets.
 </summary>
@@ -48669,7 +38360,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="47620">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_client packets.
 </summary>
@@ -48680,7 +38371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="47635">
 <summary>
 Relabel packets to pgpkeyserver_client the packet type.
 </summary>
@@ -48690,7 +38381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="47655">
 <summary>
 Send pgpkeyserver_server packets.
 </summary>
@@ -48701,7 +38392,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="47674">
 <summary>
 Do not audit attempts to send pgpkeyserver_server packets.
 </summary>
@@ -48712,7 +38403,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="47693">
 <summary>
 Receive pgpkeyserver_server packets.
 </summary>
@@ -48723,7 +38414,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="47712">
 <summary>
 Do not audit attempts to receive pgpkeyserver_server packets.
 </summary>
@@ -48734,7 +38425,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="47731">
 <summary>
 Send and receive pgpkeyserver_server packets.
 </summary>
@@ -48745,7 +38436,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="47747">
 <summary>
 Do not audit attempts to send and receive pgpkeyserver_server packets.
 </summary>
@@ -48756,7 +38447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="47762">
 <summary>
 Relabel packets to pgpkeyserver_server the packet type.
 </summary>
@@ -48766,85 +38457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782">
-<summary>
-Send and receive TCP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61797">
-<summary>
-Send UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812">
-<summary>
-Do not audit attempts to send UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61827">
-<summary>
-Receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842">
-<summary>
-Do not audit attempts to receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857">
-<summary>
-Send and receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61888">
+<interface name="corenet_tcp_bind_pingd_port" lineno="47784">
 <summary>
 Bind TCP sockets to the pingd port.
 </summary>
@@ -48855,7 +38468,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61908">
+<interface name="corenet_udp_bind_pingd_port" lineno="47804">
 <summary>
 Bind UDP sockets to the pingd port.
 </summary>
@@ -48866,7 +38479,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61927">
+<interface name="corenet_tcp_connect_pingd_port" lineno="47823">
 <summary>
 Make a TCP connection to the pingd port.
 </summary>
@@ -48876,7 +38489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61947">
+<interface name="corenet_send_pingd_client_packets" lineno="47843">
 <summary>
 Send pingd_client packets.
 </summary>
@@ -48887,7 +38500,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="47862">
 <summary>
 Do not audit attempts to send pingd_client packets.
 </summary>
@@ -48898,7 +38511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61985">
+<interface name="corenet_receive_pingd_client_packets" lineno="47881">
 <summary>
 Receive pingd_client packets.
 </summary>
@@ -48909,7 +38522,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="47900">
 <summary>
 Do not audit attempts to receive pingd_client packets.
 </summary>
@@ -48920,7 +38533,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="47919">
 <summary>
 Send and receive pingd_client packets.
 </summary>
@@ -48931,7 +38544,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="47935">
 <summary>
 Do not audit attempts to send and receive pingd_client packets.
 </summary>
@@ -48942,7 +38555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="62054">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="47950">
 <summary>
 Relabel packets to pingd_client the packet type.
 </summary>
@@ -48952,7 +38565,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pingd_server_packets" lineno="62074">
+<interface name="corenet_send_pingd_server_packets" lineno="47970">
 <summary>
 Send pingd_server packets.
 </summary>
@@ -48963,7 +38576,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="47989">
 <summary>
 Do not audit attempts to send pingd_server packets.
 </summary>
@@ -48974,7 +38587,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="62112">
+<interface name="corenet_receive_pingd_server_packets" lineno="48008">
 <summary>
 Receive pingd_server packets.
 </summary>
@@ -48985,7 +38598,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="48027">
 <summary>
 Do not audit attempts to receive pingd_server packets.
 </summary>
@@ -48996,7 +38609,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="48046">
 <summary>
 Send and receive pingd_server packets.
 </summary>
@@ -49007,7 +38620,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="48062">
 <summary>
 Do not audit attempts to send and receive pingd_server packets.
 </summary>
@@ -49018,7 +38631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="62181">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="48077">
 <summary>
 Relabel packets to pingd_server the packet type.
 </summary>
@@ -49028,85 +38641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203">
-<summary>
-Send and receive TCP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218">
-<summary>
-Send UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233">
-<summary>
-Do not audit attempts to send UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248">
-<summary>
-Receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263">
-<summary>
-Do not audit attempts to receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278">
-<summary>
-Send and receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="48099">
 <summary>
 Bind TCP sockets to the pktcable_cops port.
 </summary>
@@ -49117,7 +38652,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="48119">
 <summary>
 Bind UDP sockets to the pktcable_cops port.
 </summary>
@@ -49128,7 +38663,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="48138">
 <summary>
 Make a TCP connection to the pktcable_cops port.
 </summary>
@@ -49138,7 +38673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="48158">
 <summary>
 Send pktcable_cops_client packets.
 </summary>
@@ -49149,7 +38684,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="48177">
 <summary>
 Do not audit attempts to send pktcable_cops_client packets.
 </summary>
@@ -49160,7 +38695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="48196">
 <summary>
 Receive pktcable_cops_client packets.
 </summary>
@@ -49171,7 +38706,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="48215">
 <summary>
 Do not audit attempts to receive pktcable_cops_client packets.
 </summary>
@@ -49182,7 +38717,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="48234">
 <summary>
 Send and receive pktcable_cops_client packets.
 </summary>
@@ -49193,7 +38728,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="48250">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_client packets.
 </summary>
@@ -49204,7 +38739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="48265">
 <summary>
 Relabel packets to pktcable_cops_client the packet type.
 </summary>
@@ -49214,7 +38749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="48285">
 <summary>
 Send pktcable_cops_server packets.
 </summary>
@@ -49225,7 +38760,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="48304">
 <summary>
 Do not audit attempts to send pktcable_cops_server packets.
 </summary>
@@ -49236,7 +38771,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="48323">
 <summary>
 Receive pktcable_cops_server packets.
 </summary>
@@ -49247,7 +38782,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="48342">
 <summary>
 Do not audit attempts to receive pktcable_cops_server packets.
 </summary>
@@ -49258,7 +38793,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="48361">
 <summary>
 Send and receive pktcable_cops_server packets.
 </summary>
@@ -49269,7 +38804,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="48377">
 <summary>
 Do not audit attempts to send and receive pktcable_cops_server packets.
 </summary>
@@ -49280,7 +38815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="48392">
 <summary>
 Relabel packets to pktcable_cops_server the packet type.
 </summary>
@@ -49290,85 +38825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624">
-<summary>
-Send and receive TCP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pop_port" lineno="62639">
-<summary>
-Send UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654">
-<summary>
-Do not audit attempts to send UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62669">
-<summary>
-Receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684">
-<summary>
-Do not audit attempts to receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62699">
-<summary>
-Send and receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62730">
+<interface name="corenet_tcp_bind_pop_port" lineno="48414">
 <summary>
 Bind TCP sockets to the pop port.
 </summary>
@@ -49379,7 +38836,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62750">
+<interface name="corenet_udp_bind_pop_port" lineno="48434">
 <summary>
 Bind UDP sockets to the pop port.
 </summary>
@@ -49390,7 +38847,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62769">
+<interface name="corenet_tcp_connect_pop_port" lineno="48453">
 <summary>
 Make a TCP connection to the pop port.
 </summary>
@@ -49400,7 +38857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_client_packets" lineno="62789">
+<interface name="corenet_send_pop_client_packets" lineno="48473">
 <summary>
 Send pop_client packets.
 </summary>
@@ -49411,7 +38868,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="48492">
 <summary>
 Do not audit attempts to send pop_client packets.
 </summary>
@@ -49422,7 +38879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62827">
+<interface name="corenet_receive_pop_client_packets" lineno="48511">
 <summary>
 Receive pop_client packets.
 </summary>
@@ -49433,7 +38890,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="48530">
 <summary>
 Do not audit attempts to receive pop_client packets.
 </summary>
@@ -49444,7 +38901,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62865">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="48549">
 <summary>
 Send and receive pop_client packets.
 </summary>
@@ -49455,7 +38912,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="48565">
 <summary>
 Do not audit attempts to send and receive pop_client packets.
 </summary>
@@ -49466,7 +38923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62896">
+<interface name="corenet_relabelto_pop_client_packets" lineno="48580">
 <summary>
 Relabel packets to pop_client the packet type.
 </summary>
@@ -49476,7 +38933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pop_server_packets" lineno="62916">
+<interface name="corenet_send_pop_server_packets" lineno="48600">
 <summary>
 Send pop_server packets.
 </summary>
@@ -49487,7 +38944,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="48619">
 <summary>
 Do not audit attempts to send pop_server packets.
 </summary>
@@ -49498,7 +38955,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62954">
+<interface name="corenet_receive_pop_server_packets" lineno="48638">
 <summary>
 Receive pop_server packets.
 </summary>
@@ -49509,7 +38966,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="48657">
 <summary>
 Do not audit attempts to receive pop_server packets.
 </summary>
@@ -49520,7 +38977,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62992">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="48676">
 <summary>
 Send and receive pop_server packets.
 </summary>
@@ -49531,7 +38988,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="48692">
 <summary>
 Do not audit attempts to send and receive pop_server packets.
 </summary>
@@ -49542,7 +38999,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="63023">
+<interface name="corenet_relabelto_pop_server_packets" lineno="48707">
 <summary>
 Relabel packets to pop_server the packet type.
 </summary>
@@ -49552,85 +39009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045">
-<summary>
-Send and receive TCP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_portmap_port" lineno="63060">
-<summary>
-Send UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075">
-<summary>
-Do not audit attempts to send UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="63090">
-<summary>
-Receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105">
-<summary>
-Do not audit attempts to receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120">
-<summary>
-Send and receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="63151">
+<interface name="corenet_tcp_bind_portmap_port" lineno="48729">
 <summary>
 Bind TCP sockets to the portmap port.
 </summary>
@@ -49641,7 +39020,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="63171">
+<interface name="corenet_udp_bind_portmap_port" lineno="48749">
 <summary>
 Bind UDP sockets to the portmap port.
 </summary>
@@ -49652,7 +39031,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="63190">
+<interface name="corenet_tcp_connect_portmap_port" lineno="48768">
 <summary>
 Make a TCP connection to the portmap port.
 </summary>
@@ -49662,7 +39041,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_client_packets" lineno="63210">
+<interface name="corenet_send_portmap_client_packets" lineno="48788">
 <summary>
 Send portmap_client packets.
 </summary>
@@ -49673,7 +39052,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="48807">
 <summary>
 Do not audit attempts to send portmap_client packets.
 </summary>
@@ -49684,7 +39063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="63248">
+<interface name="corenet_receive_portmap_client_packets" lineno="48826">
 <summary>
 Receive portmap_client packets.
 </summary>
@@ -49695,7 +39074,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="48845">
 <summary>
 Do not audit attempts to receive portmap_client packets.
 </summary>
@@ -49706,7 +39085,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="48864">
 <summary>
 Send and receive portmap_client packets.
 </summary>
@@ -49717,7 +39096,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="48880">
 <summary>
 Do not audit attempts to send and receive portmap_client packets.
 </summary>
@@ -49728,7 +39107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="63317">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="48895">
 <summary>
 Relabel packets to portmap_client the packet type.
 </summary>
@@ -49738,7 +39117,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_portmap_server_packets" lineno="63337">
+<interface name="corenet_send_portmap_server_packets" lineno="48915">
 <summary>
 Send portmap_server packets.
 </summary>
@@ -49749,7 +39128,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="48934">
 <summary>
 Do not audit attempts to send portmap_server packets.
 </summary>
@@ -49760,7 +39139,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="63375">
+<interface name="corenet_receive_portmap_server_packets" lineno="48953">
 <summary>
 Receive portmap_server packets.
 </summary>
@@ -49771,7 +39150,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="48972">
 <summary>
 Do not audit attempts to receive portmap_server packets.
 </summary>
@@ -49782,7 +39161,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="48991">
 <summary>
 Send and receive portmap_server packets.
 </summary>
@@ -49793,7 +39172,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="49007">
 <summary>
 Do not audit attempts to send and receive portmap_server packets.
 </summary>
@@ -49804,7 +39183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="63444">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="49022">
 <summary>
 Relabel packets to portmap_server the packet type.
 </summary>
@@ -49814,85 +39193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466">
-<summary>
-Send and receive TCP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481">
-<summary>
-Send UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496">
-<summary>
-Do not audit attempts to send UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511">
-<summary>
-Receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526">
-<summary>
-Do not audit attempts to receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541">
-<summary>
-Send and receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="49044">
 <summary>
 Bind TCP sockets to the postfix_policyd port.
 </summary>
@@ -49903,7 +39204,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="49064">
 <summary>
 Bind UDP sockets to the postfix_policyd port.
 </summary>
@@ -49914,7 +39215,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="49083">
 <summary>
 Make a TCP connection to the postfix_policyd port.
 </summary>
@@ -49924,7 +39225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="49103">
 <summary>
 Send postfix_policyd_client packets.
 </summary>
@@ -49935,7 +39236,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="49122">
 <summary>
 Do not audit attempts to send postfix_policyd_client packets.
 </summary>
@@ -49946,7 +39247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="49141">
 <summary>
 Receive postfix_policyd_client packets.
 </summary>
@@ -49957,7 +39258,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="49160">
 <summary>
 Do not audit attempts to receive postfix_policyd_client packets.
 </summary>
@@ -49968,7 +39269,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="49179">
 <summary>
 Send and receive postfix_policyd_client packets.
 </summary>
@@ -49979,7 +39280,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="49195">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_client packets.
 </summary>
@@ -49990,7 +39291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="49210">
 <summary>
 Relabel packets to postfix_policyd_client the packet type.
 </summary>
@@ -50000,7 +39301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="49230">
 <summary>
 Send postfix_policyd_server packets.
 </summary>
@@ -50011,7 +39312,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="49249">
 <summary>
 Do not audit attempts to send postfix_policyd_server packets.
 </summary>
@@ -50022,7 +39323,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="49268">
 <summary>
 Receive postfix_policyd_server packets.
 </summary>
@@ -50033,7 +39334,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="49287">
 <summary>
 Do not audit attempts to receive postfix_policyd_server packets.
 </summary>
@@ -50044,7 +39345,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="49306">
 <summary>
 Send and receive postfix_policyd_server packets.
 </summary>
@@ -50055,7 +39356,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="49322">
 <summary>
 Do not audit attempts to send and receive postfix_policyd_server packets.
 </summary>
@@ -50066,7 +39367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="49337">
 <summary>
 Relabel packets to postfix_policyd_server the packet type.
 </summary>
@@ -50076,85 +39377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887">
-<summary>
-Send and receive TCP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63902">
-<summary>
-Send UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917">
-<summary>
-Do not audit attempts to send UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63932">
-<summary>
-Receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947">
-<summary>
-Do not audit attempts to receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962">
-<summary>
-Send and receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63993">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="49359">
 <summary>
 Bind TCP sockets to the postgresql port.
 </summary>
@@ -50165,7 +39388,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="64013">
+<interface name="corenet_udp_bind_postgresql_port" lineno="49379">
 <summary>
 Bind UDP sockets to the postgresql port.
 </summary>
@@ -50176,7 +39399,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="64032">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="49398">
 <summary>
 Make a TCP connection to the postgresql port.
 </summary>
@@ -50186,7 +39409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="64052">
+<interface name="corenet_send_postgresql_client_packets" lineno="49418">
 <summary>
 Send postgresql_client packets.
 </summary>
@@ -50197,7 +39420,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="49437">
 <summary>
 Do not audit attempts to send postgresql_client packets.
 </summary>
@@ -50208,7 +39431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="64090">
+<interface name="corenet_receive_postgresql_client_packets" lineno="49456">
 <summary>
 Receive postgresql_client packets.
 </summary>
@@ -50219,7 +39442,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="49475">
 <summary>
 Do not audit attempts to receive postgresql_client packets.
 </summary>
@@ -50230,7 +39453,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="49494">
 <summary>
 Send and receive postgresql_client packets.
 </summary>
@@ -50241,7 +39464,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="49510">
 <summary>
 Do not audit attempts to send and receive postgresql_client packets.
 </summary>
@@ -50252,7 +39475,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="49525">
 <summary>
 Relabel packets to postgresql_client the packet type.
 </summary>
@@ -50262,7 +39485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="64179">
+<interface name="corenet_send_postgresql_server_packets" lineno="49545">
 <summary>
 Send postgresql_server packets.
 </summary>
@@ -50273,7 +39496,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="49564">
 <summary>
 Do not audit attempts to send postgresql_server packets.
 </summary>
@@ -50284,7 +39507,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="64217">
+<interface name="corenet_receive_postgresql_server_packets" lineno="49583">
 <summary>
 Receive postgresql_server packets.
 </summary>
@@ -50295,7 +39518,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="49602">
 <summary>
 Do not audit attempts to receive postgresql_server packets.
 </summary>
@@ -50306,7 +39529,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="49621">
 <summary>
 Send and receive postgresql_server packets.
 </summary>
@@ -50317,7 +39540,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="49637">
 <summary>
 Do not audit attempts to send and receive postgresql_server packets.
 </summary>
@@ -50328,7 +39551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="49652">
 <summary>
 Relabel packets to postgresql_server the packet type.
 </summary>
@@ -50338,85 +39561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308">
-<summary>
-Send and receive TCP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="64323">
-<summary>
-Send UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338">
-<summary>
-Do not audit attempts to send UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="64353">
-<summary>
-Receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368">
-<summary>
-Do not audit attempts to receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383">
-<summary>
-Send and receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="64414">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="49674">
 <summary>
 Bind TCP sockets to the postgrey port.
 </summary>
@@ -50427,7 +39572,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="64434">
+<interface name="corenet_udp_bind_postgrey_port" lineno="49694">
 <summary>
 Bind UDP sockets to the postgrey port.
 </summary>
@@ -50438,7 +39583,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="64453">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="49713">
 <summary>
 Make a TCP connection to the postgrey port.
 </summary>
@@ -50448,7 +39593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="64473">
+<interface name="corenet_send_postgrey_client_packets" lineno="49733">
 <summary>
 Send postgrey_client packets.
 </summary>
@@ -50459,7 +39604,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="49752">
 <summary>
 Do not audit attempts to send postgrey_client packets.
 </summary>
@@ -50470,7 +39615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="64511">
+<interface name="corenet_receive_postgrey_client_packets" lineno="49771">
 <summary>
 Receive postgrey_client packets.
 </summary>
@@ -50481,7 +39626,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="49790">
 <summary>
 Do not audit attempts to receive postgrey_client packets.
 </summary>
@@ -50492,7 +39637,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="49809">
 <summary>
 Send and receive postgrey_client packets.
 </summary>
@@ -50503,7 +39648,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="49825">
 <summary>
 Do not audit attempts to send and receive postgrey_client packets.
 </summary>
@@ -50514,7 +39659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="49840">
 <summary>
 Relabel packets to postgrey_client the packet type.
 </summary>
@@ -50524,7 +39669,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64600">
+<interface name="corenet_send_postgrey_server_packets" lineno="49860">
 <summary>
 Send postgrey_server packets.
 </summary>
@@ -50535,7 +39680,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="49879">
 <summary>
 Do not audit attempts to send postgrey_server packets.
 </summary>
@@ -50546,7 +39691,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64638">
+<interface name="corenet_receive_postgrey_server_packets" lineno="49898">
 <summary>
 Receive postgrey_server packets.
 </summary>
@@ -50557,7 +39702,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="49917">
 <summary>
 Do not audit attempts to receive postgrey_server packets.
 </summary>
@@ -50568,7 +39713,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="49936">
 <summary>
 Send and receive postgrey_server packets.
 </summary>
@@ -50579,7 +39724,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="49952">
 <summary>
 Do not audit attempts to send and receive postgrey_server packets.
 </summary>
@@ -50590,7 +39735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="49967">
 <summary>
 Relabel packets to postgrey_server the packet type.
 </summary>
@@ -50600,85 +39745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729">
-<summary>
-Send and receive TCP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64744">
-<summary>
-Send UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759">
-<summary>
-Do not audit attempts to send UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64774">
-<summary>
-Receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789">
-<summary>
-Do not audit attempts to receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804">
-<summary>
-Send and receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64835">
+<interface name="corenet_tcp_bind_pptp_port" lineno="49989">
 <summary>
 Bind TCP sockets to the pptp port.
 </summary>
@@ -50689,7 +39756,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64855">
+<interface name="corenet_udp_bind_pptp_port" lineno="50009">
 <summary>
 Bind UDP sockets to the pptp port.
 </summary>
@@ -50700,7 +39767,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64874">
+<interface name="corenet_tcp_connect_pptp_port" lineno="50028">
 <summary>
 Make a TCP connection to the pptp port.
 </summary>
@@ -50710,7 +39777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64894">
+<interface name="corenet_send_pptp_client_packets" lineno="50048">
 <summary>
 Send pptp_client packets.
 </summary>
@@ -50721,7 +39788,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="50067">
 <summary>
 Do not audit attempts to send pptp_client packets.
 </summary>
@@ -50732,7 +39799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64932">
+<interface name="corenet_receive_pptp_client_packets" lineno="50086">
 <summary>
 Receive pptp_client packets.
 </summary>
@@ -50743,7 +39810,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="50105">
 <summary>
 Do not audit attempts to receive pptp_client packets.
 </summary>
@@ -50754,7 +39821,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="50124">
 <summary>
 Send and receive pptp_client packets.
 </summary>
@@ -50765,7 +39832,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="50140">
 <summary>
 Do not audit attempts to send and receive pptp_client packets.
 </summary>
@@ -50776,7 +39843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="65001">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="50155">
 <summary>
 Relabel packets to pptp_client the packet type.
 </summary>
@@ -50786,7 +39853,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pptp_server_packets" lineno="65021">
+<interface name="corenet_send_pptp_server_packets" lineno="50175">
 <summary>
 Send pptp_server packets.
 </summary>
@@ -50797,7 +39864,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="50194">
 <summary>
 Do not audit attempts to send pptp_server packets.
 </summary>
@@ -50808,7 +39875,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="65059">
+<interface name="corenet_receive_pptp_server_packets" lineno="50213">
 <summary>
 Receive pptp_server packets.
 </summary>
@@ -50819,7 +39886,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="50232">
 <summary>
 Do not audit attempts to receive pptp_server packets.
 </summary>
@@ -50830,7 +39897,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="50251">
 <summary>
 Send and receive pptp_server packets.
 </summary>
@@ -50841,7 +39908,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="50267">
 <summary>
 Do not audit attempts to send and receive pptp_server packets.
 </summary>
@@ -50852,7 +39919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="65128">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="50282">
 <summary>
 Relabel packets to pptp_server the packet type.
 </summary>
@@ -50862,85 +39929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150">
-<summary>
-Send and receive TCP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_prelude_port" lineno="65165">
-<summary>
-Send UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180">
-<summary>
-Do not audit attempts to send UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="65195">
-<summary>
-Receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210">
-<summary>
-Do not audit attempts to receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225">
-<summary>
-Send and receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="65256">
+<interface name="corenet_tcp_bind_prelude_port" lineno="50304">
 <summary>
 Bind TCP sockets to the prelude port.
 </summary>
@@ -50951,7 +39940,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="65276">
+<interface name="corenet_udp_bind_prelude_port" lineno="50324">
 <summary>
 Bind UDP sockets to the prelude port.
 </summary>
@@ -50962,7 +39951,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="65295">
+<interface name="corenet_tcp_connect_prelude_port" lineno="50343">
 <summary>
 Make a TCP connection to the prelude port.
 </summary>
@@ -50972,7 +39961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_client_packets" lineno="65315">
+<interface name="corenet_send_prelude_client_packets" lineno="50363">
 <summary>
 Send prelude_client packets.
 </summary>
@@ -50983,7 +39972,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="50382">
 <summary>
 Do not audit attempts to send prelude_client packets.
 </summary>
@@ -50994,7 +39983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="65353">
+<interface name="corenet_receive_prelude_client_packets" lineno="50401">
 <summary>
 Receive prelude_client packets.
 </summary>
@@ -51005,7 +39994,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="50420">
 <summary>
 Do not audit attempts to receive prelude_client packets.
 </summary>
@@ -51016,7 +40005,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="50439">
 <summary>
 Send and receive prelude_client packets.
 </summary>
@@ -51027,7 +40016,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="50455">
 <summary>
 Do not audit attempts to send and receive prelude_client packets.
 </summary>
@@ -51038,7 +40027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="65422">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="50470">
 <summary>
 Relabel packets to prelude_client the packet type.
 </summary>
@@ -51048,7 +40037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_prelude_server_packets" lineno="65442">
+<interface name="corenet_send_prelude_server_packets" lineno="50490">
 <summary>
 Send prelude_server packets.
 </summary>
@@ -51059,7 +40048,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="50509">
 <summary>
 Do not audit attempts to send prelude_server packets.
 </summary>
@@ -51070,7 +40059,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="65480">
+<interface name="corenet_receive_prelude_server_packets" lineno="50528">
 <summary>
 Receive prelude_server packets.
 </summary>
@@ -51081,7 +40070,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="50547">
 <summary>
 Do not audit attempts to receive prelude_server packets.
 </summary>
@@ -51092,7 +40081,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="50566">
 <summary>
 Send and receive prelude_server packets.
 </summary>
@@ -51103,7 +40092,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="50582">
 <summary>
 Do not audit attempts to send and receive prelude_server packets.
 </summary>
@@ -51114,7 +40103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="65549">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="50597">
 <summary>
 Relabel packets to prelude_server the packet type.
 </summary>
@@ -51124,85 +40113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571">
-<summary>
-Send and receive TCP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_presence_port" lineno="65586">
-<summary>
-Send UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601">
-<summary>
-Do not audit attempts to send UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65616">
-<summary>
-Receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631">
-<summary>
-Do not audit attempts to receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65646">
-<summary>
-Send and receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65677">
+<interface name="corenet_tcp_bind_presence_port" lineno="50619">
 <summary>
 Bind TCP sockets to the presence port.
 </summary>
@@ -51213,7 +40124,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65697">
+<interface name="corenet_udp_bind_presence_port" lineno="50639">
 <summary>
 Bind UDP sockets to the presence port.
 </summary>
@@ -51224,7 +40135,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65716">
+<interface name="corenet_tcp_connect_presence_port" lineno="50658">
 <summary>
 Make a TCP connection to the presence port.
 </summary>
@@ -51234,7 +40145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_client_packets" lineno="65736">
+<interface name="corenet_send_presence_client_packets" lineno="50678">
 <summary>
 Send presence_client packets.
 </summary>
@@ -51245,7 +40156,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="50697">
 <summary>
 Do not audit attempts to send presence_client packets.
 </summary>
@@ -51256,7 +40167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65774">
+<interface name="corenet_receive_presence_client_packets" lineno="50716">
 <summary>
 Receive presence_client packets.
 </summary>
@@ -51267,7 +40178,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="50735">
 <summary>
 Do not audit attempts to receive presence_client packets.
 </summary>
@@ -51278,7 +40189,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65812">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="50754">
 <summary>
 Send and receive presence_client packets.
 </summary>
@@ -51289,7 +40200,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="50770">
 <summary>
 Do not audit attempts to send and receive presence_client packets.
 </summary>
@@ -51300,7 +40211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65843">
+<interface name="corenet_relabelto_presence_client_packets" lineno="50785">
 <summary>
 Relabel packets to presence_client the packet type.
 </summary>
@@ -51310,7 +40221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_presence_server_packets" lineno="65863">
+<interface name="corenet_send_presence_server_packets" lineno="50805">
 <summary>
 Send presence_server packets.
 </summary>
@@ -51321,7 +40232,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="50824">
 <summary>
 Do not audit attempts to send presence_server packets.
 </summary>
@@ -51332,7 +40243,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65901">
+<interface name="corenet_receive_presence_server_packets" lineno="50843">
 <summary>
 Receive presence_server packets.
 </summary>
@@ -51343,7 +40254,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="50862">
 <summary>
 Do not audit attempts to receive presence_server packets.
 </summary>
@@ -51354,7 +40265,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65939">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="50881">
 <summary>
 Send and receive presence_server packets.
 </summary>
@@ -51365,7 +40276,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="50897">
 <summary>
 Do not audit attempts to send and receive presence_server packets.
 </summary>
@@ -51376,7 +40287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65970">
+<interface name="corenet_relabelto_presence_server_packets" lineno="50912">
 <summary>
 Relabel packets to presence_server the packet type.
 </summary>
@@ -51386,85 +40297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992">
-<summary>
-Send and receive TCP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_printer_port" lineno="66007">
-<summary>
-Send UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022">
-<summary>
-Do not audit attempts to send UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_printer_port" lineno="66037">
-<summary>
-Receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052">
-<summary>
-Do not audit attempts to receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="66067">
-<summary>
-Send and receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="66098">
+<interface name="corenet_tcp_bind_printer_port" lineno="50934">
 <summary>
 Bind TCP sockets to the printer port.
 </summary>
@@ -51475,7 +40308,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_printer_port" lineno="66118">
+<interface name="corenet_udp_bind_printer_port" lineno="50954">
 <summary>
 Bind UDP sockets to the printer port.
 </summary>
@@ -51486,7 +40319,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="66137">
+<interface name="corenet_tcp_connect_printer_port" lineno="50973">
 <summary>
 Make a TCP connection to the printer port.
 </summary>
@@ -51496,7 +40329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_client_packets" lineno="66157">
+<interface name="corenet_send_printer_client_packets" lineno="50993">
 <summary>
 Send printer_client packets.
 </summary>
@@ -51507,7 +40340,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="51012">
 <summary>
 Do not audit attempts to send printer_client packets.
 </summary>
@@ -51518,7 +40351,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_client_packets" lineno="66195">
+<interface name="corenet_receive_printer_client_packets" lineno="51031">
 <summary>
 Receive printer_client packets.
 </summary>
@@ -51529,7 +40362,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="51050">
 <summary>
 Do not audit attempts to receive printer_client packets.
 </summary>
@@ -51540,7 +40373,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="66233">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="51069">
 <summary>
 Send and receive printer_client packets.
 </summary>
@@ -51551,7 +40384,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="51085">
 <summary>
 Do not audit attempts to send and receive printer_client packets.
 </summary>
@@ -51562,7 +40395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="66264">
+<interface name="corenet_relabelto_printer_client_packets" lineno="51100">
 <summary>
 Relabel packets to printer_client the packet type.
 </summary>
@@ -51572,7 +40405,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_printer_server_packets" lineno="66284">
+<interface name="corenet_send_printer_server_packets" lineno="51120">
 <summary>
 Send printer_server packets.
 </summary>
@@ -51583,7 +40416,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="51139">
 <summary>
 Do not audit attempts to send printer_server packets.
 </summary>
@@ -51594,7 +40427,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_printer_server_packets" lineno="66322">
+<interface name="corenet_receive_printer_server_packets" lineno="51158">
 <summary>
 Receive printer_server packets.
 </summary>
@@ -51605,7 +40438,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="51177">
 <summary>
 Do not audit attempts to receive printer_server packets.
 </summary>
@@ -51616,7 +40449,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="66360">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="51196">
 <summary>
 Send and receive printer_server packets.
 </summary>
@@ -51627,7 +40460,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="51212">
 <summary>
 Do not audit attempts to send and receive printer_server packets.
 </summary>
@@ -51638,7 +40471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="66391">
+<interface name="corenet_relabelto_printer_server_packets" lineno="51227">
 <summary>
 Relabel packets to printer_server the packet type.
 </summary>
@@ -51648,85 +40481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413">
-<summary>
-Send and receive TCP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ptal_port" lineno="66428">
-<summary>
-Send UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443">
-<summary>
-Do not audit attempts to send UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="66458">
-<summary>
-Receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473">
-<summary>
-Do not audit attempts to receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488">
-<summary>
-Send and receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="66519">
+<interface name="corenet_tcp_bind_ptal_port" lineno="51249">
 <summary>
 Bind TCP sockets to the ptal port.
 </summary>
@@ -51737,7 +40492,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="66539">
+<interface name="corenet_udp_bind_ptal_port" lineno="51269">
 <summary>
 Bind UDP sockets to the ptal port.
 </summary>
@@ -51748,7 +40503,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="66558">
+<interface name="corenet_tcp_connect_ptal_port" lineno="51288">
 <summary>
 Make a TCP connection to the ptal port.
 </summary>
@@ -51758,7 +40513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66578">
+<interface name="corenet_send_ptal_client_packets" lineno="51308">
 <summary>
 Send ptal_client packets.
 </summary>
@@ -51769,7 +40524,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="51327">
 <summary>
 Do not audit attempts to send ptal_client packets.
 </summary>
@@ -51780,7 +40535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66616">
+<interface name="corenet_receive_ptal_client_packets" lineno="51346">
 <summary>
 Receive ptal_client packets.
 </summary>
@@ -51791,7 +40546,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="51365">
 <summary>
 Do not audit attempts to receive ptal_client packets.
 </summary>
@@ -51802,7 +40557,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="51384">
 <summary>
 Send and receive ptal_client packets.
 </summary>
@@ -51813,7 +40568,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="51400">
 <summary>
 Do not audit attempts to send and receive ptal_client packets.
 </summary>
@@ -51824,7 +40579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66685">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="51415">
 <summary>
 Relabel packets to ptal_client the packet type.
 </summary>
@@ -51834,7 +40589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66705">
+<interface name="corenet_send_ptal_server_packets" lineno="51435">
 <summary>
 Send ptal_server packets.
 </summary>
@@ -51845,7 +40600,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="51454">
 <summary>
 Do not audit attempts to send ptal_server packets.
 </summary>
@@ -51856,7 +40611,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66743">
+<interface name="corenet_receive_ptal_server_packets" lineno="51473">
 <summary>
 Receive ptal_server packets.
 </summary>
@@ -51867,7 +40622,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="51492">
 <summary>
 Do not audit attempts to receive ptal_server packets.
 </summary>
@@ -51878,7 +40633,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="51511">
 <summary>
 Send and receive ptal_server packets.
 </summary>
@@ -51889,7 +40644,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="51527">
 <summary>
 Do not audit attempts to send and receive ptal_server packets.
 </summary>
@@ -51900,7 +40655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66812">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="51542">
 <summary>
 Relabel packets to ptal_server the packet type.
 </summary>
@@ -51910,85 +40665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834">
-<summary>
-Send and receive TCP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66849">
-<summary>
-Send UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864">
-<summary>
-Do not audit attempts to send UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879">
-<summary>
-Receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894">
-<summary>
-Do not audit attempts to receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909">
-<summary>
-Send and receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="51564">
 <summary>
 Bind TCP sockets to the pulseaudio port.
 </summary>
@@ -51999,7 +40676,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="51584">
 <summary>
 Bind UDP sockets to the pulseaudio port.
 </summary>
@@ -52010,7 +40687,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="51603">
 <summary>
 Make a TCP connection to the pulseaudio port.
 </summary>
@@ -52020,7 +40697,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66999">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="51623">
 <summary>
 Send pulseaudio_client packets.
 </summary>
@@ -52031,7 +40708,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="51642">
 <summary>
 Do not audit attempts to send pulseaudio_client packets.
 </summary>
@@ -52042,7 +40719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="51661">
 <summary>
 Receive pulseaudio_client packets.
 </summary>
@@ -52053,7 +40730,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="51680">
 <summary>
 Do not audit attempts to receive pulseaudio_client packets.
 </summary>
@@ -52064,7 +40741,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="51699">
 <summary>
 Send and receive pulseaudio_client packets.
 </summary>
@@ -52075,7 +40752,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="51715">
 <summary>
 Do not audit attempts to send and receive pulseaudio_client packets.
 </summary>
@@ -52086,7 +40763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="51730">
 <summary>
 Relabel packets to pulseaudio_client the packet type.
 </summary>
@@ -52096,7 +40773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="67126">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="51750">
 <summary>
 Send pulseaudio_server packets.
 </summary>
@@ -52107,7 +40784,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="51769">
 <summary>
 Do not audit attempts to send pulseaudio_server packets.
 </summary>
@@ -52118,7 +40795,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="51788">
 <summary>
 Receive pulseaudio_server packets.
 </summary>
@@ -52129,7 +40806,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="51807">
 <summary>
 Do not audit attempts to receive pulseaudio_server packets.
 </summary>
@@ -52140,7 +40817,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="51826">
 <summary>
 Send and receive pulseaudio_server packets.
 </summary>
@@ -52151,7 +40828,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="51842">
 <summary>
 Do not audit attempts to send and receive pulseaudio_server packets.
 </summary>
@@ -52162,7 +40839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="51857">
 <summary>
 Relabel packets to pulseaudio_server the packet type.
 </summary>
@@ -52172,85 +40849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255">
-<summary>
-Send and receive TCP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_puppet_port" lineno="67270">
-<summary>
-Send UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285">
-<summary>
-Do not audit attempts to send UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="67300">
-<summary>
-Receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315">
-<summary>
-Do not audit attempts to receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330">
-<summary>
-Send and receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="67361">
+<interface name="corenet_tcp_bind_puppet_port" lineno="51879">
 <summary>
 Bind TCP sockets to the puppet port.
 </summary>
@@ -52261,7 +40860,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="67381">
+<interface name="corenet_udp_bind_puppet_port" lineno="51899">
 <summary>
 Bind UDP sockets to the puppet port.
 </summary>
@@ -52272,7 +40871,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="67400">
+<interface name="corenet_tcp_connect_puppet_port" lineno="51918">
 <summary>
 Make a TCP connection to the puppet port.
 </summary>
@@ -52282,7 +40881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_client_packets" lineno="67420">
+<interface name="corenet_send_puppet_client_packets" lineno="51938">
 <summary>
 Send puppet_client packets.
 </summary>
@@ -52293,7 +40892,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="51957">
 <summary>
 Do not audit attempts to send puppet_client packets.
 </summary>
@@ -52304,7 +40903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="67458">
+<interface name="corenet_receive_puppet_client_packets" lineno="51976">
 <summary>
 Receive puppet_client packets.
 </summary>
@@ -52315,7 +40914,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="51995">
 <summary>
 Do not audit attempts to receive puppet_client packets.
 </summary>
@@ -52326,7 +40925,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="52014">
 <summary>
 Send and receive puppet_client packets.
 </summary>
@@ -52337,7 +40936,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="52030">
 <summary>
 Do not audit attempts to send and receive puppet_client packets.
 </summary>
@@ -52348,7 +40947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="67527">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="52045">
 <summary>
 Relabel packets to puppet_client the packet type.
 </summary>
@@ -52358,7 +40957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppet_server_packets" lineno="67547">
+<interface name="corenet_send_puppet_server_packets" lineno="52065">
 <summary>
 Send puppet_server packets.
 </summary>
@@ -52369,7 +40968,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="52084">
 <summary>
 Do not audit attempts to send puppet_server packets.
 </summary>
@@ -52380,7 +40979,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67585">
+<interface name="corenet_receive_puppet_server_packets" lineno="52103">
 <summary>
 Receive puppet_server packets.
 </summary>
@@ -52391,7 +40990,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="52122">
 <summary>
 Do not audit attempts to receive puppet_server packets.
 </summary>
@@ -52402,7 +41001,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="52141">
 <summary>
 Send and receive puppet_server packets.
 </summary>
@@ -52413,7 +41012,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="52157">
 <summary>
 Do not audit attempts to send and receive puppet_server packets.
 </summary>
@@ -52424,7 +41023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67654">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="52172">
 <summary>
 Relabel packets to puppet_server the packet type.
 </summary>
@@ -52434,85 +41033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676">
-<summary>
-Send and receive TCP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67691">
-<summary>
-Send UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706">
-<summary>
-Do not audit attempts to send UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67721">
-<summary>
-Receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736">
-<summary>
-Do not audit attempts to receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751">
-<summary>
-Send and receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="52194">
 <summary>
 Bind TCP sockets to the puppetclient port.
 </summary>
@@ -52523,7 +41044,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67802">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="52214">
 <summary>
 Bind UDP sockets to the puppetclient port.
 </summary>
@@ -52534,7 +41055,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="52233">
 <summary>
 Make a TCP connection to the puppetclient port.
 </summary>
@@ -52544,7 +41065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67841">
+<interface name="corenet_send_puppetclient_client_packets" lineno="52253">
 <summary>
 Send puppetclient_client packets.
 </summary>
@@ -52555,7 +41076,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="52272">
 <summary>
 Do not audit attempts to send puppetclient_client packets.
 </summary>
@@ -52566,7 +41087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67879">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="52291">
 <summary>
 Receive puppetclient_client packets.
 </summary>
@@ -52577,7 +41098,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="52310">
 <summary>
 Do not audit attempts to receive puppetclient_client packets.
 </summary>
@@ -52588,7 +41109,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="52329">
 <summary>
 Send and receive puppetclient_client packets.
 </summary>
@@ -52599,7 +41120,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="52345">
 <summary>
 Do not audit attempts to send and receive puppetclient_client packets.
 </summary>
@@ -52610,7 +41131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="52360">
 <summary>
 Relabel packets to puppetclient_client the packet type.
 </summary>
@@ -52620,7 +41141,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67968">
+<interface name="corenet_send_puppetclient_server_packets" lineno="52380">
 <summary>
 Send puppetclient_server packets.
 </summary>
@@ -52631,7 +41152,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="52399">
 <summary>
 Do not audit attempts to send puppetclient_server packets.
 </summary>
@@ -52642,7 +41163,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="68006">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="52418">
 <summary>
 Receive puppetclient_server packets.
 </summary>
@@ -52653,7 +41174,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="52437">
 <summary>
 Do not audit attempts to receive puppetclient_server packets.
 </summary>
@@ -52664,7 +41185,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="52456">
 <summary>
 Send and receive puppetclient_server packets.
 </summary>
@@ -52675,7 +41196,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="52472">
 <summary>
 Do not audit attempts to send and receive puppetclient_server packets.
 </summary>
@@ -52686,7 +41207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="52487">
 <summary>
 Relabel packets to puppetclient_server the packet type.
 </summary>
@@ -52696,85 +41217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097">
-<summary>
-Send and receive TCP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pxe_port" lineno="68112">
-<summary>
-Send UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127">
-<summary>
-Do not audit attempts to send UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="68142">
-<summary>
-Receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157">
-<summary>
-Do not audit attempts to receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172">
-<summary>
-Send and receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="68203">
+<interface name="corenet_tcp_bind_pxe_port" lineno="52509">
 <summary>
 Bind TCP sockets to the pxe port.
 </summary>
@@ -52785,7 +41228,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="68223">
+<interface name="corenet_udp_bind_pxe_port" lineno="52529">
 <summary>
 Bind UDP sockets to the pxe port.
 </summary>
@@ -52796,7 +41239,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="68242">
+<interface name="corenet_tcp_connect_pxe_port" lineno="52548">
 <summary>
 Make a TCP connection to the pxe port.
 </summary>
@@ -52806,7 +41249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_client_packets" lineno="68262">
+<interface name="corenet_send_pxe_client_packets" lineno="52568">
 <summary>
 Send pxe_client packets.
 </summary>
@@ -52817,7 +41260,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="52587">
 <summary>
 Do not audit attempts to send pxe_client packets.
 </summary>
@@ -52828,7 +41271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="68300">
+<interface name="corenet_receive_pxe_client_packets" lineno="52606">
 <summary>
 Receive pxe_client packets.
 </summary>
@@ -52839,7 +41282,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="52625">
 <summary>
 Do not audit attempts to receive pxe_client packets.
 </summary>
@@ -52850,7 +41293,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="52644">
 <summary>
 Send and receive pxe_client packets.
 </summary>
@@ -52861,7 +41304,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="52660">
 <summary>
 Do not audit attempts to send and receive pxe_client packets.
 </summary>
@@ -52872,7 +41315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="68369">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="52675">
 <summary>
 Relabel packets to pxe_client the packet type.
 </summary>
@@ -52882,7 +41325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pxe_server_packets" lineno="68389">
+<interface name="corenet_send_pxe_server_packets" lineno="52695">
 <summary>
 Send pxe_server packets.
 </summary>
@@ -52893,7 +41336,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="52714">
 <summary>
 Do not audit attempts to send pxe_server packets.
 </summary>
@@ -52904,7 +41347,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="68427">
+<interface name="corenet_receive_pxe_server_packets" lineno="52733">
 <summary>
 Receive pxe_server packets.
 </summary>
@@ -52915,7 +41358,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="52752">
 <summary>
 Do not audit attempts to receive pxe_server packets.
 </summary>
@@ -52926,7 +41369,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="52771">
 <summary>
 Send and receive pxe_server packets.
 </summary>
@@ -52937,7 +41380,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="52787">
 <summary>
 Do not audit attempts to send and receive pxe_server packets.
 </summary>
@@ -52948,7 +41391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="68496">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="52802">
 <summary>
 Relabel packets to pxe_server the packet type.
 </summary>
@@ -52958,85 +41401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518">
-<summary>
-Send and receive TCP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="68533">
-<summary>
-Send UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548">
-<summary>
-Do not audit attempts to send UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68563">
-<summary>
-Receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578">
-<summary>
-Do not audit attempts to receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593">
-<summary>
-Send and receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68624">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="52824">
 <summary>
 Bind TCP sockets to the pyzor port.
 </summary>
@@ -53047,7 +41412,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68644">
+<interface name="corenet_udp_bind_pyzor_port" lineno="52844">
 <summary>
 Bind UDP sockets to the pyzor port.
 </summary>
@@ -53058,7 +41423,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68663">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="52863">
 <summary>
 Make a TCP connection to the pyzor port.
 </summary>
@@ -53068,7 +41433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68683">
+<interface name="corenet_send_pyzor_client_packets" lineno="52883">
 <summary>
 Send pyzor_client packets.
 </summary>
@@ -53079,7 +41444,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="52902">
 <summary>
 Do not audit attempts to send pyzor_client packets.
 </summary>
@@ -53090,7 +41455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68721">
+<interface name="corenet_receive_pyzor_client_packets" lineno="52921">
 <summary>
 Receive pyzor_client packets.
 </summary>
@@ -53101,7 +41466,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="52940">
 <summary>
 Do not audit attempts to receive pyzor_client packets.
 </summary>
@@ -53112,7 +41477,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="52959">
 <summary>
 Send and receive pyzor_client packets.
 </summary>
@@ -53123,7 +41488,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="52975">
 <summary>
 Do not audit attempts to send and receive pyzor_client packets.
 </summary>
@@ -53134,7 +41499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="52990">
 <summary>
 Relabel packets to pyzor_client the packet type.
 </summary>
@@ -53144,7 +41509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68810">
+<interface name="corenet_send_pyzor_server_packets" lineno="53010">
 <summary>
 Send pyzor_server packets.
 </summary>
@@ -53155,7 +41520,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="53029">
 <summary>
 Do not audit attempts to send pyzor_server packets.
 </summary>
@@ -53166,7 +41531,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68848">
+<interface name="corenet_receive_pyzor_server_packets" lineno="53048">
 <summary>
 Receive pyzor_server packets.
 </summary>
@@ -53177,7 +41542,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="53067">
 <summary>
 Do not audit attempts to receive pyzor_server packets.
 </summary>
@@ -53188,7 +41553,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="53086">
 <summary>
 Send and receive pyzor_server packets.
 </summary>
@@ -53199,7 +41564,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="53102">
 <summary>
 Do not audit attempts to send and receive pyzor_server packets.
 </summary>
@@ -53210,7 +41575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="53117">
 <summary>
 Relabel packets to pyzor_server the packet type.
 </summary>
@@ -53220,85 +41585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939">
-<summary>
-Send and receive TCP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68954">
-<summary>
-Send UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969">
-<summary>
-Do not audit attempts to send UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68984">
-<summary>
-Receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999">
-<summary>
-Do not audit attempts to receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014">
-<summary>
-Send and receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="69045">
+<interface name="corenet_tcp_bind_radacct_port" lineno="53139">
 <summary>
 Bind TCP sockets to the radacct port.
 </summary>
@@ -53309,7 +41596,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="69065">
+<interface name="corenet_udp_bind_radacct_port" lineno="53159">
 <summary>
 Bind UDP sockets to the radacct port.
 </summary>
@@ -53320,7 +41607,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="69084">
+<interface name="corenet_tcp_connect_radacct_port" lineno="53178">
 <summary>
 Make a TCP connection to the radacct port.
 </summary>
@@ -53330,7 +41617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_client_packets" lineno="69104">
+<interface name="corenet_send_radacct_client_packets" lineno="53198">
 <summary>
 Send radacct_client packets.
 </summary>
@@ -53341,7 +41628,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="53217">
 <summary>
 Do not audit attempts to send radacct_client packets.
 </summary>
@@ -53352,7 +41639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="69142">
+<interface name="corenet_receive_radacct_client_packets" lineno="53236">
 <summary>
 Receive radacct_client packets.
 </summary>
@@ -53363,7 +41650,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="53255">
 <summary>
 Do not audit attempts to receive radacct_client packets.
 </summary>
@@ -53374,7 +41661,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="53274">
 <summary>
 Send and receive radacct_client packets.
 </summary>
@@ -53385,7 +41672,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="53290">
 <summary>
 Do not audit attempts to send and receive radacct_client packets.
 </summary>
@@ -53396,7 +41683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="69211">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="53305">
 <summary>
 Relabel packets to radacct_client the packet type.
 </summary>
@@ -53406,7 +41693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radacct_server_packets" lineno="69231">
+<interface name="corenet_send_radacct_server_packets" lineno="53325">
 <summary>
 Send radacct_server packets.
 </summary>
@@ -53417,7 +41704,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="53344">
 <summary>
 Do not audit attempts to send radacct_server packets.
 </summary>
@@ -53428,7 +41715,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="69269">
+<interface name="corenet_receive_radacct_server_packets" lineno="53363">
 <summary>
 Receive radacct_server packets.
 </summary>
@@ -53439,7 +41726,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="53382">
 <summary>
 Do not audit attempts to receive radacct_server packets.
 </summary>
@@ -53450,7 +41737,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="53401">
 <summary>
 Send and receive radacct_server packets.
 </summary>
@@ -53461,7 +41748,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="53417">
 <summary>
 Do not audit attempts to send and receive radacct_server packets.
 </summary>
@@ -53472,7 +41759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="69338">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="53432">
 <summary>
 Relabel packets to radacct_server the packet type.
 </summary>
@@ -53482,85 +41769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360">
-<summary>
-Send and receive TCP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radius_port" lineno="69375">
-<summary>
-Send UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390">
-<summary>
-Do not audit attempts to send UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radius_port" lineno="69405">
-<summary>
-Receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420">
-<summary>
-Do not audit attempts to receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="69435">
-<summary>
-Send and receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="69466">
+<interface name="corenet_tcp_bind_radius_port" lineno="53454">
 <summary>
 Bind TCP sockets to the radius port.
 </summary>
@@ -53571,7 +41780,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radius_port" lineno="69486">
+<interface name="corenet_udp_bind_radius_port" lineno="53474">
 <summary>
 Bind UDP sockets to the radius port.
 </summary>
@@ -53582,7 +41791,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="69505">
+<interface name="corenet_tcp_connect_radius_port" lineno="53493">
 <summary>
 Make a TCP connection to the radius port.
 </summary>
@@ -53592,7 +41801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_client_packets" lineno="69525">
+<interface name="corenet_send_radius_client_packets" lineno="53513">
 <summary>
 Send radius_client packets.
 </summary>
@@ -53603,7 +41812,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="53532">
 <summary>
 Do not audit attempts to send radius_client packets.
 </summary>
@@ -53614,7 +41823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69563">
+<interface name="corenet_receive_radius_client_packets" lineno="53551">
 <summary>
 Receive radius_client packets.
 </summary>
@@ -53625,7 +41834,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="53570">
 <summary>
 Do not audit attempts to receive radius_client packets.
 </summary>
@@ -53636,7 +41845,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69601">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="53589">
 <summary>
 Send and receive radius_client packets.
 </summary>
@@ -53647,7 +41856,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="53605">
 <summary>
 Do not audit attempts to send and receive radius_client packets.
 </summary>
@@ -53658,7 +41867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69632">
+<interface name="corenet_relabelto_radius_client_packets" lineno="53620">
 <summary>
 Relabel packets to radius_client the packet type.
 </summary>
@@ -53668,7 +41877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radius_server_packets" lineno="69652">
+<interface name="corenet_send_radius_server_packets" lineno="53640">
 <summary>
 Send radius_server packets.
 </summary>
@@ -53679,7 +41888,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="53659">
 <summary>
 Do not audit attempts to send radius_server packets.
 </summary>
@@ -53690,7 +41899,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69690">
+<interface name="corenet_receive_radius_server_packets" lineno="53678">
 <summary>
 Receive radius_server packets.
 </summary>
@@ -53701,7 +41910,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="53697">
 <summary>
 Do not audit attempts to receive radius_server packets.
 </summary>
@@ -53712,7 +41921,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69728">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="53716">
 <summary>
 Send and receive radius_server packets.
 </summary>
@@ -53723,7 +41932,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="53732">
 <summary>
 Do not audit attempts to send and receive radius_server packets.
 </summary>
@@ -53734,7 +41943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69759">
+<interface name="corenet_relabelto_radius_server_packets" lineno="53747">
 <summary>
 Relabel packets to radius_server the packet type.
 </summary>
@@ -53744,85 +41953,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781">
-<summary>
-Send and receive TCP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69796">
-<summary>
-Send UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811">
-<summary>
-Do not audit attempts to send UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69826">
-<summary>
-Receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841">
-<summary>
-Do not audit attempts to receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856">
-<summary>
-Send and receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69887">
+<interface name="corenet_tcp_bind_radsec_port" lineno="53769">
 <summary>
 Bind TCP sockets to the radsec port.
 </summary>
@@ -53833,7 +41964,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69907">
+<interface name="corenet_udp_bind_radsec_port" lineno="53789">
 <summary>
 Bind UDP sockets to the radsec port.
 </summary>
@@ -53844,7 +41975,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69926">
+<interface name="corenet_tcp_connect_radsec_port" lineno="53808">
 <summary>
 Make a TCP connection to the radsec port.
 </summary>
@@ -53854,7 +41985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69946">
+<interface name="corenet_send_radsec_client_packets" lineno="53828">
 <summary>
 Send radsec_client packets.
 </summary>
@@ -53865,7 +41996,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="53847">
 <summary>
 Do not audit attempts to send radsec_client packets.
 </summary>
@@ -53876,7 +42007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69984">
+<interface name="corenet_receive_radsec_client_packets" lineno="53866">
 <summary>
 Receive radsec_client packets.
 </summary>
@@ -53887,7 +42018,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="53885">
 <summary>
 Do not audit attempts to receive radsec_client packets.
 </summary>
@@ -53898,7 +42029,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="53904">
 <summary>
 Send and receive radsec_client packets.
 </summary>
@@ -53909,7 +42040,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="53920">
 <summary>
 Do not audit attempts to send and receive radsec_client packets.
 </summary>
@@ -53920,7 +42051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="70053">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="53935">
 <summary>
 Relabel packets to radsec_client the packet type.
 </summary>
@@ -53930,7 +42061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_radsec_server_packets" lineno="70073">
+<interface name="corenet_send_radsec_server_packets" lineno="53955">
 <summary>
 Send radsec_server packets.
 </summary>
@@ -53941,7 +42072,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="53974">
 <summary>
 Do not audit attempts to send radsec_server packets.
 </summary>
@@ -53952,7 +42083,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="70111">
+<interface name="corenet_receive_radsec_server_packets" lineno="53993">
 <summary>
 Receive radsec_server packets.
 </summary>
@@ -53963,7 +42094,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="54012">
 <summary>
 Do not audit attempts to receive radsec_server packets.
 </summary>
@@ -53974,7 +42105,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="54031">
 <summary>
 Send and receive radsec_server packets.
 </summary>
@@ -53985,7 +42116,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="54047">
 <summary>
 Do not audit attempts to send and receive radsec_server packets.
 </summary>
@@ -53996,7 +42127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="70180">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="54062">
 <summary>
 Relabel packets to radsec_server the packet type.
 </summary>
@@ -54006,85 +42137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202">
-<summary>
-Send and receive TCP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_razor_port" lineno="70217">
-<summary>
-Send UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232">
-<summary>
-Do not audit attempts to send UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_razor_port" lineno="70247">
-<summary>
-Receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262">
-<summary>
-Do not audit attempts to receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="70277">
-<summary>
-Send and receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="70308">
+<interface name="corenet_tcp_bind_razor_port" lineno="54084">
 <summary>
 Bind TCP sockets to the razor port.
 </summary>
@@ -54095,7 +42148,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_razor_port" lineno="70328">
+<interface name="corenet_udp_bind_razor_port" lineno="54104">
 <summary>
 Bind UDP sockets to the razor port.
 </summary>
@@ -54106,7 +42159,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="70347">
+<interface name="corenet_tcp_connect_razor_port" lineno="54123">
 <summary>
 Make a TCP connection to the razor port.
 </summary>
@@ -54116,7 +42169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_client_packets" lineno="70367">
+<interface name="corenet_send_razor_client_packets" lineno="54143">
 <summary>
 Send razor_client packets.
 </summary>
@@ -54127,7 +42180,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="54162">
 <summary>
 Do not audit attempts to send razor_client packets.
 </summary>
@@ -54138,7 +42191,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_client_packets" lineno="70405">
+<interface name="corenet_receive_razor_client_packets" lineno="54181">
 <summary>
 Receive razor_client packets.
 </summary>
@@ -54149,7 +42202,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="54200">
 <summary>
 Do not audit attempts to receive razor_client packets.
 </summary>
@@ -54160,7 +42213,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="70443">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="54219">
 <summary>
 Send and receive razor_client packets.
 </summary>
@@ -54171,7 +42224,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="54235">
 <summary>
 Do not audit attempts to send and receive razor_client packets.
 </summary>
@@ -54182,7 +42235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="70474">
+<interface name="corenet_relabelto_razor_client_packets" lineno="54250">
 <summary>
 Relabel packets to razor_client the packet type.
 </summary>
@@ -54192,7 +42245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_razor_server_packets" lineno="70494">
+<interface name="corenet_send_razor_server_packets" lineno="54270">
 <summary>
 Send razor_server packets.
 </summary>
@@ -54203,7 +42256,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="54289">
 <summary>
 Do not audit attempts to send razor_server packets.
 </summary>
@@ -54214,7 +42267,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_razor_server_packets" lineno="70532">
+<interface name="corenet_receive_razor_server_packets" lineno="54308">
 <summary>
 Receive razor_server packets.
 </summary>
@@ -54225,7 +42278,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="54327">
 <summary>
 Do not audit attempts to receive razor_server packets.
 </summary>
@@ -54236,7 +42289,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70570">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="54346">
 <summary>
 Send and receive razor_server packets.
 </summary>
@@ -54247,7 +42300,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="54362">
 <summary>
 Do not audit attempts to send and receive razor_server packets.
 </summary>
@@ -54258,7 +42311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70601">
+<interface name="corenet_relabelto_razor_server_packets" lineno="54377">
 <summary>
 Relabel packets to razor_server the packet type.
 </summary>
@@ -54268,85 +42321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623">
-<summary>
-Send and receive TCP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_redis_port" lineno="70638">
-<summary>
-Send UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653">
-<summary>
-Do not audit attempts to send UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70668">
-<summary>
-Receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683">
-<summary>
-Do not audit attempts to receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70698">
-<summary>
-Send and receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70729">
+<interface name="corenet_tcp_bind_redis_port" lineno="54399">
 <summary>
 Bind TCP sockets to the redis port.
 </summary>
@@ -54357,7 +42332,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70749">
+<interface name="corenet_udp_bind_redis_port" lineno="54419">
 <summary>
 Bind UDP sockets to the redis port.
 </summary>
@@ -54368,7 +42343,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70768">
+<interface name="corenet_tcp_connect_redis_port" lineno="54438">
 <summary>
 Make a TCP connection to the redis port.
 </summary>
@@ -54378,7 +42353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_client_packets" lineno="70788">
+<interface name="corenet_send_redis_client_packets" lineno="54458">
 <summary>
 Send redis_client packets.
 </summary>
@@ -54389,7 +42364,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="54477">
 <summary>
 Do not audit attempts to send redis_client packets.
 </summary>
@@ -54400,7 +42375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70826">
+<interface name="corenet_receive_redis_client_packets" lineno="54496">
 <summary>
 Receive redis_client packets.
 </summary>
@@ -54411,7 +42386,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="54515">
 <summary>
 Do not audit attempts to receive redis_client packets.
 </summary>
@@ -54422,7 +42397,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70864">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="54534">
 <summary>
 Send and receive redis_client packets.
 </summary>
@@ -54433,7 +42408,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="54550">
 <summary>
 Do not audit attempts to send and receive redis_client packets.
 </summary>
@@ -54444,7 +42419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70895">
+<interface name="corenet_relabelto_redis_client_packets" lineno="54565">
 <summary>
 Relabel packets to redis_client the packet type.
 </summary>
@@ -54454,7 +42429,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_redis_server_packets" lineno="70915">
+<interface name="corenet_send_redis_server_packets" lineno="54585">
 <summary>
 Send redis_server packets.
 </summary>
@@ -54465,7 +42440,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="54604">
 <summary>
 Do not audit attempts to send redis_server packets.
 </summary>
@@ -54476,7 +42451,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70953">
+<interface name="corenet_receive_redis_server_packets" lineno="54623">
 <summary>
 Receive redis_server packets.
 </summary>
@@ -54487,7 +42462,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="54642">
 <summary>
 Do not audit attempts to receive redis_server packets.
 </summary>
@@ -54498,7 +42473,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70991">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="54661">
 <summary>
 Send and receive redis_server packets.
 </summary>
@@ -54509,7 +42484,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="54677">
 <summary>
 Do not audit attempts to send and receive redis_server packets.
 </summary>
@@ -54520,7 +42495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="71022">
+<interface name="corenet_relabelto_redis_server_packets" lineno="54692">
 <summary>
 Relabel packets to redis_server the packet type.
 </summary>
@@ -54530,85 +42505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044">
-<summary>
-Send and receive TCP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_repository_port" lineno="71059">
-<summary>
-Send UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074">
-<summary>
-Do not audit attempts to send UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_repository_port" lineno="71089">
-<summary>
-Receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104">
-<summary>
-Do not audit attempts to receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="71119">
-<summary>
-Send and receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="71150">
+<interface name="corenet_tcp_bind_repository_port" lineno="54714">
 <summary>
 Bind TCP sockets to the repository port.
 </summary>
@@ -54619,7 +42516,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_repository_port" lineno="71170">
+<interface name="corenet_udp_bind_repository_port" lineno="54734">
 <summary>
 Bind UDP sockets to the repository port.
 </summary>
@@ -54630,7 +42527,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="71189">
+<interface name="corenet_tcp_connect_repository_port" lineno="54753">
 <summary>
 Make a TCP connection to the repository port.
 </summary>
@@ -54640,7 +42537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_client_packets" lineno="71209">
+<interface name="corenet_send_repository_client_packets" lineno="54773">
 <summary>
 Send repository_client packets.
 </summary>
@@ -54651,7 +42548,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="54792">
 <summary>
 Do not audit attempts to send repository_client packets.
 </summary>
@@ -54662,7 +42559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_client_packets" lineno="71247">
+<interface name="corenet_receive_repository_client_packets" lineno="54811">
 <summary>
 Receive repository_client packets.
 </summary>
@@ -54673,7 +42570,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="54830">
 <summary>
 Do not audit attempts to receive repository_client packets.
 </summary>
@@ -54684,7 +42581,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="71285">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="54849">
 <summary>
 Send and receive repository_client packets.
 </summary>
@@ -54695,7 +42592,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="54865">
 <summary>
 Do not audit attempts to send and receive repository_client packets.
 </summary>
@@ -54706,7 +42603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="71316">
+<interface name="corenet_relabelto_repository_client_packets" lineno="54880">
 <summary>
 Relabel packets to repository_client the packet type.
 </summary>
@@ -54716,7 +42613,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_repository_server_packets" lineno="71336">
+<interface name="corenet_send_repository_server_packets" lineno="54900">
 <summary>
 Send repository_server packets.
 </summary>
@@ -54727,7 +42624,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="54919">
 <summary>
 Do not audit attempts to send repository_server packets.
 </summary>
@@ -54738,7 +42635,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_repository_server_packets" lineno="71374">
+<interface name="corenet_receive_repository_server_packets" lineno="54938">
 <summary>
 Receive repository_server packets.
 </summary>
@@ -54749,7 +42646,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="54957">
 <summary>
 Do not audit attempts to receive repository_server packets.
 </summary>
@@ -54760,7 +42657,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="71412">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="54976">
 <summary>
 Send and receive repository_server packets.
 </summary>
@@ -54771,7 +42668,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="54992">
 <summary>
 Do not audit attempts to send and receive repository_server packets.
 </summary>
@@ -54782,7 +42679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="71443">
+<interface name="corenet_relabelto_repository_server_packets" lineno="55007">
 <summary>
 Relabel packets to repository_server the packet type.
 </summary>
@@ -54792,85 +42689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465">
-<summary>
-Send and receive TCP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ricci_port" lineno="71480">
-<summary>
-Send UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495">
-<summary>
-Do not audit attempts to send UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="71510">
-<summary>
-Receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525">
-<summary>
-Do not audit attempts to receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540">
-<summary>
-Send and receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71571">
+<interface name="corenet_tcp_bind_ricci_port" lineno="55029">
 <summary>
 Bind TCP sockets to the ricci port.
 </summary>
@@ -54881,7 +42700,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71591">
+<interface name="corenet_udp_bind_ricci_port" lineno="55049">
 <summary>
 Bind UDP sockets to the ricci port.
 </summary>
@@ -54892,7 +42711,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71610">
+<interface name="corenet_tcp_connect_ricci_port" lineno="55068">
 <summary>
 Make a TCP connection to the ricci port.
 </summary>
@@ -54902,7 +42721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71630">
+<interface name="corenet_send_ricci_client_packets" lineno="55088">
 <summary>
 Send ricci_client packets.
 </summary>
@@ -54913,7 +42732,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="55107">
 <summary>
 Do not audit attempts to send ricci_client packets.
 </summary>
@@ -54924,7 +42743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71668">
+<interface name="corenet_receive_ricci_client_packets" lineno="55126">
 <summary>
 Receive ricci_client packets.
 </summary>
@@ -54935,7 +42754,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="55145">
 <summary>
 Do not audit attempts to receive ricci_client packets.
 </summary>
@@ -54946,7 +42765,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="55164">
 <summary>
 Send and receive ricci_client packets.
 </summary>
@@ -54957,7 +42776,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="55180">
 <summary>
 Do not audit attempts to send and receive ricci_client packets.
 </summary>
@@ -54968,7 +42787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71737">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="55195">
 <summary>
 Relabel packets to ricci_client the packet type.
 </summary>
@@ -54978,7 +42797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71757">
+<interface name="corenet_send_ricci_server_packets" lineno="55215">
 <summary>
 Send ricci_server packets.
 </summary>
@@ -54989,7 +42808,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="55234">
 <summary>
 Do not audit attempts to send ricci_server packets.
 </summary>
@@ -55000,7 +42819,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71795">
+<interface name="corenet_receive_ricci_server_packets" lineno="55253">
 <summary>
 Receive ricci_server packets.
 </summary>
@@ -55011,7 +42830,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="55272">
 <summary>
 Do not audit attempts to receive ricci_server packets.
 </summary>
@@ -55022,7 +42841,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="55291">
 <summary>
 Send and receive ricci_server packets.
 </summary>
@@ -55033,7 +42852,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="55307">
 <summary>
 Do not audit attempts to send and receive ricci_server packets.
 </summary>
@@ -55044,7 +42863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71864">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="55322">
 <summary>
 Relabel packets to ricci_server the packet type.
 </summary>
@@ -55054,85 +42873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886">
-<summary>
-Send and receive TCP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901">
-<summary>
-Send UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916">
-<summary>
-Do not audit attempts to send UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931">
-<summary>
-Receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946">
-<summary>
-Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961">
-<summary>
-Send and receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="55344">
 <summary>
 Bind TCP sockets to the ricci_modcluster port.
 </summary>
@@ -55143,7 +42884,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="55364">
 <summary>
 Bind UDP sockets to the ricci_modcluster port.
 </summary>
@@ -55154,7 +42895,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="55383">
 <summary>
 Make a TCP connection to the ricci_modcluster port.
 </summary>
@@ -55164,7 +42905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="55403">
 <summary>
 Send ricci_modcluster_client packets.
 </summary>
@@ -55175,7 +42916,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="55422">
 <summary>
 Do not audit attempts to send ricci_modcluster_client packets.
 </summary>
@@ -55186,7 +42927,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="55441">
 <summary>
 Receive ricci_modcluster_client packets.
 </summary>
@@ -55197,7 +42938,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="55460">
 <summary>
 Do not audit attempts to receive ricci_modcluster_client packets.
 </summary>
@@ -55208,7 +42949,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="55479">
 <summary>
 Send and receive ricci_modcluster_client packets.
 </summary>
@@ -55219,7 +42960,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="55495">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_client packets.
 </summary>
@@ -55230,7 +42971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="55510">
 <summary>
 Relabel packets to ricci_modcluster_client the packet type.
 </summary>
@@ -55240,7 +42981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="55530">
 <summary>
 Send ricci_modcluster_server packets.
 </summary>
@@ -55251,7 +42992,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="55549">
 <summary>
 Do not audit attempts to send ricci_modcluster_server packets.
 </summary>
@@ -55262,7 +43003,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="55568">
 <summary>
 Receive ricci_modcluster_server packets.
 </summary>
@@ -55273,7 +43014,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="55587">
 <summary>
 Do not audit attempts to receive ricci_modcluster_server packets.
 </summary>
@@ -55284,7 +43025,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="55606">
 <summary>
 Send and receive ricci_modcluster_server packets.
 </summary>
@@ -55295,7 +43036,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="55622">
 <summary>
 Do not audit attempts to send and receive ricci_modcluster_server packets.
 </summary>
@@ -55306,7 +43047,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="55637">
 <summary>
 Relabel packets to ricci_modcluster_server the packet type.
 </summary>
@@ -55316,85 +43057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307">
-<summary>
-Send and receive TCP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="72322">
-<summary>
-Send UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337">
-<summary>
-Do not audit attempts to send UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="72352">
-<summary>
-Receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367">
-<summary>
-Do not audit attempts to receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382">
-<summary>
-Send and receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="72413">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="55659">
 <summary>
 Bind TCP sockets to the rlogind port.
 </summary>
@@ -55405,7 +43068,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="72433">
+<interface name="corenet_udp_bind_rlogind_port" lineno="55679">
 <summary>
 Bind UDP sockets to the rlogind port.
 </summary>
@@ -55416,7 +43079,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="72452">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="55698">
 <summary>
 Make a TCP connection to the rlogind port.
 </summary>
@@ -55426,7 +43089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="72472">
+<interface name="corenet_send_rlogind_client_packets" lineno="55718">
 <summary>
 Send rlogind_client packets.
 </summary>
@@ -55437,7 +43100,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="55737">
 <summary>
 Do not audit attempts to send rlogind_client packets.
 </summary>
@@ -55448,7 +43111,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="72510">
+<interface name="corenet_receive_rlogind_client_packets" lineno="55756">
 <summary>
 Receive rlogind_client packets.
 </summary>
@@ -55459,7 +43122,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="55775">
 <summary>
 Do not audit attempts to receive rlogind_client packets.
 </summary>
@@ -55470,7 +43133,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="55794">
 <summary>
 Send and receive rlogind_client packets.
 </summary>
@@ -55481,7 +43144,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="55810">
 <summary>
 Do not audit attempts to send and receive rlogind_client packets.
 </summary>
@@ -55492,7 +43155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="55825">
 <summary>
 Relabel packets to rlogind_client the packet type.
 </summary>
@@ -55502,7 +43165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72599">
+<interface name="corenet_send_rlogind_server_packets" lineno="55845">
 <summary>
 Send rlogind_server packets.
 </summary>
@@ -55513,7 +43176,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="55864">
 <summary>
 Do not audit attempts to send rlogind_server packets.
 </summary>
@@ -55524,7 +43187,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72637">
+<interface name="corenet_receive_rlogind_server_packets" lineno="55883">
 <summary>
 Receive rlogind_server packets.
 </summary>
@@ -55535,7 +43198,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="55902">
 <summary>
 Do not audit attempts to receive rlogind_server packets.
 </summary>
@@ -55546,7 +43209,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="55921">
 <summary>
 Send and receive rlogind_server packets.
 </summary>
@@ -55557,7 +43220,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="55937">
 <summary>
 Do not audit attempts to send and receive rlogind_server packets.
 </summary>
@@ -55568,7 +43231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="55952">
 <summary>
 Relabel packets to rlogind_server the packet type.
 </summary>
@@ -55578,85 +43241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728">
-<summary>
-Send and receive TCP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72743">
-<summary>
-Send UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758">
-<summary>
-Do not audit attempts to send UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72773">
-<summary>
-Receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788">
-<summary>
-Do not audit attempts to receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803">
-<summary>
-Send and receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72834">
+<interface name="corenet_tcp_bind_rndc_port" lineno="55974">
 <summary>
 Bind TCP sockets to the rndc port.
 </summary>
@@ -55667,7 +43252,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72854">
+<interface name="corenet_udp_bind_rndc_port" lineno="55994">
 <summary>
 Bind UDP sockets to the rndc port.
 </summary>
@@ -55678,7 +43263,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72873">
+<interface name="corenet_tcp_connect_rndc_port" lineno="56013">
 <summary>
 Make a TCP connection to the rndc port.
 </summary>
@@ -55688,7 +43273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72893">
+<interface name="corenet_send_rndc_client_packets" lineno="56033">
 <summary>
 Send rndc_client packets.
 </summary>
@@ -55699,7 +43284,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="56052">
 <summary>
 Do not audit attempts to send rndc_client packets.
 </summary>
@@ -55710,7 +43295,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72931">
+<interface name="corenet_receive_rndc_client_packets" lineno="56071">
 <summary>
 Receive rndc_client packets.
 </summary>
@@ -55721,7 +43306,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="56090">
 <summary>
 Do not audit attempts to receive rndc_client packets.
 </summary>
@@ -55732,7 +43317,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="56109">
 <summary>
 Send and receive rndc_client packets.
 </summary>
@@ -55743,7 +43328,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="56125">
 <summary>
 Do not audit attempts to send and receive rndc_client packets.
 </summary>
@@ -55754,7 +43339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="73000">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="56140">
 <summary>
 Relabel packets to rndc_client the packet type.
 </summary>
@@ -55764,7 +43349,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rndc_server_packets" lineno="73020">
+<interface name="corenet_send_rndc_server_packets" lineno="56160">
 <summary>
 Send rndc_server packets.
 </summary>
@@ -55775,7 +43360,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="56179">
 <summary>
 Do not audit attempts to send rndc_server packets.
 </summary>
@@ -55786,7 +43371,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="73058">
+<interface name="corenet_receive_rndc_server_packets" lineno="56198">
 <summary>
 Receive rndc_server packets.
 </summary>
@@ -55797,7 +43382,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="56217">
 <summary>
 Do not audit attempts to receive rndc_server packets.
 </summary>
@@ -55808,7 +43393,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="56236">
 <summary>
 Send and receive rndc_server packets.
 </summary>
@@ -55819,7 +43404,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="56252">
 <summary>
 Do not audit attempts to send and receive rndc_server packets.
 </summary>
@@ -55830,7 +43415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="73127">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="56267">
 <summary>
 Relabel packets to rndc_server the packet type.
 </summary>
@@ -55840,85 +43425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="73149">
-<summary>
-Send and receive TCP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_router_port" lineno="73164">
-<summary>
-Send UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179">
-<summary>
-Do not audit attempts to send UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_router_port" lineno="73194">
-<summary>
-Receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209">
-<summary>
-Do not audit attempts to receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="73224">
-<summary>
-Send and receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_router_port" lineno="73255">
+<interface name="corenet_tcp_bind_router_port" lineno="56289">
 <summary>
 Bind TCP sockets to the router port.
 </summary>
@@ -55929,7 +43436,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_router_port" lineno="73275">
+<interface name="corenet_udp_bind_router_port" lineno="56309">
 <summary>
 Bind UDP sockets to the router port.
 </summary>
@@ -55940,7 +43447,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_router_port" lineno="73294">
+<interface name="corenet_tcp_connect_router_port" lineno="56328">
 <summary>
 Make a TCP connection to the router port.
 </summary>
@@ -55950,7 +43457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_client_packets" lineno="73314">
+<interface name="corenet_send_router_client_packets" lineno="56348">
 <summary>
 Send router_client packets.
 </summary>
@@ -55961,7 +43468,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="56367">
 <summary>
 Do not audit attempts to send router_client packets.
 </summary>
@@ -55972,7 +43479,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_client_packets" lineno="73352">
+<interface name="corenet_receive_router_client_packets" lineno="56386">
 <summary>
 Receive router_client packets.
 </summary>
@@ -55983,7 +43490,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="56405">
 <summary>
 Do not audit attempts to receive router_client packets.
 </summary>
@@ -55994,7 +43501,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="73390">
+<interface name="corenet_sendrecv_router_client_packets" lineno="56424">
 <summary>
 Send and receive router_client packets.
 </summary>
@@ -56005,7 +43512,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="56440">
 <summary>
 Do not audit attempts to send and receive router_client packets.
 </summary>
@@ -56016,7 +43523,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="73421">
+<interface name="corenet_relabelto_router_client_packets" lineno="56455">
 <summary>
 Relabel packets to router_client the packet type.
 </summary>
@@ -56026,7 +43533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_router_server_packets" lineno="73441">
+<interface name="corenet_send_router_server_packets" lineno="56475">
 <summary>
 Send router_server packets.
 </summary>
@@ -56037,7 +43544,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="56494">
 <summary>
 Do not audit attempts to send router_server packets.
 </summary>
@@ -56048,7 +43555,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_router_server_packets" lineno="73479">
+<interface name="corenet_receive_router_server_packets" lineno="56513">
 <summary>
 Receive router_server packets.
 </summary>
@@ -56059,7 +43566,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="56532">
 <summary>
 Do not audit attempts to receive router_server packets.
 </summary>
@@ -56070,7 +43577,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="73517">
+<interface name="corenet_sendrecv_router_server_packets" lineno="56551">
 <summary>
 Send and receive router_server packets.
 </summary>
@@ -56081,7 +43588,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="56567">
 <summary>
 Do not audit attempts to send and receive router_server packets.
 </summary>
@@ -56092,7 +43599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="73548">
+<interface name="corenet_relabelto_router_server_packets" lineno="56582">
 <summary>
 Relabel packets to router_server the packet type.
 </summary>
@@ -56102,85 +43609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570">
-<summary>
-Send and receive TCP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73585">
-<summary>
-Send UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600">
-<summary>
-Do not audit attempts to send UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73615">
-<summary>
-Receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630">
-<summary>
-Do not audit attempts to receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645">
-<summary>
-Send and receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73676">
+<interface name="corenet_tcp_bind_rsh_port" lineno="56604">
 <summary>
 Bind TCP sockets to the rsh port.
 </summary>
@@ -56191,7 +43620,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73696">
+<interface name="corenet_udp_bind_rsh_port" lineno="56624">
 <summary>
 Bind UDP sockets to the rsh port.
 </summary>
@@ -56202,7 +43631,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73715">
+<interface name="corenet_tcp_connect_rsh_port" lineno="56643">
 <summary>
 Make a TCP connection to the rsh port.
 </summary>
@@ -56212,7 +43641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73735">
+<interface name="corenet_send_rsh_client_packets" lineno="56663">
 <summary>
 Send rsh_client packets.
 </summary>
@@ -56223,7 +43652,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="56682">
 <summary>
 Do not audit attempts to send rsh_client packets.
 </summary>
@@ -56234,7 +43663,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73773">
+<interface name="corenet_receive_rsh_client_packets" lineno="56701">
 <summary>
 Receive rsh_client packets.
 </summary>
@@ -56245,7 +43674,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="56720">
 <summary>
 Do not audit attempts to receive rsh_client packets.
 </summary>
@@ -56256,7 +43685,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="56739">
 <summary>
 Send and receive rsh_client packets.
 </summary>
@@ -56267,7 +43696,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="56755">
 <summary>
 Do not audit attempts to send and receive rsh_client packets.
 </summary>
@@ -56278,7 +43707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73842">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="56770">
 <summary>
 Relabel packets to rsh_client the packet type.
 </summary>
@@ -56288,7 +43717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73862">
+<interface name="corenet_send_rsh_server_packets" lineno="56790">
 <summary>
 Send rsh_server packets.
 </summary>
@@ -56299,7 +43728,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="56809">
 <summary>
 Do not audit attempts to send rsh_server packets.
 </summary>
@@ -56310,7 +43739,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73900">
+<interface name="corenet_receive_rsh_server_packets" lineno="56828">
 <summary>
 Receive rsh_server packets.
 </summary>
@@ -56321,7 +43750,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="56847">
 <summary>
 Do not audit attempts to receive rsh_server packets.
 </summary>
@@ -56332,7 +43761,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="56866">
 <summary>
 Send and receive rsh_server packets.
 </summary>
@@ -56343,7 +43772,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="56882">
 <summary>
 Do not audit attempts to send and receive rsh_server packets.
 </summary>
@@ -56354,7 +43783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73969">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="56897">
 <summary>
 Relabel packets to rsh_server the packet type.
 </summary>
@@ -56364,85 +43793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991">
-<summary>
-Send and receive TCP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rsync_port" lineno="74006">
-<summary>
-Send UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021">
-<summary>
-Do not audit attempts to send UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="74036">
-<summary>
-Receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051">
-<summary>
-Do not audit attempts to receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066">
-<summary>
-Send and receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="74097">
+<interface name="corenet_tcp_bind_rsync_port" lineno="56919">
 <summary>
 Bind TCP sockets to the rsync port.
 </summary>
@@ -56453,7 +43804,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="74117">
+<interface name="corenet_udp_bind_rsync_port" lineno="56939">
 <summary>
 Bind UDP sockets to the rsync port.
 </summary>
@@ -56464,7 +43815,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="74136">
+<interface name="corenet_tcp_connect_rsync_port" lineno="56958">
 <summary>
 Make a TCP connection to the rsync port.
 </summary>
@@ -56474,7 +43825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_client_packets" lineno="74156">
+<interface name="corenet_send_rsync_client_packets" lineno="56978">
 <summary>
 Send rsync_client packets.
 </summary>
@@ -56485,7 +43836,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="56997">
 <summary>
 Do not audit attempts to send rsync_client packets.
 </summary>
@@ -56496,7 +43847,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="74194">
+<interface name="corenet_receive_rsync_client_packets" lineno="57016">
 <summary>
 Receive rsync_client packets.
 </summary>
@@ -56507,7 +43858,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="57035">
 <summary>
 Do not audit attempts to receive rsync_client packets.
 </summary>
@@ -56518,7 +43869,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="57054">
 <summary>
 Send and receive rsync_client packets.
 </summary>
@@ -56529,7 +43880,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="57070">
 <summary>
 Do not audit attempts to send and receive rsync_client packets.
 </summary>
@@ -56540,7 +43891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="74263">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="57085">
 <summary>
 Relabel packets to rsync_client the packet type.
 </summary>
@@ -56550,7 +43901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rsync_server_packets" lineno="74283">
+<interface name="corenet_send_rsync_server_packets" lineno="57105">
 <summary>
 Send rsync_server packets.
 </summary>
@@ -56561,7 +43912,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="57124">
 <summary>
 Do not audit attempts to send rsync_server packets.
 </summary>
@@ -56572,7 +43923,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="74321">
+<interface name="corenet_receive_rsync_server_packets" lineno="57143">
 <summary>
 Receive rsync_server packets.
 </summary>
@@ -56583,7 +43934,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="57162">
 <summary>
 Do not audit attempts to receive rsync_server packets.
 </summary>
@@ -56594,7 +43945,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="57181">
 <summary>
 Send and receive rsync_server packets.
 </summary>
@@ -56605,7 +43956,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="57197">
 <summary>
 Do not audit attempts to send and receive rsync_server packets.
 </summary>
@@ -56616,7 +43967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="74390">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="57212">
 <summary>
 Relabel packets to rsync_server the packet type.
 </summary>
@@ -56626,85 +43977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412">
-<summary>
-Send and receive TCP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="74427">
-<summary>
-Send UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442">
-<summary>
-Do not audit attempts to send UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="74457">
-<summary>
-Receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472">
-<summary>
-Do not audit attempts to receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487">
-<summary>
-Send and receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="57234">
 <summary>
 Bind TCP sockets to the rtorrent port.
 </summary>
@@ -56715,7 +43988,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="74538">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="57254">
 <summary>
 Bind UDP sockets to the rtorrent port.
 </summary>
@@ -56726,7 +43999,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="57273">
 <summary>
 Make a TCP connection to the rtorrent port.
 </summary>
@@ -56736,7 +44009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74577">
+<interface name="corenet_send_rtorrent_client_packets" lineno="57293">
 <summary>
 Send rtorrent_client packets.
 </summary>
@@ -56747,7 +44020,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="57312">
 <summary>
 Do not audit attempts to send rtorrent_client packets.
 </summary>
@@ -56758,7 +44031,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74615">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="57331">
 <summary>
 Receive rtorrent_client packets.
 </summary>
@@ -56769,7 +44042,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="57350">
 <summary>
 Do not audit attempts to receive rtorrent_client packets.
 </summary>
@@ -56780,7 +44053,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="57369">
 <summary>
 Send and receive rtorrent_client packets.
 </summary>
@@ -56791,7 +44064,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="57385">
 <summary>
 Do not audit attempts to send and receive rtorrent_client packets.
 </summary>
@@ -56802,7 +44075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="57400">
 <summary>
 Relabel packets to rtorrent_client the packet type.
 </summary>
@@ -56812,7 +44085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74704">
+<interface name="corenet_send_rtorrent_server_packets" lineno="57420">
 <summary>
 Send rtorrent_server packets.
 </summary>
@@ -56823,7 +44096,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="57439">
 <summary>
 Do not audit attempts to send rtorrent_server packets.
 </summary>
@@ -56834,7 +44107,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74742">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="57458">
 <summary>
 Receive rtorrent_server packets.
 </summary>
@@ -56845,7 +44118,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="57477">
 <summary>
 Do not audit attempts to receive rtorrent_server packets.
 </summary>
@@ -56856,7 +44129,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="57496">
 <summary>
 Send and receive rtorrent_server packets.
 </summary>
@@ -56867,7 +44140,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="57512">
 <summary>
 Do not audit attempts to send and receive rtorrent_server packets.
 </summary>
@@ -56878,7 +44151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="57527">
 <summary>
 Relabel packets to rtorrent_server the packet type.
 </summary>
@@ -56888,85 +44161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833">
-<summary>
-Send and receive TCP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74848">
-<summary>
-Send UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863">
-<summary>
-Do not audit attempts to send UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74878">
-<summary>
-Receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893">
-<summary>
-Do not audit attempts to receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908">
-<summary>
-Send and receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74939">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="57549">
 <summary>
 Bind TCP sockets to the rtsp port.
 </summary>
@@ -56977,7 +44172,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74959">
+<interface name="corenet_udp_bind_rtsp_port" lineno="57569">
 <summary>
 Bind UDP sockets to the rtsp port.
 </summary>
@@ -56988,7 +44183,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74978">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="57588">
 <summary>
 Make a TCP connection to the rtsp port.
 </summary>
@@ -56998,7 +44193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74998">
+<interface name="corenet_send_rtsp_client_packets" lineno="57608">
 <summary>
 Send rtsp_client packets.
 </summary>
@@ -57009,7 +44204,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="57627">
 <summary>
 Do not audit attempts to send rtsp_client packets.
 </summary>
@@ -57020,7 +44215,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="75036">
+<interface name="corenet_receive_rtsp_client_packets" lineno="57646">
 <summary>
 Receive rtsp_client packets.
 </summary>
@@ -57031,7 +44226,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="57665">
 <summary>
 Do not audit attempts to receive rtsp_client packets.
 </summary>
@@ -57042,7 +44237,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="57684">
 <summary>
 Send and receive rtsp_client packets.
 </summary>
@@ -57053,7 +44248,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="57700">
 <summary>
 Do not audit attempts to send and receive rtsp_client packets.
 </summary>
@@ -57064,7 +44259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="57715">
 <summary>
 Relabel packets to rtsp_client the packet type.
 </summary>
@@ -57074,7 +44269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="75125">
+<interface name="corenet_send_rtsp_server_packets" lineno="57735">
 <summary>
 Send rtsp_server packets.
 </summary>
@@ -57085,7 +44280,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="57754">
 <summary>
 Do not audit attempts to send rtsp_server packets.
 </summary>
@@ -57096,7 +44291,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="75163">
+<interface name="corenet_receive_rtsp_server_packets" lineno="57773">
 <summary>
 Receive rtsp_server packets.
 </summary>
@@ -57107,7 +44302,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="57792">
 <summary>
 Do not audit attempts to receive rtsp_server packets.
 </summary>
@@ -57118,7 +44313,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="57811">
 <summary>
 Send and receive rtsp_server packets.
 </summary>
@@ -57129,7 +44324,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="57827">
 <summary>
 Do not audit attempts to send and receive rtsp_server packets.
 </summary>
@@ -57140,7 +44335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="57842">
 <summary>
 Relabel packets to rtsp_server the packet type.
 </summary>
@@ -57150,85 +44345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254">
-<summary>
-Send and receive TCP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rwho_port" lineno="75269">
-<summary>
-Send UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284">
-<summary>
-Do not audit attempts to send UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="75299">
-<summary>
-Receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314">
-<summary>
-Do not audit attempts to receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329">
-<summary>
-Send and receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="75360">
+<interface name="corenet_tcp_bind_rwho_port" lineno="57864">
 <summary>
 Bind TCP sockets to the rwho port.
 </summary>
@@ -57239,7 +44356,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="75380">
+<interface name="corenet_udp_bind_rwho_port" lineno="57884">
 <summary>
 Bind UDP sockets to the rwho port.
 </summary>
@@ -57250,7 +44367,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="75399">
+<interface name="corenet_tcp_connect_rwho_port" lineno="57903">
 <summary>
 Make a TCP connection to the rwho port.
 </summary>
@@ -57260,7 +44377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_client_packets" lineno="75419">
+<interface name="corenet_send_rwho_client_packets" lineno="57923">
 <summary>
 Send rwho_client packets.
 </summary>
@@ -57271,7 +44388,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="57942">
 <summary>
 Do not audit attempts to send rwho_client packets.
 </summary>
@@ -57282,7 +44399,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="75457">
+<interface name="corenet_receive_rwho_client_packets" lineno="57961">
 <summary>
 Receive rwho_client packets.
 </summary>
@@ -57293,7 +44410,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="57980">
 <summary>
 Do not audit attempts to receive rwho_client packets.
 </summary>
@@ -57304,7 +44421,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="57999">
 <summary>
 Send and receive rwho_client packets.
 </summary>
@@ -57315,7 +44432,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="58015">
 <summary>
 Do not audit attempts to send and receive rwho_client packets.
 </summary>
@@ -57326,7 +44443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="75526">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="58030">
 <summary>
 Relabel packets to rwho_client the packet type.
 </summary>
@@ -57336,7 +44453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_rwho_server_packets" lineno="75546">
+<interface name="corenet_send_rwho_server_packets" lineno="58050">
 <summary>
 Send rwho_server packets.
 </summary>
@@ -57347,7 +44464,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="58069">
 <summary>
 Do not audit attempts to send rwho_server packets.
 </summary>
@@ -57358,7 +44475,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75584">
+<interface name="corenet_receive_rwho_server_packets" lineno="58088">
 <summary>
 Receive rwho_server packets.
 </summary>
@@ -57369,7 +44486,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="58107">
 <summary>
 Do not audit attempts to receive rwho_server packets.
 </summary>
@@ -57380,7 +44497,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="58126">
 <summary>
 Send and receive rwho_server packets.
 </summary>
@@ -57391,7 +44508,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="58142">
 <summary>
 Do not audit attempts to send and receive rwho_server packets.
 </summary>
@@ -57402,7 +44519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75653">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="58157">
 <summary>
 Relabel packets to rwho_server the packet type.
 </summary>
@@ -57412,85 +44529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675">
-<summary>
-Send and receive TCP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_salt_port" lineno="75690">
-<summary>
-Send UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705">
-<summary>
-Do not audit attempts to send UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75720">
-<summary>
-Receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735">
-<summary>
-Do not audit attempts to receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75750">
-<summary>
-Send and receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75781">
+<interface name="corenet_tcp_bind_salt_port" lineno="58179">
 <summary>
 Bind TCP sockets to the salt port.
 </summary>
@@ -57501,7 +44540,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75801">
+<interface name="corenet_udp_bind_salt_port" lineno="58199">
 <summary>
 Bind UDP sockets to the salt port.
 </summary>
@@ -57512,7 +44551,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75820">
+<interface name="corenet_tcp_connect_salt_port" lineno="58218">
 <summary>
 Make a TCP connection to the salt port.
 </summary>
@@ -57522,7 +44561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_client_packets" lineno="75840">
+<interface name="corenet_send_salt_client_packets" lineno="58238">
 <summary>
 Send salt_client packets.
 </summary>
@@ -57533,7 +44572,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="58257">
 <summary>
 Do not audit attempts to send salt_client packets.
 </summary>
@@ -57544,7 +44583,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75878">
+<interface name="corenet_receive_salt_client_packets" lineno="58276">
 <summary>
 Receive salt_client packets.
 </summary>
@@ -57555,7 +44594,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="58295">
 <summary>
 Do not audit attempts to receive salt_client packets.
 </summary>
@@ -57566,7 +44605,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75916">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="58314">
 <summary>
 Send and receive salt_client packets.
 </summary>
@@ -57577,7 +44616,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="58330">
 <summary>
 Do not audit attempts to send and receive salt_client packets.
 </summary>
@@ -57588,7 +44627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75947">
+<interface name="corenet_relabelto_salt_client_packets" lineno="58345">
 <summary>
 Relabel packets to salt_client the packet type.
 </summary>
@@ -57598,7 +44637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_salt_server_packets" lineno="75967">
+<interface name="corenet_send_salt_server_packets" lineno="58365">
 <summary>
 Send salt_server packets.
 </summary>
@@ -57609,7 +44648,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="58384">
 <summary>
 Do not audit attempts to send salt_server packets.
 </summary>
@@ -57620,7 +44659,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_salt_server_packets" lineno="76005">
+<interface name="corenet_receive_salt_server_packets" lineno="58403">
 <summary>
 Receive salt_server packets.
 </summary>
@@ -57631,7 +44670,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="58422">
 <summary>
 Do not audit attempts to receive salt_server packets.
 </summary>
@@ -57642,7 +44681,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="76043">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="58441">
 <summary>
 Send and receive salt_server packets.
 </summary>
@@ -57653,7 +44692,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="58457">
 <summary>
 Do not audit attempts to send and receive salt_server packets.
 </summary>
@@ -57664,7 +44703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="76074">
+<interface name="corenet_relabelto_salt_server_packets" lineno="58472">
 <summary>
 Relabel packets to salt_server the packet type.
 </summary>
@@ -57674,85 +44713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096">
-<summary>
-Send and receive TCP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sap_port" lineno="76111">
-<summary>
-Send UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126">
-<summary>
-Do not audit attempts to send UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sap_port" lineno="76141">
-<summary>
-Receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156">
-<summary>
-Do not audit attempts to receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="76171">
-<summary>
-Send and receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="76202">
+<interface name="corenet_tcp_bind_sap_port" lineno="58494">
 <summary>
 Bind TCP sockets to the sap port.
 </summary>
@@ -57763,7 +44724,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sap_port" lineno="76222">
+<interface name="corenet_udp_bind_sap_port" lineno="58514">
 <summary>
 Bind UDP sockets to the sap port.
 </summary>
@@ -57774,7 +44735,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="76241">
+<interface name="corenet_tcp_connect_sap_port" lineno="58533">
 <summary>
 Make a TCP connection to the sap port.
 </summary>
@@ -57784,7 +44745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_client_packets" lineno="76261">
+<interface name="corenet_send_sap_client_packets" lineno="58553">
 <summary>
 Send sap_client packets.
 </summary>
@@ -57795,7 +44756,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="58572">
 <summary>
 Do not audit attempts to send sap_client packets.
 </summary>
@@ -57806,7 +44767,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_client_packets" lineno="76299">
+<interface name="corenet_receive_sap_client_packets" lineno="58591">
 <summary>
 Receive sap_client packets.
 </summary>
@@ -57817,7 +44778,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="58610">
 <summary>
 Do not audit attempts to receive sap_client packets.
 </summary>
@@ -57828,7 +44789,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="76337">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="58629">
 <summary>
 Send and receive sap_client packets.
 </summary>
@@ -57839,7 +44800,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="58645">
 <summary>
 Do not audit attempts to send and receive sap_client packets.
 </summary>
@@ -57850,7 +44811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="76368">
+<interface name="corenet_relabelto_sap_client_packets" lineno="58660">
 <summary>
 Relabel packets to sap_client the packet type.
 </summary>
@@ -57860,7 +44821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sap_server_packets" lineno="76388">
+<interface name="corenet_send_sap_server_packets" lineno="58680">
 <summary>
 Send sap_server packets.
 </summary>
@@ -57871,7 +44832,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="58699">
 <summary>
 Do not audit attempts to send sap_server packets.
 </summary>
@@ -57882,7 +44843,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sap_server_packets" lineno="76426">
+<interface name="corenet_receive_sap_server_packets" lineno="58718">
 <summary>
 Receive sap_server packets.
 </summary>
@@ -57893,7 +44854,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="58737">
 <summary>
 Do not audit attempts to receive sap_server packets.
 </summary>
@@ -57904,7 +44865,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="76464">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="58756">
 <summary>
 Send and receive sap_server packets.
 </summary>
@@ -57915,7 +44876,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="58772">
 <summary>
 Do not audit attempts to send and receive sap_server packets.
 </summary>
@@ -57926,7 +44887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="76495">
+<interface name="corenet_relabelto_sap_server_packets" lineno="58787">
 <summary>
 Relabel packets to sap_server the packet type.
 </summary>
@@ -57936,85 +44897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517">
-<summary>
-Send and receive TCP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="76532">
-<summary>
-Send UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547">
-<summary>
-Do not audit attempts to send UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562">
-<summary>
-Receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577">
-<summary>
-Do not audit attempts to receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592">
-<summary>
-Send and receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="58809">
 <summary>
 Bind TCP sockets to the servistaitsm port.
 </summary>
@@ -58025,7 +44908,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="58829">
 <summary>
 Bind UDP sockets to the servistaitsm port.
 </summary>
@@ -58036,7 +44919,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="58848">
 <summary>
 Make a TCP connection to the servistaitsm port.
 </summary>
@@ -58046,7 +44929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76682">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="58868">
 <summary>
 Send servistaitsm_client packets.
 </summary>
@@ -58057,7 +44940,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="58887">
 <summary>
 Do not audit attempts to send servistaitsm_client packets.
 </summary>
@@ -58068,7 +44951,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="58906">
 <summary>
 Receive servistaitsm_client packets.
 </summary>
@@ -58079,7 +44962,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="58925">
 <summary>
 Do not audit attempts to receive servistaitsm_client packets.
 </summary>
@@ -58090,7 +44973,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="58944">
 <summary>
 Send and receive servistaitsm_client packets.
 </summary>
@@ -58101,7 +44984,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="58960">
 <summary>
 Do not audit attempts to send and receive servistaitsm_client packets.
 </summary>
@@ -58112,7 +44995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="58975">
 <summary>
 Relabel packets to servistaitsm_client the packet type.
 </summary>
@@ -58122,7 +45005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76809">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="58995">
 <summary>
 Send servistaitsm_server packets.
 </summary>
@@ -58133,7 +45016,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="59014">
 <summary>
 Do not audit attempts to send servistaitsm_server packets.
 </summary>
@@ -58144,7 +45027,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="59033">
 <summary>
 Receive servistaitsm_server packets.
 </summary>
@@ -58155,7 +45038,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="59052">
 <summary>
 Do not audit attempts to receive servistaitsm_server packets.
 </summary>
@@ -58166,7 +45049,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="59071">
 <summary>
 Send and receive servistaitsm_server packets.
 </summary>
@@ -58177,7 +45060,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="59087">
 <summary>
 Do not audit attempts to send and receive servistaitsm_server packets.
 </summary>
@@ -58188,7 +45071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="59102">
 <summary>
 Relabel packets to servistaitsm_server the packet type.
 </summary>
@@ -58198,85 +45081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938">
-<summary>
-Send and receive TCP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76953">
-<summary>
-Send UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968">
-<summary>
-Do not audit attempts to send UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76983">
-<summary>
-Receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998">
-<summary>
-Do not audit attempts to receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013">
-<summary>
-Send and receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="77044">
+<interface name="corenet_tcp_bind_sieve_port" lineno="59124">
 <summary>
 Bind TCP sockets to the sieve port.
 </summary>
@@ -58287,7 +45092,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="77064">
+<interface name="corenet_udp_bind_sieve_port" lineno="59144">
 <summary>
 Bind UDP sockets to the sieve port.
 </summary>
@@ -58298,7 +45103,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="77083">
+<interface name="corenet_tcp_connect_sieve_port" lineno="59163">
 <summary>
 Make a TCP connection to the sieve port.
 </summary>
@@ -58308,7 +45113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_client_packets" lineno="77103">
+<interface name="corenet_send_sieve_client_packets" lineno="59183">
 <summary>
 Send sieve_client packets.
 </summary>
@@ -58319,7 +45124,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="59202">
 <summary>
 Do not audit attempts to send sieve_client packets.
 </summary>
@@ -58330,7 +45135,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="77141">
+<interface name="corenet_receive_sieve_client_packets" lineno="59221">
 <summary>
 Receive sieve_client packets.
 </summary>
@@ -58341,7 +45146,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="59240">
 <summary>
 Do not audit attempts to receive sieve_client packets.
 </summary>
@@ -58352,7 +45157,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="59259">
 <summary>
 Send and receive sieve_client packets.
 </summary>
@@ -58363,7 +45168,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="59275">
 <summary>
 Do not audit attempts to send and receive sieve_client packets.
 </summary>
@@ -58374,7 +45179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="77210">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="59290">
 <summary>
 Relabel packets to sieve_client the packet type.
 </summary>
@@ -58384,7 +45189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sieve_server_packets" lineno="77230">
+<interface name="corenet_send_sieve_server_packets" lineno="59310">
 <summary>
 Send sieve_server packets.
 </summary>
@@ -58395,7 +45200,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="59329">
 <summary>
 Do not audit attempts to send sieve_server packets.
 </summary>
@@ -58406,7 +45211,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="77268">
+<interface name="corenet_receive_sieve_server_packets" lineno="59348">
 <summary>
 Receive sieve_server packets.
 </summary>
@@ -58417,7 +45222,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="59367">
 <summary>
 Do not audit attempts to receive sieve_server packets.
 </summary>
@@ -58428,7 +45233,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="59386">
 <summary>
 Send and receive sieve_server packets.
 </summary>
@@ -58439,7 +45244,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="59402">
 <summary>
 Do not audit attempts to send and receive sieve_server packets.
 </summary>
@@ -58450,7 +45255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="77337">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="59417">
 <summary>
 Relabel packets to sieve_server the packet type.
 </summary>
@@ -58460,85 +45265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359">
-<summary>
-Send and receive TCP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sip_port" lineno="77374">
-<summary>
-Send UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389">
-<summary>
-Do not audit attempts to send UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sip_port" lineno="77404">
-<summary>
-Receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419">
-<summary>
-Do not audit attempts to receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="77434">
-<summary>
-Send and receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="77465">
+<interface name="corenet_tcp_bind_sip_port" lineno="59439">
 <summary>
 Bind TCP sockets to the sip port.
 </summary>
@@ -58549,7 +45276,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sip_port" lineno="77485">
+<interface name="corenet_udp_bind_sip_port" lineno="59459">
 <summary>
 Bind UDP sockets to the sip port.
 </summary>
@@ -58560,7 +45287,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="77504">
+<interface name="corenet_tcp_connect_sip_port" lineno="59478">
 <summary>
 Make a TCP connection to the sip port.
 </summary>
@@ -58570,7 +45297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_client_packets" lineno="77524">
+<interface name="corenet_send_sip_client_packets" lineno="59498">
 <summary>
 Send sip_client packets.
 </summary>
@@ -58581,7 +45308,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="59517">
 <summary>
 Do not audit attempts to send sip_client packets.
 </summary>
@@ -58592,7 +45319,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77562">
+<interface name="corenet_receive_sip_client_packets" lineno="59536">
 <summary>
 Receive sip_client packets.
 </summary>
@@ -58603,7 +45330,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="59555">
 <summary>
 Do not audit attempts to receive sip_client packets.
 </summary>
@@ -58614,7 +45341,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77600">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="59574">
 <summary>
 Send and receive sip_client packets.
 </summary>
@@ -58625,7 +45352,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="59590">
 <summary>
 Do not audit attempts to send and receive sip_client packets.
 </summary>
@@ -58636,7 +45363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77631">
+<interface name="corenet_relabelto_sip_client_packets" lineno="59605">
 <summary>
 Relabel packets to sip_client the packet type.
 </summary>
@@ -58646,7 +45373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sip_server_packets" lineno="77651">
+<interface name="corenet_send_sip_server_packets" lineno="59625">
 <summary>
 Send sip_server packets.
 </summary>
@@ -58657,7 +45384,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="59644">
 <summary>
 Do not audit attempts to send sip_server packets.
 </summary>
@@ -58668,7 +45395,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77689">
+<interface name="corenet_receive_sip_server_packets" lineno="59663">
 <summary>
 Receive sip_server packets.
 </summary>
@@ -58679,7 +45406,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="59682">
 <summary>
 Do not audit attempts to receive sip_server packets.
 </summary>
@@ -58690,7 +45417,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77727">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="59701">
 <summary>
 Send and receive sip_server packets.
 </summary>
@@ -58701,7 +45428,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="59717">
 <summary>
 Do not audit attempts to send and receive sip_server packets.
 </summary>
@@ -58712,7 +45439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77758">
+<interface name="corenet_relabelto_sip_server_packets" lineno="59732">
 <summary>
 Relabel packets to sip_server the packet type.
 </summary>
@@ -58722,85 +45449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780">
-<summary>
-Send and receive TCP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795">
-<summary>
-Send UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810">
-<summary>
-Do not audit attempts to send UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825">
-<summary>
-Receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840">
-<summary>
-Do not audit attempts to receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855">
-<summary>
-Send and receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="59754">
 <summary>
 Bind TCP sockets to the sixxsconfig port.
 </summary>
@@ -58811,7 +45460,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="59774">
 <summary>
 Bind UDP sockets to the sixxsconfig port.
 </summary>
@@ -58822,7 +45471,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="59793">
 <summary>
 Make a TCP connection to the sixxsconfig port.
 </summary>
@@ -58832,7 +45481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="59813">
 <summary>
 Send sixxsconfig_client packets.
 </summary>
@@ -58843,7 +45492,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="59832">
 <summary>
 Do not audit attempts to send sixxsconfig_client packets.
 </summary>
@@ -58854,7 +45503,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="59851">
 <summary>
 Receive sixxsconfig_client packets.
 </summary>
@@ -58865,7 +45514,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="59870">
 <summary>
 Do not audit attempts to receive sixxsconfig_client packets.
 </summary>
@@ -58876,7 +45525,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="59889">
 <summary>
 Send and receive sixxsconfig_client packets.
 </summary>
@@ -58887,7 +45536,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="59905">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_client packets.
 </summary>
@@ -58898,7 +45547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="59920">
 <summary>
 Relabel packets to sixxsconfig_client the packet type.
 </summary>
@@ -58908,7 +45557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="59940">
 <summary>
 Send sixxsconfig_server packets.
 </summary>
@@ -58919,7 +45568,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="59959">
 <summary>
 Do not audit attempts to send sixxsconfig_server packets.
 </summary>
@@ -58930,7 +45579,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="59978">
 <summary>
 Receive sixxsconfig_server packets.
 </summary>
@@ -58941,7 +45590,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="59997">
 <summary>
 Do not audit attempts to receive sixxsconfig_server packets.
 </summary>
@@ -58952,7 +45601,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="60016">
 <summary>
 Send and receive sixxsconfig_server packets.
 </summary>
@@ -58963,7 +45612,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="60032">
 <summary>
 Do not audit attempts to send and receive sixxsconfig_server packets.
 </summary>
@@ -58974,7 +45623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="60047">
 <summary>
 Relabel packets to sixxsconfig_server the packet type.
 </summary>
@@ -58984,85 +45633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201">
-<summary>
-Send and receive TCP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_smbd_port" lineno="78216">
-<summary>
-Send UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231">
-<summary>
-Do not audit attempts to send UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="78246">
-<summary>
-Receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261">
-<summary>
-Do not audit attempts to receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276">
-<summary>
-Send and receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="78307">
+<interface name="corenet_tcp_bind_smbd_port" lineno="60069">
 <summary>
 Bind TCP sockets to the smbd port.
 </summary>
@@ -59073,7 +45644,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="78327">
+<interface name="corenet_udp_bind_smbd_port" lineno="60089">
 <summary>
 Bind UDP sockets to the smbd port.
 </summary>
@@ -59084,7 +45655,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="78346">
+<interface name="corenet_tcp_connect_smbd_port" lineno="60108">
 <summary>
 Make a TCP connection to the smbd port.
 </summary>
@@ -59094,7 +45665,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_client_packets" lineno="78366">
+<interface name="corenet_send_smbd_client_packets" lineno="60128">
 <summary>
 Send smbd_client packets.
 </summary>
@@ -59105,7 +45676,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="60147">
 <summary>
 Do not audit attempts to send smbd_client packets.
 </summary>
@@ -59116,7 +45687,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="78404">
+<interface name="corenet_receive_smbd_client_packets" lineno="60166">
 <summary>
 Receive smbd_client packets.
 </summary>
@@ -59127,7 +45698,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="60185">
 <summary>
 Do not audit attempts to receive smbd_client packets.
 </summary>
@@ -59138,7 +45709,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="60204">
 <summary>
 Send and receive smbd_client packets.
 </summary>
@@ -59149,7 +45720,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="60220">
 <summary>
 Do not audit attempts to send and receive smbd_client packets.
 </summary>
@@ -59160,7 +45731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="78473">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="60235">
 <summary>
 Relabel packets to smbd_client the packet type.
 </summary>
@@ -59170,7 +45741,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smbd_server_packets" lineno="78493">
+<interface name="corenet_send_smbd_server_packets" lineno="60255">
 <summary>
 Send smbd_server packets.
 </summary>
@@ -59181,7 +45752,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="60274">
 <summary>
 Do not audit attempts to send smbd_server packets.
 </summary>
@@ -59192,7 +45763,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="78531">
+<interface name="corenet_receive_smbd_server_packets" lineno="60293">
 <summary>
 Receive smbd_server packets.
 </summary>
@@ -59203,7 +45774,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="60312">
 <summary>
 Do not audit attempts to receive smbd_server packets.
 </summary>
@@ -59214,7 +45785,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="60331">
 <summary>
 Send and receive smbd_server packets.
 </summary>
@@ -59225,7 +45796,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="60347">
 <summary>
 Do not audit attempts to send and receive smbd_server packets.
 </summary>
@@ -59236,7 +45807,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78600">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="60362">
 <summary>
 Relabel packets to smbd_server the packet type.
 </summary>
@@ -59246,85 +45817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622">
-<summary>
-Send and receive TCP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78637">
-<summary>
-Send UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652">
-<summary>
-Do not audit attempts to send UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78667">
-<summary>
-Receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682">
-<summary>
-Do not audit attempts to receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697">
-<summary>
-Send and receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78728">
+<interface name="corenet_tcp_bind_smtp_port" lineno="60384">
 <summary>
 Bind TCP sockets to the smtp port.
 </summary>
@@ -59335,7 +45828,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78748">
+<interface name="corenet_udp_bind_smtp_port" lineno="60404">
 <summary>
 Bind UDP sockets to the smtp port.
 </summary>
@@ -59346,7 +45839,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78767">
+<interface name="corenet_tcp_connect_smtp_port" lineno="60423">
 <summary>
 Make a TCP connection to the smtp port.
 </summary>
@@ -59356,7 +45849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78787">
+<interface name="corenet_send_smtp_client_packets" lineno="60443">
 <summary>
 Send smtp_client packets.
 </summary>
@@ -59367,7 +45860,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="60462">
 <summary>
 Do not audit attempts to send smtp_client packets.
 </summary>
@@ -59378,7 +45871,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78825">
+<interface name="corenet_receive_smtp_client_packets" lineno="60481">
 <summary>
 Receive smtp_client packets.
 </summary>
@@ -59389,7 +45882,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="60500">
 <summary>
 Do not audit attempts to receive smtp_client packets.
 </summary>
@@ -59400,7 +45893,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="60519">
 <summary>
 Send and receive smtp_client packets.
 </summary>
@@ -59411,7 +45904,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="60535">
 <summary>
 Do not audit attempts to send and receive smtp_client packets.
 </summary>
@@ -59422,7 +45915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78894">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="60550">
 <summary>
 Relabel packets to smtp_client the packet type.
 </summary>
@@ -59432,7 +45925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78914">
+<interface name="corenet_send_smtp_server_packets" lineno="60570">
 <summary>
 Send smtp_server packets.
 </summary>
@@ -59443,7 +45936,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="60589">
 <summary>
 Do not audit attempts to send smtp_server packets.
 </summary>
@@ -59454,7 +45947,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78952">
+<interface name="corenet_receive_smtp_server_packets" lineno="60608">
 <summary>
 Receive smtp_server packets.
 </summary>
@@ -59465,7 +45958,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="60627">
 <summary>
 Do not audit attempts to receive smtp_server packets.
 </summary>
@@ -59476,7 +45969,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="60646">
 <summary>
 Send and receive smtp_server packets.
 </summary>
@@ -59487,7 +45980,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="60662">
 <summary>
 Do not audit attempts to send and receive smtp_server packets.
 </summary>
@@ -59498,7 +45991,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="79021">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="60677">
 <summary>
 Relabel packets to smtp_server the packet type.
 </summary>
@@ -59508,85 +46001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043">
-<summary>
-Send and receive TCP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_snmp_port" lineno="79058">
-<summary>
-Send UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073">
-<summary>
-Do not audit attempts to send UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="79088">
-<summary>
-Receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103">
-<summary>
-Do not audit attempts to receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118">
-<summary>
-Send and receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="79149">
+<interface name="corenet_tcp_bind_snmp_port" lineno="60699">
 <summary>
 Bind TCP sockets to the snmp port.
 </summary>
@@ -59597,7 +46012,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="79169">
+<interface name="corenet_udp_bind_snmp_port" lineno="60719">
 <summary>
 Bind UDP sockets to the snmp port.
 </summary>
@@ -59608,7 +46023,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="79188">
+<interface name="corenet_tcp_connect_snmp_port" lineno="60738">
 <summary>
 Make a TCP connection to the snmp port.
 </summary>
@@ -59618,7 +46033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_client_packets" lineno="79208">
+<interface name="corenet_send_snmp_client_packets" lineno="60758">
 <summary>
 Send snmp_client packets.
 </summary>
@@ -59629,7 +46044,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="60777">
 <summary>
 Do not audit attempts to send snmp_client packets.
 </summary>
@@ -59640,7 +46055,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="79246">
+<interface name="corenet_receive_snmp_client_packets" lineno="60796">
 <summary>
 Receive snmp_client packets.
 </summary>
@@ -59651,7 +46066,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="60815">
 <summary>
 Do not audit attempts to receive snmp_client packets.
 </summary>
@@ -59662,7 +46077,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="60834">
 <summary>
 Send and receive snmp_client packets.
 </summary>
@@ -59673,7 +46088,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="60850">
 <summary>
 Do not audit attempts to send and receive snmp_client packets.
 </summary>
@@ -59684,7 +46099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="79315">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="60865">
 <summary>
 Relabel packets to snmp_client the packet type.
 </summary>
@@ -59694,7 +46109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_snmp_server_packets" lineno="79335">
+<interface name="corenet_send_snmp_server_packets" lineno="60885">
 <summary>
 Send snmp_server packets.
 </summary>
@@ -59705,7 +46120,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="60904">
 <summary>
 Do not audit attempts to send snmp_server packets.
 </summary>
@@ -59716,7 +46131,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="79373">
+<interface name="corenet_receive_snmp_server_packets" lineno="60923">
 <summary>
 Receive snmp_server packets.
 </summary>
@@ -59727,7 +46142,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="60942">
 <summary>
 Do not audit attempts to receive snmp_server packets.
 </summary>
@@ -59738,7 +46153,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="60961">
 <summary>
 Send and receive snmp_server packets.
 </summary>
@@ -59749,7 +46164,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="60977">
 <summary>
 Do not audit attempts to send and receive snmp_server packets.
 </summary>
@@ -59760,7 +46175,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="79442">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="60992">
 <summary>
 Relabel packets to snmp_server the packet type.
 </summary>
@@ -59770,85 +46185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464">
-<summary>
-Send and receive TCP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_socks_port" lineno="79479">
-<summary>
-Send UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494">
-<summary>
-Do not audit attempts to send UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_socks_port" lineno="79509">
-<summary>
-Receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524">
-<summary>
-Do not audit attempts to receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="79539">
-<summary>
-Send and receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79570">
+<interface name="corenet_tcp_bind_socks_port" lineno="61014">
 <summary>
 Bind TCP sockets to the socks port.
 </summary>
@@ -59859,7 +46196,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79590">
+<interface name="corenet_udp_bind_socks_port" lineno="61034">
 <summary>
 Bind UDP sockets to the socks port.
 </summary>
@@ -59870,7 +46207,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79609">
+<interface name="corenet_tcp_connect_socks_port" lineno="61053">
 <summary>
 Make a TCP connection to the socks port.
 </summary>
@@ -59880,7 +46217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_client_packets" lineno="79629">
+<interface name="corenet_send_socks_client_packets" lineno="61073">
 <summary>
 Send socks_client packets.
 </summary>
@@ -59891,7 +46228,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="61092">
 <summary>
 Do not audit attempts to send socks_client packets.
 </summary>
@@ -59902,7 +46239,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79667">
+<interface name="corenet_receive_socks_client_packets" lineno="61111">
 <summary>
 Receive socks_client packets.
 </summary>
@@ -59913,7 +46250,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="61130">
 <summary>
 Do not audit attempts to receive socks_client packets.
 </summary>
@@ -59924,7 +46261,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79705">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="61149">
 <summary>
 Send and receive socks_client packets.
 </summary>
@@ -59935,7 +46272,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="61165">
 <summary>
 Do not audit attempts to send and receive socks_client packets.
 </summary>
@@ -59946,7 +46283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79736">
+<interface name="corenet_relabelto_socks_client_packets" lineno="61180">
 <summary>
 Relabel packets to socks_client the packet type.
 </summary>
@@ -59956,7 +46293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_socks_server_packets" lineno="79756">
+<interface name="corenet_send_socks_server_packets" lineno="61200">
 <summary>
 Send socks_server packets.
 </summary>
@@ -59967,7 +46304,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="61219">
 <summary>
 Do not audit attempts to send socks_server packets.
 </summary>
@@ -59978,7 +46315,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79794">
+<interface name="corenet_receive_socks_server_packets" lineno="61238">
 <summary>
 Receive socks_server packets.
 </summary>
@@ -59989,7 +46326,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="61257">
 <summary>
 Do not audit attempts to receive socks_server packets.
 </summary>
@@ -60000,7 +46337,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79832">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="61276">
 <summary>
 Send and receive socks_server packets.
 </summary>
@@ -60011,7 +46348,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="61292">
 <summary>
 Do not audit attempts to send and receive socks_server packets.
 </summary>
@@ -60022,7 +46359,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79863">
+<interface name="corenet_relabelto_socks_server_packets" lineno="61307">
 <summary>
 Relabel packets to socks_server the packet type.
 </summary>
@@ -60032,85 +46369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885">
-<summary>
-Send and receive TCP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79900">
-<summary>
-Send UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915">
-<summary>
-Do not audit attempts to send UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79930">
-<summary>
-Receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945">
-<summary>
-Do not audit attempts to receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960">
-<summary>
-Send and receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79991">
+<interface name="corenet_tcp_bind_soundd_port" lineno="61329">
 <summary>
 Bind TCP sockets to the soundd port.
 </summary>
@@ -60121,7 +46380,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="80011">
+<interface name="corenet_udp_bind_soundd_port" lineno="61349">
 <summary>
 Bind UDP sockets to the soundd port.
 </summary>
@@ -60132,7 +46391,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="80030">
+<interface name="corenet_tcp_connect_soundd_port" lineno="61368">
 <summary>
 Make a TCP connection to the soundd port.
 </summary>
@@ -60142,7 +46401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_client_packets" lineno="80050">
+<interface name="corenet_send_soundd_client_packets" lineno="61388">
 <summary>
 Send soundd_client packets.
 </summary>
@@ -60153,7 +46412,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="61407">
 <summary>
 Do not audit attempts to send soundd_client packets.
 </summary>
@@ -60164,7 +46423,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="80088">
+<interface name="corenet_receive_soundd_client_packets" lineno="61426">
 <summary>
 Receive soundd_client packets.
 </summary>
@@ -60175,7 +46434,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="61445">
 <summary>
 Do not audit attempts to receive soundd_client packets.
 </summary>
@@ -60186,7 +46445,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="61464">
 <summary>
 Send and receive soundd_client packets.
 </summary>
@@ -60197,7 +46456,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="61480">
 <summary>
 Do not audit attempts to send and receive soundd_client packets.
 </summary>
@@ -60208,7 +46467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="80157">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="61495">
 <summary>
 Relabel packets to soundd_client the packet type.
 </summary>
@@ -60218,7 +46477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_soundd_server_packets" lineno="80177">
+<interface name="corenet_send_soundd_server_packets" lineno="61515">
 <summary>
 Send soundd_server packets.
 </summary>
@@ -60229,7 +46488,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="61534">
 <summary>
 Do not audit attempts to send soundd_server packets.
 </summary>
@@ -60240,7 +46499,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="80215">
+<interface name="corenet_receive_soundd_server_packets" lineno="61553">
 <summary>
 Receive soundd_server packets.
 </summary>
@@ -60251,7 +46510,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="61572">
 <summary>
 Do not audit attempts to receive soundd_server packets.
 </summary>
@@ -60262,7 +46521,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="61591">
 <summary>
 Send and receive soundd_server packets.
 </summary>
@@ -60273,7 +46532,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="61607">
 <summary>
 Do not audit attempts to send and receive soundd_server packets.
 </summary>
@@ -60284,7 +46543,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="80284">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="61622">
 <summary>
 Relabel packets to soundd_server the packet type.
 </summary>
@@ -60294,85 +46553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306">
-<summary>
-Send and receive TCP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_spamd_port" lineno="80321">
-<summary>
-Send UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336">
-<summary>
-Do not audit attempts to send UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="80351">
-<summary>
-Receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366">
-<summary>
-Do not audit attempts to receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381">
-<summary>
-Send and receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="80412">
+<interface name="corenet_tcp_bind_spamd_port" lineno="61644">
 <summary>
 Bind TCP sockets to the spamd port.
 </summary>
@@ -60383,7 +46564,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="80432">
+<interface name="corenet_udp_bind_spamd_port" lineno="61664">
 <summary>
 Bind UDP sockets to the spamd port.
 </summary>
@@ -60394,7 +46575,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="80451">
+<interface name="corenet_tcp_connect_spamd_port" lineno="61683">
 <summary>
 Make a TCP connection to the spamd port.
 </summary>
@@ -60404,7 +46585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_client_packets" lineno="80471">
+<interface name="corenet_send_spamd_client_packets" lineno="61703">
 <summary>
 Send spamd_client packets.
 </summary>
@@ -60415,7 +46596,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="61722">
 <summary>
 Do not audit attempts to send spamd_client packets.
 </summary>
@@ -60426,7 +46607,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="80509">
+<interface name="corenet_receive_spamd_client_packets" lineno="61741">
 <summary>
 Receive spamd_client packets.
 </summary>
@@ -60437,7 +46618,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="61760">
 <summary>
 Do not audit attempts to receive spamd_client packets.
 </summary>
@@ -60448,7 +46629,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="61779">
 <summary>
 Send and receive spamd_client packets.
 </summary>
@@ -60459,7 +46640,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="61795">
 <summary>
 Do not audit attempts to send and receive spamd_client packets.
 </summary>
@@ -60470,7 +46651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80578">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="61810">
 <summary>
 Relabel packets to spamd_client the packet type.
 </summary>
@@ -60480,7 +46661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80598">
+<interface name="corenet_send_spamd_server_packets" lineno="61830">
 <summary>
 Send spamd_server packets.
 </summary>
@@ -60491,7 +46672,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="61849">
 <summary>
 Do not audit attempts to send spamd_server packets.
 </summary>
@@ -60502,7 +46683,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80636">
+<interface name="corenet_receive_spamd_server_packets" lineno="61868">
 <summary>
 Receive spamd_server packets.
 </summary>
@@ -60513,7 +46694,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="61887">
 <summary>
 Do not audit attempts to receive spamd_server packets.
 </summary>
@@ -60524,7 +46705,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="61906">
 <summary>
 Send and receive spamd_server packets.
 </summary>
@@ -60535,7 +46716,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="61922">
 <summary>
 Do not audit attempts to send and receive spamd_server packets.
 </summary>
@@ -60546,7 +46727,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80705">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="61937">
 <summary>
 Relabel packets to spamd_server the packet type.
 </summary>
@@ -60556,85 +46737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727">
-<summary>
-Send and receive TCP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_speech_port" lineno="80742">
-<summary>
-Send UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757">
-<summary>
-Do not audit attempts to send UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80772">
-<summary>
-Receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787">
-<summary>
-Do not audit attempts to receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80802">
-<summary>
-Send and receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80833">
+<interface name="corenet_tcp_bind_speech_port" lineno="61959">
 <summary>
 Bind TCP sockets to the speech port.
 </summary>
@@ -60645,7 +46748,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80853">
+<interface name="corenet_udp_bind_speech_port" lineno="61979">
 <summary>
 Bind UDP sockets to the speech port.
 </summary>
@@ -60656,7 +46759,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80872">
+<interface name="corenet_tcp_connect_speech_port" lineno="61998">
 <summary>
 Make a TCP connection to the speech port.
 </summary>
@@ -60666,7 +46769,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_client_packets" lineno="80892">
+<interface name="corenet_send_speech_client_packets" lineno="62018">
 <summary>
 Send speech_client packets.
 </summary>
@@ -60677,7 +46780,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="62037">
 <summary>
 Do not audit attempts to send speech_client packets.
 </summary>
@@ -60688,7 +46791,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80930">
+<interface name="corenet_receive_speech_client_packets" lineno="62056">
 <summary>
 Receive speech_client packets.
 </summary>
@@ -60699,7 +46802,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="62075">
 <summary>
 Do not audit attempts to receive speech_client packets.
 </summary>
@@ -60710,7 +46813,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80968">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="62094">
 <summary>
 Send and receive speech_client packets.
 </summary>
@@ -60721,7 +46824,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="62110">
 <summary>
 Do not audit attempts to send and receive speech_client packets.
 </summary>
@@ -60732,7 +46835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80999">
+<interface name="corenet_relabelto_speech_client_packets" lineno="62125">
 <summary>
 Relabel packets to speech_client the packet type.
 </summary>
@@ -60742,7 +46845,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_speech_server_packets" lineno="81019">
+<interface name="corenet_send_speech_server_packets" lineno="62145">
 <summary>
 Send speech_server packets.
 </summary>
@@ -60753,7 +46856,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="62164">
 <summary>
 Do not audit attempts to send speech_server packets.
 </summary>
@@ -60764,7 +46867,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_speech_server_packets" lineno="81057">
+<interface name="corenet_receive_speech_server_packets" lineno="62183">
 <summary>
 Receive speech_server packets.
 </summary>
@@ -60775,7 +46878,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="62202">
 <summary>
 Do not audit attempts to receive speech_server packets.
 </summary>
@@ -60786,7 +46889,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="81095">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="62221">
 <summary>
 Send and receive speech_server packets.
 </summary>
@@ -60797,7 +46900,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="62237">
 <summary>
 Do not audit attempts to send and receive speech_server packets.
 </summary>
@@ -60808,7 +46911,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="81126">
+<interface name="corenet_relabelto_speech_server_packets" lineno="62252">
 <summary>
 Relabel packets to speech_server the packet type.
 </summary>
@@ -60818,85 +46921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148">
-<summary>
-Send and receive TCP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_squid_port" lineno="81163">
-<summary>
-Send UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178">
-<summary>
-Do not audit attempts to send UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_squid_port" lineno="81193">
-<summary>
-Receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208">
-<summary>
-Do not audit attempts to receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="81223">
-<summary>
-Send and receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="81254">
+<interface name="corenet_tcp_bind_squid_port" lineno="62274">
 <summary>
 Bind TCP sockets to the squid port.
 </summary>
@@ -60907,7 +46932,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_squid_port" lineno="81274">
+<interface name="corenet_udp_bind_squid_port" lineno="62294">
 <summary>
 Bind UDP sockets to the squid port.
 </summary>
@@ -60918,7 +46943,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="81293">
+<interface name="corenet_tcp_connect_squid_port" lineno="62313">
 <summary>
 Make a TCP connection to the squid port.
 </summary>
@@ -60928,7 +46953,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_client_packets" lineno="81313">
+<interface name="corenet_send_squid_client_packets" lineno="62333">
 <summary>
 Send squid_client packets.
 </summary>
@@ -60939,7 +46964,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="62352">
 <summary>
 Do not audit attempts to send squid_client packets.
 </summary>
@@ -60950,7 +46975,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_client_packets" lineno="81351">
+<interface name="corenet_receive_squid_client_packets" lineno="62371">
 <summary>
 Receive squid_client packets.
 </summary>
@@ -60961,7 +46986,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="62390">
 <summary>
 Do not audit attempts to receive squid_client packets.
 </summary>
@@ -60972,7 +46997,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="81389">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="62409">
 <summary>
 Send and receive squid_client packets.
 </summary>
@@ -60983,7 +47008,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="62425">
 <summary>
 Do not audit attempts to send and receive squid_client packets.
 </summary>
@@ -60994,7 +47019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="81420">
+<interface name="corenet_relabelto_squid_client_packets" lineno="62440">
 <summary>
 Relabel packets to squid_client the packet type.
 </summary>
@@ -61004,7 +47029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_squid_server_packets" lineno="81440">
+<interface name="corenet_send_squid_server_packets" lineno="62460">
 <summary>
 Send squid_server packets.
 </summary>
@@ -61015,7 +47040,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="62479">
 <summary>
 Do not audit attempts to send squid_server packets.
 </summary>
@@ -61026,7 +47051,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_squid_server_packets" lineno="81478">
+<interface name="corenet_receive_squid_server_packets" lineno="62498">
 <summary>
 Receive squid_server packets.
 </summary>
@@ -61037,7 +47062,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="62517">
 <summary>
 Do not audit attempts to receive squid_server packets.
 </summary>
@@ -61048,7 +47073,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="81516">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="62536">
 <summary>
 Send and receive squid_server packets.
 </summary>
@@ -61059,7 +47084,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="62552">
 <summary>
 Do not audit attempts to send and receive squid_server packets.
 </summary>
@@ -61070,7 +47095,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="81547">
+<interface name="corenet_relabelto_squid_server_packets" lineno="62567">
 <summary>
 Relabel packets to squid_server the packet type.
 </summary>
@@ -61080,85 +47105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569">
-<summary>
-Send and receive TCP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81584">
-<summary>
-Send UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599">
-<summary>
-Do not audit attempts to send UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81614">
-<summary>
-Receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629">
-<summary>
-Do not audit attempts to receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644">
-<summary>
-Send and receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81675">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="62589">
 <summary>
 Bind TCP sockets to the ssdp port.
 </summary>
@@ -61169,7 +47116,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81695">
+<interface name="corenet_udp_bind_ssdp_port" lineno="62609">
 <summary>
 Bind UDP sockets to the ssdp port.
 </summary>
@@ -61180,7 +47127,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81714">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="62628">
 <summary>
 Make a TCP connection to the ssdp port.
 </summary>
@@ -61190,7 +47137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81734">
+<interface name="corenet_send_ssdp_client_packets" lineno="62648">
 <summary>
 Send ssdp_client packets.
 </summary>
@@ -61201,7 +47148,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="62667">
 <summary>
 Do not audit attempts to send ssdp_client packets.
 </summary>
@@ -61212,7 +47159,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81772">
+<interface name="corenet_receive_ssdp_client_packets" lineno="62686">
 <summary>
 Receive ssdp_client packets.
 </summary>
@@ -61223,7 +47170,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="62705">
 <summary>
 Do not audit attempts to receive ssdp_client packets.
 </summary>
@@ -61234,7 +47181,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="62724">
 <summary>
 Send and receive ssdp_client packets.
 </summary>
@@ -61245,7 +47192,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="62740">
 <summary>
 Do not audit attempts to send and receive ssdp_client packets.
 </summary>
@@ -61256,7 +47203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="62755">
 <summary>
 Relabel packets to ssdp_client the packet type.
 </summary>
@@ -61266,7 +47213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81861">
+<interface name="corenet_send_ssdp_server_packets" lineno="62775">
 <summary>
 Send ssdp_server packets.
 </summary>
@@ -61277,7 +47224,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="62794">
 <summary>
 Do not audit attempts to send ssdp_server packets.
 </summary>
@@ -61288,7 +47235,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81899">
+<interface name="corenet_receive_ssdp_server_packets" lineno="62813">
 <summary>
 Receive ssdp_server packets.
 </summary>
@@ -61299,7 +47246,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="62832">
 <summary>
 Do not audit attempts to receive ssdp_server packets.
 </summary>
@@ -61310,7 +47257,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="62851">
 <summary>
 Send and receive ssdp_server packets.
 </summary>
@@ -61321,7 +47268,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="62867">
 <summary>
 Do not audit attempts to send and receive ssdp_server packets.
 </summary>
@@ -61332,7 +47279,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="62882">
 <summary>
 Relabel packets to ssdp_server the packet type.
 </summary>
@@ -61342,85 +47289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990">
-<summary>
-Send and receive TCP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ssh_port" lineno="82005">
-<summary>
-Send UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020">
-<summary>
-Do not audit attempts to send UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="82035">
-<summary>
-Receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050">
-<summary>
-Do not audit attempts to receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065">
-<summary>
-Send and receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="82096">
+<interface name="corenet_tcp_bind_ssh_port" lineno="62904">
 <summary>
 Bind TCP sockets to the ssh port.
 </summary>
@@ -61431,7 +47300,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="82116">
+<interface name="corenet_udp_bind_ssh_port" lineno="62924">
 <summary>
 Bind UDP sockets to the ssh port.
 </summary>
@@ -61442,7 +47311,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="82135">
+<interface name="corenet_tcp_connect_ssh_port" lineno="62943">
 <summary>
 Make a TCP connection to the ssh port.
 </summary>
@@ -61452,7 +47321,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_client_packets" lineno="82155">
+<interface name="corenet_send_ssh_client_packets" lineno="62963">
 <summary>
 Send ssh_client packets.
 </summary>
@@ -61463,7 +47332,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="62982">
 <summary>
 Do not audit attempts to send ssh_client packets.
 </summary>
@@ -61474,7 +47343,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="82193">
+<interface name="corenet_receive_ssh_client_packets" lineno="63001">
 <summary>
 Receive ssh_client packets.
 </summary>
@@ -61485,7 +47354,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="63020">
 <summary>
 Do not audit attempts to receive ssh_client packets.
 </summary>
@@ -61496,7 +47365,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="63039">
 <summary>
 Send and receive ssh_client packets.
 </summary>
@@ -61507,7 +47376,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="63055">
 <summary>
 Do not audit attempts to send and receive ssh_client packets.
 </summary>
@@ -61518,7 +47387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="82262">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="63070">
 <summary>
 Relabel packets to ssh_client the packet type.
 </summary>
@@ -61528,7 +47397,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ssh_server_packets" lineno="82282">
+<interface name="corenet_send_ssh_server_packets" lineno="63090">
 <summary>
 Send ssh_server packets.
 </summary>
@@ -61539,7 +47408,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="63109">
 <summary>
 Do not audit attempts to send ssh_server packets.
 </summary>
@@ -61550,7 +47419,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="82320">
+<interface name="corenet_receive_ssh_server_packets" lineno="63128">
 <summary>
 Receive ssh_server packets.
 </summary>
@@ -61561,7 +47430,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="63147">
 <summary>
 Do not audit attempts to receive ssh_server packets.
 </summary>
@@ -61572,7 +47441,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="63166">
 <summary>
 Send and receive ssh_server packets.
 </summary>
@@ -61583,7 +47452,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="63182">
 <summary>
 Do not audit attempts to send and receive ssh_server packets.
 </summary>
@@ -61594,7 +47463,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="82389">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="63197">
 <summary>
 Relabel packets to ssh_server the packet type.
 </summary>
@@ -61604,85 +47473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411">
-<summary>
-Send and receive TCP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="82426">
-<summary>
-Send UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441">
-<summary>
-Do not audit attempts to send UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="82456">
-<summary>
-Receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471">
-<summary>
-Do not audit attempts to receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486">
-<summary>
-Send and receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="82517">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="63219">
 <summary>
 Bind TCP sockets to the stunnel port.
 </summary>
@@ -61693,7 +47484,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="82537">
+<interface name="corenet_udp_bind_stunnel_port" lineno="63239">
 <summary>
 Bind UDP sockets to the stunnel port.
 </summary>
@@ -61704,7 +47495,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="82556">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="63258">
 <summary>
 Make a TCP connection to the stunnel port.
 </summary>
@@ -61714,7 +47505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82576">
+<interface name="corenet_send_stunnel_client_packets" lineno="63278">
 <summary>
 Send stunnel_client packets.
 </summary>
@@ -61725,7 +47516,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="63297">
 <summary>
 Do not audit attempts to send stunnel_client packets.
 </summary>
@@ -61736,7 +47527,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82614">
+<interface name="corenet_receive_stunnel_client_packets" lineno="63316">
 <summary>
 Receive stunnel_client packets.
 </summary>
@@ -61747,7 +47538,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="63335">
 <summary>
 Do not audit attempts to receive stunnel_client packets.
 </summary>
@@ -61758,7 +47549,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="63354">
 <summary>
 Send and receive stunnel_client packets.
 </summary>
@@ -61769,7 +47560,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="63370">
 <summary>
 Do not audit attempts to send and receive stunnel_client packets.
 </summary>
@@ -61780,7 +47571,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="63385">
 <summary>
 Relabel packets to stunnel_client the packet type.
 </summary>
@@ -61790,7 +47581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82703">
+<interface name="corenet_send_stunnel_server_packets" lineno="63405">
 <summary>
 Send stunnel_server packets.
 </summary>
@@ -61801,7 +47592,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="63424">
 <summary>
 Do not audit attempts to send stunnel_server packets.
 </summary>
@@ -61812,7 +47603,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82741">
+<interface name="corenet_receive_stunnel_server_packets" lineno="63443">
 <summary>
 Receive stunnel_server packets.
 </summary>
@@ -61823,7 +47614,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="63462">
 <summary>
 Do not audit attempts to receive stunnel_server packets.
 </summary>
@@ -61834,7 +47625,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="63481">
 <summary>
 Send and receive stunnel_server packets.
 </summary>
@@ -61845,7 +47636,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="63497">
 <summary>
 Do not audit attempts to send and receive stunnel_server packets.
 </summary>
@@ -61856,7 +47647,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="63512">
 <summary>
 Relabel packets to stunnel_server the packet type.
 </summary>
@@ -61866,85 +47657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832">
-<summary>
-Send and receive TCP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_svn_port" lineno="82847">
-<summary>
-Send UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862">
-<summary>
-Do not audit attempts to send UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82877">
-<summary>
-Receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892">
-<summary>
-Do not audit attempts to receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82907">
-<summary>
-Send and receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82938">
+<interface name="corenet_tcp_bind_svn_port" lineno="63534">
 <summary>
 Bind TCP sockets to the svn port.
 </summary>
@@ -61955,7 +47668,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82958">
+<interface name="corenet_udp_bind_svn_port" lineno="63554">
 <summary>
 Bind UDP sockets to the svn port.
 </summary>
@@ -61966,7 +47679,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82977">
+<interface name="corenet_tcp_connect_svn_port" lineno="63573">
 <summary>
 Make a TCP connection to the svn port.
 </summary>
@@ -61976,7 +47689,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_client_packets" lineno="82997">
+<interface name="corenet_send_svn_client_packets" lineno="63593">
 <summary>
 Send svn_client packets.
 </summary>
@@ -61987,7 +47700,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="63612">
 <summary>
 Do not audit attempts to send svn_client packets.
 </summary>
@@ -61998,7 +47711,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_client_packets" lineno="83035">
+<interface name="corenet_receive_svn_client_packets" lineno="63631">
 <summary>
 Receive svn_client packets.
 </summary>
@@ -62009,7 +47722,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="63650">
 <summary>
 Do not audit attempts to receive svn_client packets.
 </summary>
@@ -62020,7 +47733,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="83073">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="63669">
 <summary>
 Send and receive svn_client packets.
 </summary>
@@ -62031,7 +47744,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="63685">
 <summary>
 Do not audit attempts to send and receive svn_client packets.
 </summary>
@@ -62042,7 +47755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="83104">
+<interface name="corenet_relabelto_svn_client_packets" lineno="63700">
 <summary>
 Relabel packets to svn_client the packet type.
 </summary>
@@ -62052,7 +47765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svn_server_packets" lineno="83124">
+<interface name="corenet_send_svn_server_packets" lineno="63720">
 <summary>
 Send svn_server packets.
 </summary>
@@ -62063,7 +47776,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="63739">
 <summary>
 Do not audit attempts to send svn_server packets.
 </summary>
@@ -62074,7 +47787,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svn_server_packets" lineno="83162">
+<interface name="corenet_receive_svn_server_packets" lineno="63758">
 <summary>
 Receive svn_server packets.
 </summary>
@@ -62085,7 +47798,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="63777">
 <summary>
 Do not audit attempts to receive svn_server packets.
 </summary>
@@ -62096,7 +47809,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="83200">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="63796">
 <summary>
 Send and receive svn_server packets.
 </summary>
@@ -62107,7 +47820,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="63812">
 <summary>
 Do not audit attempts to send and receive svn_server packets.
 </summary>
@@ -62118,7 +47831,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="83231">
+<interface name="corenet_relabelto_svn_server_packets" lineno="63827">
 <summary>
 Relabel packets to svn_server the packet type.
 </summary>
@@ -62128,85 +47841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253">
-<summary>
-Send and receive TCP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="83268">
-<summary>
-Send UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283">
-<summary>
-Do not audit attempts to send UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="83298">
-<summary>
-Receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313">
-<summary>
-Do not audit attempts to receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328">
-<summary>
-Send and receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="83359">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="63849">
 <summary>
 Bind TCP sockets to the svrloc port.
 </summary>
@@ -62217,7 +47852,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="83379">
+<interface name="corenet_udp_bind_svrloc_port" lineno="63869">
 <summary>
 Bind UDP sockets to the svrloc port.
 </summary>
@@ -62228,7 +47863,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="83398">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="63888">
 <summary>
 Make a TCP connection to the svrloc port.
 </summary>
@@ -62238,7 +47873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="83418">
+<interface name="corenet_send_svrloc_client_packets" lineno="63908">
 <summary>
 Send svrloc_client packets.
 </summary>
@@ -62249,7 +47884,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="63927">
 <summary>
 Do not audit attempts to send svrloc_client packets.
 </summary>
@@ -62260,7 +47895,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="83456">
+<interface name="corenet_receive_svrloc_client_packets" lineno="63946">
 <summary>
 Receive svrloc_client packets.
 </summary>
@@ -62271,7 +47906,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="63965">
 <summary>
 Do not audit attempts to receive svrloc_client packets.
 </summary>
@@ -62282,7 +47917,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="63984">
 <summary>
 Send and receive svrloc_client packets.
 </summary>
@@ -62293,7 +47928,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="64000">
 <summary>
 Do not audit attempts to send and receive svrloc_client packets.
 </summary>
@@ -62304,7 +47939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="64015">
 <summary>
 Relabel packets to svrloc_client the packet type.
 </summary>
@@ -62314,7 +47949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="83545">
+<interface name="corenet_send_svrloc_server_packets" lineno="64035">
 <summary>
 Send svrloc_server packets.
 </summary>
@@ -62325,7 +47960,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="64054">
 <summary>
 Do not audit attempts to send svrloc_server packets.
 </summary>
@@ -62336,7 +47971,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83583">
+<interface name="corenet_receive_svrloc_server_packets" lineno="64073">
 <summary>
 Receive svrloc_server packets.
 </summary>
@@ -62347,7 +47982,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="64092">
 <summary>
 Do not audit attempts to receive svrloc_server packets.
 </summary>
@@ -62358,7 +47993,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="64111">
 <summary>
 Send and receive svrloc_server packets.
 </summary>
@@ -62369,7 +48004,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="64127">
 <summary>
 Do not audit attempts to send and receive svrloc_server packets.
 </summary>
@@ -62380,7 +48015,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="64142">
 <summary>
 Relabel packets to svrloc_server the packet type.
 </summary>
@@ -62390,85 +48025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674">
-<summary>
-Send and receive TCP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_swat_port" lineno="83689">
-<summary>
-Send UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704">
-<summary>
-Do not audit attempts to send UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83719">
-<summary>
-Receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734">
-<summary>
-Do not audit attempts to receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83749">
-<summary>
-Send and receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83780">
+<interface name="corenet_tcp_bind_swat_port" lineno="64164">
 <summary>
 Bind TCP sockets to the swat port.
 </summary>
@@ -62479,7 +48036,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83800">
+<interface name="corenet_udp_bind_swat_port" lineno="64184">
 <summary>
 Bind UDP sockets to the swat port.
 </summary>
@@ -62490,7 +48047,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83819">
+<interface name="corenet_tcp_connect_swat_port" lineno="64203">
 <summary>
 Make a TCP connection to the swat port.
 </summary>
@@ -62500,7 +48057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_client_packets" lineno="83839">
+<interface name="corenet_send_swat_client_packets" lineno="64223">
 <summary>
 Send swat_client packets.
 </summary>
@@ -62511,7 +48068,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="64242">
 <summary>
 Do not audit attempts to send swat_client packets.
 </summary>
@@ -62522,7 +48079,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83877">
+<interface name="corenet_receive_swat_client_packets" lineno="64261">
 <summary>
 Receive swat_client packets.
 </summary>
@@ -62533,7 +48090,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="64280">
 <summary>
 Do not audit attempts to receive swat_client packets.
 </summary>
@@ -62544,7 +48101,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83915">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="64299">
 <summary>
 Send and receive swat_client packets.
 </summary>
@@ -62555,7 +48112,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="64315">
 <summary>
 Do not audit attempts to send and receive swat_client packets.
 </summary>
@@ -62566,7 +48123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83946">
+<interface name="corenet_relabelto_swat_client_packets" lineno="64330">
 <summary>
 Relabel packets to swat_client the packet type.
 </summary>
@@ -62576,7 +48133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_swat_server_packets" lineno="83966">
+<interface name="corenet_send_swat_server_packets" lineno="64350">
 <summary>
 Send swat_server packets.
 </summary>
@@ -62587,7 +48144,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="64369">
 <summary>
 Do not audit attempts to send swat_server packets.
 </summary>
@@ -62598,7 +48155,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_swat_server_packets" lineno="84004">
+<interface name="corenet_receive_swat_server_packets" lineno="64388">
 <summary>
 Receive swat_server packets.
 </summary>
@@ -62609,7 +48166,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="64407">
 <summary>
 Do not audit attempts to receive swat_server packets.
 </summary>
@@ -62620,7 +48177,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="84042">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="64426">
 <summary>
 Send and receive swat_server packets.
 </summary>
@@ -62631,7 +48188,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="64442">
 <summary>
 Do not audit attempts to send and receive swat_server packets.
 </summary>
@@ -62642,7 +48199,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="84073">
+<interface name="corenet_relabelto_swat_server_packets" lineno="64457">
 <summary>
 Relabel packets to swat_server the packet type.
 </summary>
@@ -62652,85 +48209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095">
-<summary>
-Send and receive TCP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="84110">
-<summary>
-Send UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="84140">
-<summary>
-Receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170">
-<summary>
-Send and receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="84201">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="64479">
 <summary>
 Bind TCP sockets to the syncthing port.
 </summary>
@@ -62741,7 +48220,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="84221">
+<interface name="corenet_udp_bind_syncthing_port" lineno="64499">
 <summary>
 Bind UDP sockets to the syncthing port.
 </summary>
@@ -62752,7 +48231,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="84240">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="64518">
 <summary>
 Make a TCP connection to the syncthing port.
 </summary>
@@ -62762,7 +48241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="84260">
+<interface name="corenet_send_syncthing_client_packets" lineno="64538">
 <summary>
 Send syncthing_client packets.
 </summary>
@@ -62773,7 +48252,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="64557">
 <summary>
 Do not audit attempts to send syncthing_client packets.
 </summary>
@@ -62784,7 +48263,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="84298">
+<interface name="corenet_receive_syncthing_client_packets" lineno="64576">
 <summary>
 Receive syncthing_client packets.
 </summary>
@@ -62795,7 +48274,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="64595">
 <summary>
 Do not audit attempts to receive syncthing_client packets.
 </summary>
@@ -62806,7 +48285,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="64614">
 <summary>
 Send and receive syncthing_client packets.
 </summary>
@@ -62817,7 +48296,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="64630">
 <summary>
 Do not audit attempts to send and receive syncthing_client packets.
 </summary>
@@ -62828,7 +48307,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="64645">
 <summary>
 Relabel packets to syncthing_client the packet type.
 </summary>
@@ -62838,7 +48317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="84387">
+<interface name="corenet_send_syncthing_server_packets" lineno="64665">
 <summary>
 Send syncthing_server packets.
 </summary>
@@ -62849,7 +48328,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="64684">
 <summary>
 Do not audit attempts to send syncthing_server packets.
 </summary>
@@ -62860,7 +48339,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="84425">
+<interface name="corenet_receive_syncthing_server_packets" lineno="64703">
 <summary>
 Receive syncthing_server packets.
 </summary>
@@ -62871,7 +48350,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="64722">
 <summary>
 Do not audit attempts to receive syncthing_server packets.
 </summary>
@@ -62882,7 +48361,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="64741">
 <summary>
 Send and receive syncthing_server packets.
 </summary>
@@ -62893,7 +48372,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="64757">
 <summary>
 Do not audit attempts to send and receive syncthing_server packets.
 </summary>
@@ -62904,7 +48383,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="64772">
 <summary>
 Relabel packets to syncthing_server the packet type.
 </summary>
@@ -62914,85 +48393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516">
-<summary>
-Send and receive TCP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531">
-<summary>
-Send UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561">
-<summary>
-Receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591">
-<summary>
-Send and receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="64794">
 <summary>
 Bind TCP sockets to the syncthing_admin port.
 </summary>
@@ -63003,7 +48404,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="64814">
 <summary>
 Bind UDP sockets to the syncthing_admin port.
 </summary>
@@ -63014,7 +48415,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="64833">
 <summary>
 Make a TCP connection to the syncthing_admin port.
 </summary>
@@ -63024,7 +48425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="64853">
 <summary>
 Send syncthing_admin_client packets.
 </summary>
@@ -63035,7 +48436,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="64872">
 <summary>
 Do not audit attempts to send syncthing_admin_client packets.
 </summary>
@@ -63046,7 +48447,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="64891">
 <summary>
 Receive syncthing_admin_client packets.
 </summary>
@@ -63057,7 +48458,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="64910">
 <summary>
 Do not audit attempts to receive syncthing_admin_client packets.
 </summary>
@@ -63068,7 +48469,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="64929">
 <summary>
 Send and receive syncthing_admin_client packets.
 </summary>
@@ -63079,7 +48480,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="64945">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_client packets.
 </summary>
@@ -63090,7 +48491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="64960">
 <summary>
 Relabel packets to syncthing_admin_client the packet type.
 </summary>
@@ -63100,7 +48501,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="64980">
 <summary>
 Send syncthing_admin_server packets.
 </summary>
@@ -63111,7 +48512,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="64999">
 <summary>
 Do not audit attempts to send syncthing_admin_server packets.
 </summary>
@@ -63122,7 +48523,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="65018">
 <summary>
 Receive syncthing_admin_server packets.
 </summary>
@@ -63133,7 +48534,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="65037">
 <summary>
 Do not audit attempts to receive syncthing_admin_server packets.
 </summary>
@@ -63144,7 +48545,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="65056">
 <summary>
 Send and receive syncthing_admin_server packets.
 </summary>
@@ -63155,7 +48556,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="65072">
 <summary>
 Do not audit attempts to send and receive syncthing_admin_server packets.
 </summary>
@@ -63166,7 +48567,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="65087">
 <summary>
 Relabel packets to syncthing_admin_server the packet type.
 </summary>
@@ -63176,85 +48577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937">
-<summary>
-Send and receive TCP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952">
-<summary>
-Send UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982">
-<summary>
-Receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012">
-<summary>
-Send and receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="65109">
 <summary>
 Bind TCP sockets to the syncthing_discovery port.
 </summary>
@@ -63265,7 +48588,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="65129">
 <summary>
 Bind UDP sockets to the syncthing_discovery port.
 </summary>
@@ -63276,7 +48599,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="65148">
 <summary>
 Make a TCP connection to the syncthing_discovery port.
 </summary>
@@ -63286,7 +48609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="65168">
 <summary>
 Send syncthing_discovery_client packets.
 </summary>
@@ -63297,7 +48620,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="65187">
 <summary>
 Do not audit attempts to send syncthing_discovery_client packets.
 </summary>
@@ -63308,7 +48631,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="65206">
 <summary>
 Receive syncthing_discovery_client packets.
 </summary>
@@ -63319,7 +48642,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="65225">
 <summary>
 Do not audit attempts to receive syncthing_discovery_client packets.
 </summary>
@@ -63330,7 +48653,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="65244">
 <summary>
 Send and receive syncthing_discovery_client packets.
 </summary>
@@ -63341,7 +48664,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="65260">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_client packets.
 </summary>
@@ -63352,7 +48675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="65275">
 <summary>
 Relabel packets to syncthing_discovery_client the packet type.
 </summary>
@@ -63362,7 +48685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="65295">
 <summary>
 Send syncthing_discovery_server packets.
 </summary>
@@ -63373,7 +48696,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="65314">
 <summary>
 Do not audit attempts to send syncthing_discovery_server packets.
 </summary>
@@ -63384,7 +48707,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="65333">
 <summary>
 Receive syncthing_discovery_server packets.
 </summary>
@@ -63395,7 +48718,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="65352">
 <summary>
 Do not audit attempts to receive syncthing_discovery_server packets.
 </summary>
@@ -63406,7 +48729,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="65371">
 <summary>
 Send and receive syncthing_discovery_server packets.
 </summary>
@@ -63417,7 +48740,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="65387">
 <summary>
 Do not audit attempts to send and receive syncthing_discovery_server packets.
 </summary>
@@ -63428,7 +48751,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="65402">
 <summary>
 Relabel packets to syncthing_discovery_server the packet type.
 </summary>
@@ -63438,85 +48761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358">
-<summary>
-Send and receive TCP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="85373">
-<summary>
-Send UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388">
-<summary>
-Do not audit attempts to send UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="85403">
-<summary>
-Receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418">
-<summary>
-Do not audit attempts to receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433">
-<summary>
-Send and receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="65424">
 <summary>
 Bind TCP sockets to the sype_transport port.
 </summary>
@@ -63527,7 +48772,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="85484">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="65444">
 <summary>
 Bind UDP sockets to the sype_transport port.
 </summary>
@@ -63538,7 +48783,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="65463">
 <summary>
 Make a TCP connection to the sype_transport port.
 </summary>
@@ -63548,7 +48793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="85523">
+<interface name="corenet_send_sype_transport_client_packets" lineno="65483">
 <summary>
 Send sype_transport_client packets.
 </summary>
@@ -63559,7 +48804,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="65502">
 <summary>
 Do not audit attempts to send sype_transport_client packets.
 </summary>
@@ -63570,7 +48815,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="85561">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="65521">
 <summary>
 Receive sype_transport_client packets.
 </summary>
@@ -63581,7 +48826,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="65540">
 <summary>
 Do not audit attempts to receive sype_transport_client packets.
 </summary>
@@ -63592,7 +48837,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="65559">
 <summary>
 Send and receive sype_transport_client packets.
 </summary>
@@ -63603,7 +48848,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="65575">
 <summary>
 Do not audit attempts to send and receive sype_transport_client packets.
 </summary>
@@ -63614,7 +48859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="65590">
 <summary>
 Relabel packets to sype_transport_client the packet type.
 </summary>
@@ -63624,7 +48869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85650">
+<interface name="corenet_send_sype_transport_server_packets" lineno="65610">
 <summary>
 Send sype_transport_server packets.
 </summary>
@@ -63635,7 +48880,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="65629">
 <summary>
 Do not audit attempts to send sype_transport_server packets.
 </summary>
@@ -63646,7 +48891,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85688">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="65648">
 <summary>
 Receive sype_transport_server packets.
 </summary>
@@ -63657,7 +48902,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="65667">
 <summary>
 Do not audit attempts to receive sype_transport_server packets.
 </summary>
@@ -63668,7 +48913,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="65686">
 <summary>
 Send and receive sype_transport_server packets.
 </summary>
@@ -63679,7 +48924,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="65702">
 <summary>
 Do not audit attempts to send and receive sype_transport_server packets.
 </summary>
@@ -63690,7 +48935,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="65717">
 <summary>
 Relabel packets to sype_transport_server the packet type.
 </summary>
@@ -63700,85 +48945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779">
-<summary>
-Send and receive TCP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85794">
-<summary>
-Send UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809">
-<summary>
-Do not audit attempts to send UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85824">
-<summary>
-Receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839">
-<summary>
-Do not audit attempts to receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854">
-<summary>
-Send and receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85885">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="65739">
 <summary>
 Bind TCP sockets to the syslogd port.
 </summary>
@@ -63789,7 +48956,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85905">
+<interface name="corenet_udp_bind_syslogd_port" lineno="65759">
 <summary>
 Bind UDP sockets to the syslogd port.
 </summary>
@@ -63800,7 +48967,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85924">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="65778">
 <summary>
 Make a TCP connection to the syslogd port.
 </summary>
@@ -63810,7 +48977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85944">
+<interface name="corenet_send_syslogd_client_packets" lineno="65798">
 <summary>
 Send syslogd_client packets.
 </summary>
@@ -63821,7 +48988,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="65817">
 <summary>
 Do not audit attempts to send syslogd_client packets.
 </summary>
@@ -63832,7 +48999,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85982">
+<interface name="corenet_receive_syslogd_client_packets" lineno="65836">
 <summary>
 Receive syslogd_client packets.
 </summary>
@@ -63843,7 +49010,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="65855">
 <summary>
 Do not audit attempts to receive syslogd_client packets.
 </summary>
@@ -63854,7 +49021,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="65874">
 <summary>
 Send and receive syslogd_client packets.
 </summary>
@@ -63865,7 +49032,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="65890">
 <summary>
 Do not audit attempts to send and receive syslogd_client packets.
 </summary>
@@ -63876,7 +49043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="65905">
 <summary>
 Relabel packets to syslogd_client the packet type.
 </summary>
@@ -63886,7 +49053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="86071">
+<interface name="corenet_send_syslogd_server_packets" lineno="65925">
 <summary>
 Send syslogd_server packets.
 </summary>
@@ -63897,7 +49064,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="65944">
 <summary>
 Do not audit attempts to send syslogd_server packets.
 </summary>
@@ -63908,7 +49075,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="86109">
+<interface name="corenet_receive_syslogd_server_packets" lineno="65963">
 <summary>
 Receive syslogd_server packets.
 </summary>
@@ -63919,7 +49086,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="65982">
 <summary>
 Do not audit attempts to receive syslogd_server packets.
 </summary>
@@ -63930,7 +49097,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="66001">
 <summary>
 Send and receive syslogd_server packets.
 </summary>
@@ -63941,7 +49108,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="66017">
 <summary>
 Do not audit attempts to send and receive syslogd_server packets.
 </summary>
@@ -63952,7 +49119,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="66032">
 <summary>
 Relabel packets to syslogd_server the packet type.
 </summary>
@@ -63962,85 +49129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200">
-<summary>
-Send and receive TCP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="86215">
-<summary>
-Send UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230">
-<summary>
-Do not audit attempts to send UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245">
-<summary>
-Receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260">
-<summary>
-Do not audit attempts to receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275">
-<summary>
-Send and receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="66054">
 <summary>
 Bind TCP sockets to the syslog_tls port.
 </summary>
@@ -64051,7 +49140,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="66074">
 <summary>
 Bind UDP sockets to the syslog_tls port.
 </summary>
@@ -64062,7 +49151,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="66093">
 <summary>
 Make a TCP connection to the syslog_tls port.
 </summary>
@@ -64072,7 +49161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="86365">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="66113">
 <summary>
 Send syslog_tls_client packets.
 </summary>
@@ -64083,7 +49172,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="66132">
 <summary>
 Do not audit attempts to send syslog_tls_client packets.
 </summary>
@@ -64094,7 +49183,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="66151">
 <summary>
 Receive syslog_tls_client packets.
 </summary>
@@ -64105,7 +49194,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="66170">
 <summary>
 Do not audit attempts to receive syslog_tls_client packets.
 </summary>
@@ -64116,7 +49205,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="66189">
 <summary>
 Send and receive syslog_tls_client packets.
 </summary>
@@ -64127,7 +49216,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="66205">
 <summary>
 Do not audit attempts to send and receive syslog_tls_client packets.
 </summary>
@@ -64138,7 +49227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="66220">
 <summary>
 Relabel packets to syslog_tls_client the packet type.
 </summary>
@@ -64148,7 +49237,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="86492">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="66240">
 <summary>
 Send syslog_tls_server packets.
 </summary>
@@ -64159,7 +49248,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="66259">
 <summary>
 Do not audit attempts to send syslog_tls_server packets.
 </summary>
@@ -64170,7 +49259,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="66278">
 <summary>
 Receive syslog_tls_server packets.
 </summary>
@@ -64181,7 +49270,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="66297">
 <summary>
 Do not audit attempts to receive syslog_tls_server packets.
 </summary>
@@ -64192,7 +49281,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="66316">
 <summary>
 Send and receive syslog_tls_server packets.
 </summary>
@@ -64203,7 +49292,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="66332">
 <summary>
 Do not audit attempts to send and receive syslog_tls_server packets.
 </summary>
@@ -64214,7 +49303,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="66347">
 <summary>
 Relabel packets to syslog_tls_server the packet type.
 </summary>
@@ -64224,85 +49313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621">
-<summary>
-Send and receive TCP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86636">
-<summary>
-Send UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651">
-<summary>
-Do not audit attempts to send UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86666">
-<summary>
-Receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681">
-<summary>
-Do not audit attempts to receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696">
-<summary>
-Send and receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86727">
+<interface name="corenet_tcp_bind_tcs_port" lineno="66369">
 <summary>
 Bind TCP sockets to the tcs port.
 </summary>
@@ -64313,7 +49324,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86747">
+<interface name="corenet_udp_bind_tcs_port" lineno="66389">
 <summary>
 Bind UDP sockets to the tcs port.
 </summary>
@@ -64324,7 +49335,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86766">
+<interface name="corenet_tcp_connect_tcs_port" lineno="66408">
 <summary>
 Make a TCP connection to the tcs port.
 </summary>
@@ -64334,7 +49345,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86786">
+<interface name="corenet_send_tcs_client_packets" lineno="66428">
 <summary>
 Send tcs_client packets.
 </summary>
@@ -64345,7 +49356,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="66447">
 <summary>
 Do not audit attempts to send tcs_client packets.
 </summary>
@@ -64356,7 +49367,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86824">
+<interface name="corenet_receive_tcs_client_packets" lineno="66466">
 <summary>
 Receive tcs_client packets.
 </summary>
@@ -64367,7 +49378,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="66485">
 <summary>
 Do not audit attempts to receive tcs_client packets.
 </summary>
@@ -64378,7 +49389,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="66504">
 <summary>
 Send and receive tcs_client packets.
 </summary>
@@ -64389,7 +49400,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="66520">
 <summary>
 Do not audit attempts to send and receive tcs_client packets.
 </summary>
@@ -64400,7 +49411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86893">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="66535">
 <summary>
 Relabel packets to tcs_client the packet type.
 </summary>
@@ -64410,7 +49421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86913">
+<interface name="corenet_send_tcs_server_packets" lineno="66555">
 <summary>
 Send tcs_server packets.
 </summary>
@@ -64421,7 +49432,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="66574">
 <summary>
 Do not audit attempts to send tcs_server packets.
 </summary>
@@ -64432,7 +49443,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86951">
+<interface name="corenet_receive_tcs_server_packets" lineno="66593">
 <summary>
 Receive tcs_server packets.
 </summary>
@@ -64443,7 +49454,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="66612">
 <summary>
 Do not audit attempts to receive tcs_server packets.
 </summary>
@@ -64454,7 +49465,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="66631">
 <summary>
 Send and receive tcs_server packets.
 </summary>
@@ -64465,7 +49476,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="66647">
 <summary>
 Do not audit attempts to send and receive tcs_server packets.
 </summary>
@@ -64476,7 +49487,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="87020">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="66662">
 <summary>
 Relabel packets to tcs_server the packet type.
 </summary>
@@ -64486,85 +49497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042">
-<summary>
-Send and receive TCP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="87057">
-<summary>
-Send UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072">
-<summary>
-Do not audit attempts to send UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="87087">
-<summary>
-Receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102">
-<summary>
-Do not audit attempts to receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117">
-<summary>
-Send and receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="87148">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="66684">
 <summary>
 Bind TCP sockets to the telnetd port.
 </summary>
@@ -64575,7 +49508,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="87168">
+<interface name="corenet_udp_bind_telnetd_port" lineno="66704">
 <summary>
 Bind UDP sockets to the telnetd port.
 </summary>
@@ -64586,7 +49519,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="87187">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="66723">
 <summary>
 Make a TCP connection to the telnetd port.
 </summary>
@@ -64596,7 +49529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="87207">
+<interface name="corenet_send_telnetd_client_packets" lineno="66743">
 <summary>
 Send telnetd_client packets.
 </summary>
@@ -64607,7 +49540,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="66762">
 <summary>
 Do not audit attempts to send telnetd_client packets.
 </summary>
@@ -64618,7 +49551,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="87245">
+<interface name="corenet_receive_telnetd_client_packets" lineno="66781">
 <summary>
 Receive telnetd_client packets.
 </summary>
@@ -64629,7 +49562,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="66800">
 <summary>
 Do not audit attempts to receive telnetd_client packets.
 </summary>
@@ -64640,7 +49573,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="66819">
 <summary>
 Send and receive telnetd_client packets.
 </summary>
@@ -64651,7 +49584,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="66835">
 <summary>
 Do not audit attempts to send and receive telnetd_client packets.
 </summary>
@@ -64662,7 +49595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="66850">
 <summary>
 Relabel packets to telnetd_client the packet type.
 </summary>
@@ -64672,7 +49605,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="87334">
+<interface name="corenet_send_telnetd_server_packets" lineno="66870">
 <summary>
 Send telnetd_server packets.
 </summary>
@@ -64683,7 +49616,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="66889">
 <summary>
 Do not audit attempts to send telnetd_server packets.
 </summary>
@@ -64694,7 +49627,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="87372">
+<interface name="corenet_receive_telnetd_server_packets" lineno="66908">
 <summary>
 Receive telnetd_server packets.
 </summary>
@@ -64705,7 +49638,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="66927">
 <summary>
 Do not audit attempts to receive telnetd_server packets.
 </summary>
@@ -64716,7 +49649,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="66946">
 <summary>
 Send and receive telnetd_server packets.
 </summary>
@@ -64727,7 +49660,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="66962">
 <summary>
 Do not audit attempts to send and receive telnetd_server packets.
 </summary>
@@ -64738,7 +49671,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="66977">
 <summary>
 Relabel packets to telnetd_server the packet type.
 </summary>
@@ -64748,85 +49681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463">
-<summary>
-Send and receive TCP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tftp_port" lineno="87478">
-<summary>
-Send UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493">
-<summary>
-Do not audit attempts to send UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="87508">
-<summary>
-Receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523">
-<summary>
-Do not audit attempts to receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538">
-<summary>
-Send and receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87569">
+<interface name="corenet_tcp_bind_tftp_port" lineno="66999">
 <summary>
 Bind TCP sockets to the tftp port.
 </summary>
@@ -64837,7 +49692,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87589">
+<interface name="corenet_udp_bind_tftp_port" lineno="67019">
 <summary>
 Bind UDP sockets to the tftp port.
 </summary>
@@ -64848,7 +49703,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87608">
+<interface name="corenet_tcp_connect_tftp_port" lineno="67038">
 <summary>
 Make a TCP connection to the tftp port.
 </summary>
@@ -64858,7 +49713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87628">
+<interface name="corenet_send_tftp_client_packets" lineno="67058">
 <summary>
 Send tftp_client packets.
 </summary>
@@ -64869,7 +49724,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="67077">
 <summary>
 Do not audit attempts to send tftp_client packets.
 </summary>
@@ -64880,7 +49735,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87666">
+<interface name="corenet_receive_tftp_client_packets" lineno="67096">
 <summary>
 Receive tftp_client packets.
 </summary>
@@ -64891,7 +49746,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="67115">
 <summary>
 Do not audit attempts to receive tftp_client packets.
 </summary>
@@ -64902,7 +49757,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="67134">
 <summary>
 Send and receive tftp_client packets.
 </summary>
@@ -64913,7 +49768,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="67150">
 <summary>
 Do not audit attempts to send and receive tftp_client packets.
 </summary>
@@ -64924,7 +49779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87735">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="67165">
 <summary>
 Relabel packets to tftp_client the packet type.
 </summary>
@@ -64934,7 +49789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87755">
+<interface name="corenet_send_tftp_server_packets" lineno="67185">
 <summary>
 Send tftp_server packets.
 </summary>
@@ -64945,7 +49800,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="67204">
 <summary>
 Do not audit attempts to send tftp_server packets.
 </summary>
@@ -64956,7 +49811,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87793">
+<interface name="corenet_receive_tftp_server_packets" lineno="67223">
 <summary>
 Receive tftp_server packets.
 </summary>
@@ -64967,7 +49822,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="67242">
 <summary>
 Do not audit attempts to receive tftp_server packets.
 </summary>
@@ -64978,7 +49833,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="67261">
 <summary>
 Send and receive tftp_server packets.
 </summary>
@@ -64989,7 +49844,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="67277">
 <summary>
 Do not audit attempts to send and receive tftp_server packets.
 </summary>
@@ -65000,7 +49855,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87862">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="67292">
 <summary>
 Relabel packets to tftp_server the packet type.
 </summary>
@@ -65010,85 +49865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884">
-<summary>
-Send and receive TCP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tor_port" lineno="87899">
-<summary>
-Send UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914">
-<summary>
-Do not audit attempts to send UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87929">
-<summary>
-Receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944">
-<summary>
-Do not audit attempts to receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87959">
-<summary>
-Send and receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87990">
+<interface name="corenet_tcp_bind_tor_port" lineno="67314">
 <summary>
 Bind TCP sockets to the tor port.
 </summary>
@@ -65099,7 +49876,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_tor_port" lineno="88010">
+<interface name="corenet_udp_bind_tor_port" lineno="67334">
 <summary>
 Bind UDP sockets to the tor port.
 </summary>
@@ -65110,7 +49887,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="88029">
+<interface name="corenet_tcp_connect_tor_port" lineno="67353">
 <summary>
 Make a TCP connection to the tor port.
 </summary>
@@ -65120,7 +49897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_client_packets" lineno="88049">
+<interface name="corenet_send_tor_client_packets" lineno="67373">
 <summary>
 Send tor_client packets.
 </summary>
@@ -65131,7 +49908,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="67392">
 <summary>
 Do not audit attempts to send tor_client packets.
 </summary>
@@ -65142,7 +49919,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_client_packets" lineno="88087">
+<interface name="corenet_receive_tor_client_packets" lineno="67411">
 <summary>
 Receive tor_client packets.
 </summary>
@@ -65153,7 +49930,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="67430">
 <summary>
 Do not audit attempts to receive tor_client packets.
 </summary>
@@ -65164,7 +49941,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="88125">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="67449">
 <summary>
 Send and receive tor_client packets.
 </summary>
@@ -65175,7 +49952,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="67465">
 <summary>
 Do not audit attempts to send and receive tor_client packets.
 </summary>
@@ -65186,7 +49963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="88156">
+<interface name="corenet_relabelto_tor_client_packets" lineno="67480">
 <summary>
 Relabel packets to tor_client the packet type.
 </summary>
@@ -65196,7 +49973,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_tor_server_packets" lineno="88176">
+<interface name="corenet_send_tor_server_packets" lineno="67500">
 <summary>
 Send tor_server packets.
 </summary>
@@ -65207,7 +49984,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="67519">
 <summary>
 Do not audit attempts to send tor_server packets.
 </summary>
@@ -65218,7 +49995,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_tor_server_packets" lineno="88214">
+<interface name="corenet_receive_tor_server_packets" lineno="67538">
 <summary>
 Receive tor_server packets.
 </summary>
@@ -65229,7 +50006,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="67557">
 <summary>
 Do not audit attempts to receive tor_server packets.
 </summary>
@@ -65240,7 +50017,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="88252">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="67576">
 <summary>
 Send and receive tor_server packets.
 </summary>
@@ -65251,7 +50028,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="67592">
 <summary>
 Do not audit attempts to send and receive tor_server packets.
 </summary>
@@ -65262,7 +50039,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="88283">
+<interface name="corenet_relabelto_tor_server_packets" lineno="67607">
 <summary>
 Relabel packets to tor_server the packet type.
 </summary>
@@ -65272,85 +50049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305">
-<summary>
-Send and receive TCP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="88320">
-<summary>
-Send UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335">
-<summary>
-Do not audit attempts to send UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="88350">
-<summary>
-Receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365">
-<summary>
-Do not audit attempts to receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380">
-<summary>
-Send and receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="88411">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="67629">
 <summary>
 Bind TCP sockets to the traceroute port.
 </summary>
@@ -65361,7 +50060,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="88431">
+<interface name="corenet_udp_bind_traceroute_port" lineno="67649">
 <summary>
 Bind UDP sockets to the traceroute port.
 </summary>
@@ -65372,7 +50071,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="88450">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="67668">
 <summary>
 Make a TCP connection to the traceroute port.
 </summary>
@@ -65382,7 +50081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="88470">
+<interface name="corenet_send_traceroute_client_packets" lineno="67688">
 <summary>
 Send traceroute_client packets.
 </summary>
@@ -65393,7 +50092,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="67707">
 <summary>
 Do not audit attempts to send traceroute_client packets.
 </summary>
@@ -65404,7 +50103,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="88508">
+<interface name="corenet_receive_traceroute_client_packets" lineno="67726">
 <summary>
 Receive traceroute_client packets.
 </summary>
@@ -65415,7 +50114,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="67745">
 <summary>
 Do not audit attempts to receive traceroute_client packets.
 </summary>
@@ -65426,7 +50125,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="67764">
 <summary>
 Send and receive traceroute_client packets.
 </summary>
@@ -65437,7 +50136,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="67780">
 <summary>
 Do not audit attempts to send and receive traceroute_client packets.
 </summary>
@@ -65448,7 +50147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="67795">
 <summary>
 Relabel packets to traceroute_client the packet type.
 </summary>
@@ -65458,7 +50157,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88597">
+<interface name="corenet_send_traceroute_server_packets" lineno="67815">
 <summary>
 Send traceroute_server packets.
 </summary>
@@ -65469,7 +50168,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="67834">
 <summary>
 Do not audit attempts to send traceroute_server packets.
 </summary>
@@ -65480,7 +50179,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88635">
+<interface name="corenet_receive_traceroute_server_packets" lineno="67853">
 <summary>
 Receive traceroute_server packets.
 </summary>
@@ -65491,7 +50190,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="67872">
 <summary>
 Do not audit attempts to receive traceroute_server packets.
 </summary>
@@ -65502,7 +50201,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="67891">
 <summary>
 Send and receive traceroute_server packets.
 </summary>
@@ -65513,7 +50212,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="67907">
 <summary>
 Do not audit attempts to send and receive traceroute_server packets.
 </summary>
@@ -65524,7 +50223,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="67922">
 <summary>
 Relabel packets to traceroute_server the packet type.
 </summary>
@@ -65534,85 +50233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726">
-<summary>
-Send and receive TCP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88741">
-<summary>
-Send UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756">
-<summary>
-Do not audit attempts to send UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88771">
-<summary>
-Receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786">
-<summary>
-Do not audit attempts to receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801">
-<summary>
-Send and receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88832">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="67944">
 <summary>
 Bind TCP sockets to the transproxy port.
 </summary>
@@ -65623,7 +50244,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88852">
+<interface name="corenet_udp_bind_transproxy_port" lineno="67964">
 <summary>
 Bind UDP sockets to the transproxy port.
 </summary>
@@ -65634,7 +50255,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88871">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="67983">
 <summary>
 Make a TCP connection to the transproxy port.
 </summary>
@@ -65644,7 +50265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88891">
+<interface name="corenet_send_transproxy_client_packets" lineno="68003">
 <summary>
 Send transproxy_client packets.
 </summary>
@@ -65655,7 +50276,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="68022">
 <summary>
 Do not audit attempts to send transproxy_client packets.
 </summary>
@@ -65666,7 +50287,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88929">
+<interface name="corenet_receive_transproxy_client_packets" lineno="68041">
 <summary>
 Receive transproxy_client packets.
 </summary>
@@ -65677,7 +50298,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="68060">
 <summary>
 Do not audit attempts to receive transproxy_client packets.
 </summary>
@@ -65688,7 +50309,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="68079">
 <summary>
 Send and receive transproxy_client packets.
 </summary>
@@ -65699,7 +50320,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="68095">
 <summary>
 Do not audit attempts to send and receive transproxy_client packets.
 </summary>
@@ -65710,7 +50331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="68110">
 <summary>
 Relabel packets to transproxy_client the packet type.
 </summary>
@@ -65720,7 +50341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="89018">
+<interface name="corenet_send_transproxy_server_packets" lineno="68130">
 <summary>
 Send transproxy_server packets.
 </summary>
@@ -65731,7 +50352,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="68149">
 <summary>
 Do not audit attempts to send transproxy_server packets.
 </summary>
@@ -65742,7 +50363,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="89056">
+<interface name="corenet_receive_transproxy_server_packets" lineno="68168">
 <summary>
 Receive transproxy_server packets.
 </summary>
@@ -65753,7 +50374,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="68187">
 <summary>
 Do not audit attempts to receive transproxy_server packets.
 </summary>
@@ -65764,7 +50385,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="68206">
 <summary>
 Send and receive transproxy_server packets.
 </summary>
@@ -65775,7 +50396,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="68222">
 <summary>
 Do not audit attempts to send and receive transproxy_server packets.
 </summary>
@@ -65786,7 +50407,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="68237">
 <summary>
 Relabel packets to transproxy_server the packet type.
 </summary>
@@ -65796,85 +50417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147">
-<summary>
-Send and receive TCP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="89162">
-<summary>
-Send UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177">
-<summary>
-Do not audit attempts to send UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="89192">
-<summary>
-Receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207">
-<summary>
-Do not audit attempts to receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222">
-<summary>
-Send and receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="89253">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="68259">
 <summary>
 Bind TCP sockets to the trisoap port.
 </summary>
@@ -65885,7 +50428,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="89273">
+<interface name="corenet_udp_bind_trisoap_port" lineno="68279">
 <summary>
 Bind UDP sockets to the trisoap port.
 </summary>
@@ -65896,7 +50439,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="89292">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="68298">
 <summary>
 Make a TCP connection to the trisoap port.
 </summary>
@@ -65906,7 +50449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="89312">
+<interface name="corenet_send_trisoap_client_packets" lineno="68318">
 <summary>
 Send trisoap_client packets.
 </summary>
@@ -65917,7 +50460,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="68337">
 <summary>
 Do not audit attempts to send trisoap_client packets.
 </summary>
@@ -65928,7 +50471,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="89350">
+<interface name="corenet_receive_trisoap_client_packets" lineno="68356">
 <summary>
 Receive trisoap_client packets.
 </summary>
@@ -65939,7 +50482,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="68375">
 <summary>
 Do not audit attempts to receive trisoap_client packets.
 </summary>
@@ -65950,7 +50493,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="68394">
 <summary>
 Send and receive trisoap_client packets.
 </summary>
@@ -65961,7 +50504,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="68410">
 <summary>
 Do not audit attempts to send and receive trisoap_client packets.
 </summary>
@@ -65972,7 +50515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="68425">
 <summary>
 Relabel packets to trisoap_client the packet type.
 </summary>
@@ -65982,7 +50525,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="89439">
+<interface name="corenet_send_trisoap_server_packets" lineno="68445">
 <summary>
 Send trisoap_server packets.
 </summary>
@@ -65993,7 +50536,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="68464">
 <summary>
 Do not audit attempts to send trisoap_server packets.
 </summary>
@@ -66004,7 +50547,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="89477">
+<interface name="corenet_receive_trisoap_server_packets" lineno="68483">
 <summary>
 Receive trisoap_server packets.
 </summary>
@@ -66015,7 +50558,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="68502">
 <summary>
 Do not audit attempts to receive trisoap_server packets.
 </summary>
@@ -66026,7 +50569,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="68521">
 <summary>
 Send and receive trisoap_server packets.
 </summary>
@@ -66037,7 +50580,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="68537">
 <summary>
 Do not audit attempts to send and receive trisoap_server packets.
 </summary>
@@ -66048,7 +50591,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="68552">
 <summary>
 Relabel packets to trisoap_server the packet type.
 </summary>
@@ -66058,85 +50601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568">
-<summary>
-Send and receive TCP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89583">
-<summary>
-Send UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598">
-<summary>
-Do not audit attempts to send UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89613">
-<summary>
-Receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628">
-<summary>
-Do not audit attempts to receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643">
-<summary>
-Send and receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="68574">
 <summary>
 Bind TCP sockets to the trivnet1 port.
 </summary>
@@ -66147,7 +50612,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89694">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="68594">
 <summary>
 Bind UDP sockets to the trivnet1 port.
 </summary>
@@ -66158,7 +50623,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="68613">
 <summary>
 Make a TCP connection to the trivnet1 port.
 </summary>
@@ -66168,7 +50633,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89733">
+<interface name="corenet_send_trivnet1_client_packets" lineno="68633">
 <summary>
 Send trivnet1_client packets.
 </summary>
@@ -66179,7 +50644,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="68652">
 <summary>
 Do not audit attempts to send trivnet1_client packets.
 </summary>
@@ -66190,7 +50655,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89771">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="68671">
 <summary>
 Receive trivnet1_client packets.
 </summary>
@@ -66201,7 +50666,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="68690">
 <summary>
 Do not audit attempts to receive trivnet1_client packets.
 </summary>
@@ -66212,7 +50677,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="68709">
 <summary>
 Send and receive trivnet1_client packets.
 </summary>
@@ -66223,7 +50688,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="68725">
 <summary>
 Do not audit attempts to send and receive trivnet1_client packets.
 </summary>
@@ -66234,7 +50699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="68740">
 <summary>
 Relabel packets to trivnet1_client the packet type.
 </summary>
@@ -66244,7 +50709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89860">
+<interface name="corenet_send_trivnet1_server_packets" lineno="68760">
 <summary>
 Send trivnet1_server packets.
 </summary>
@@ -66255,7 +50720,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="68779">
 <summary>
 Do not audit attempts to send trivnet1_server packets.
 </summary>
@@ -66266,7 +50731,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89898">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="68798">
 <summary>
 Receive trivnet1_server packets.
 </summary>
@@ -66277,7 +50742,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="68817">
 <summary>
 Do not audit attempts to receive trivnet1_server packets.
 </summary>
@@ -66288,7 +50753,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="68836">
 <summary>
 Send and receive trivnet1_server packets.
 </summary>
@@ -66299,7 +50764,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="68852">
 <summary>
 Do not audit attempts to send and receive trivnet1_server packets.
 </summary>
@@ -66310,7 +50775,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="68867">
 <summary>
 Relabel packets to trivnet1_server the packet type.
 </summary>
@@ -66320,85 +50785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989">
-<summary>
-Send and receive TCP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ups_port" lineno="90004">
-<summary>
-Send UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019">
-<summary>
-Do not audit attempts to send UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ups_port" lineno="90034">
-<summary>
-Receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049">
-<summary>
-Do not audit attempts to receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="90064">
-<summary>
-Send and receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="90095">
+<interface name="corenet_tcp_bind_ups_port" lineno="68889">
 <summary>
 Bind TCP sockets to the ups port.
 </summary>
@@ -66409,7 +50796,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_ups_port" lineno="90115">
+<interface name="corenet_udp_bind_ups_port" lineno="68909">
 <summary>
 Bind UDP sockets to the ups port.
 </summary>
@@ -66420,7 +50807,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="90134">
+<interface name="corenet_tcp_connect_ups_port" lineno="68928">
 <summary>
 Make a TCP connection to the ups port.
 </summary>
@@ -66430,7 +50817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_client_packets" lineno="90154">
+<interface name="corenet_send_ups_client_packets" lineno="68948">
 <summary>
 Send ups_client packets.
 </summary>
@@ -66441,7 +50828,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="68967">
 <summary>
 Do not audit attempts to send ups_client packets.
 </summary>
@@ -66452,7 +50839,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_client_packets" lineno="90192">
+<interface name="corenet_receive_ups_client_packets" lineno="68986">
 <summary>
 Receive ups_client packets.
 </summary>
@@ -66463,7 +50850,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="69005">
 <summary>
 Do not audit attempts to receive ups_client packets.
 </summary>
@@ -66474,7 +50861,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="90230">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="69024">
 <summary>
 Send and receive ups_client packets.
 </summary>
@@ -66485,7 +50872,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="69040">
 <summary>
 Do not audit attempts to send and receive ups_client packets.
 </summary>
@@ -66496,7 +50883,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="90261">
+<interface name="corenet_relabelto_ups_client_packets" lineno="69055">
 <summary>
 Relabel packets to ups_client the packet type.
 </summary>
@@ -66506,7 +50893,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_ups_server_packets" lineno="90281">
+<interface name="corenet_send_ups_server_packets" lineno="69075">
 <summary>
 Send ups_server packets.
 </summary>
@@ -66517,7 +50904,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="69094">
 <summary>
 Do not audit attempts to send ups_server packets.
 </summary>
@@ -66528,7 +50915,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_ups_server_packets" lineno="90319">
+<interface name="corenet_receive_ups_server_packets" lineno="69113">
 <summary>
 Receive ups_server packets.
 </summary>
@@ -66539,7 +50926,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="69132">
 <summary>
 Do not audit attempts to receive ups_server packets.
 </summary>
@@ -66550,7 +50937,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="90357">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="69151">
 <summary>
 Send and receive ups_server packets.
 </summary>
@@ -66561,7 +50948,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="69167">
 <summary>
 Do not audit attempts to send and receive ups_server packets.
 </summary>
@@ -66572,7 +50959,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="90388">
+<interface name="corenet_relabelto_ups_server_packets" lineno="69182">
 <summary>
 Relabel packets to ups_server the packet type.
 </summary>
@@ -66582,85 +50969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410">
-<summary>
-Send and receive TCP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="90425">
-<summary>
-Send UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440">
-<summary>
-Do not audit attempts to send UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="90455">
-<summary>
-Receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470">
-<summary>
-Do not audit attempts to receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485">
-<summary>
-Send and receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="69204">
 <summary>
 Bind TCP sockets to the utcpserver port.
 </summary>
@@ -66671,7 +50980,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="90536">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="69224">
 <summary>
 Bind UDP sockets to the utcpserver port.
 </summary>
@@ -66682,7 +50991,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="69243">
 <summary>
 Make a TCP connection to the utcpserver port.
 </summary>
@@ -66692,7 +51001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90575">
+<interface name="corenet_send_utcpserver_client_packets" lineno="69263">
 <summary>
 Send utcpserver_client packets.
 </summary>
@@ -66703,7 +51012,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="69282">
 <summary>
 Do not audit attempts to send utcpserver_client packets.
 </summary>
@@ -66714,7 +51023,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90613">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="69301">
 <summary>
 Receive utcpserver_client packets.
 </summary>
@@ -66725,7 +51034,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="69320">
 <summary>
 Do not audit attempts to receive utcpserver_client packets.
 </summary>
@@ -66736,7 +51045,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="69339">
 <summary>
 Send and receive utcpserver_client packets.
 </summary>
@@ -66747,7 +51056,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="69355">
 <summary>
 Do not audit attempts to send and receive utcpserver_client packets.
 </summary>
@@ -66758,7 +51067,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="69370">
 <summary>
 Relabel packets to utcpserver_client the packet type.
 </summary>
@@ -66768,7 +51077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90702">
+<interface name="corenet_send_utcpserver_server_packets" lineno="69390">
 <summary>
 Send utcpserver_server packets.
 </summary>
@@ -66779,7 +51088,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="69409">
 <summary>
 Do not audit attempts to send utcpserver_server packets.
 </summary>
@@ -66790,7 +51099,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90740">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="69428">
 <summary>
 Receive utcpserver_server packets.
 </summary>
@@ -66801,7 +51110,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="69447">
 <summary>
 Do not audit attempts to receive utcpserver_server packets.
 </summary>
@@ -66812,7 +51121,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="69466">
 <summary>
 Send and receive utcpserver_server packets.
 </summary>
@@ -66823,7 +51132,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="69482">
 <summary>
 Do not audit attempts to send and receive utcpserver_server packets.
 </summary>
@@ -66834,7 +51143,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="69497">
 <summary>
 Relabel packets to utcpserver_server the packet type.
 </summary>
@@ -66844,85 +51153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831">
-<summary>
-Send and receive TCP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90846">
-<summary>
-Send UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861">
-<summary>
-Do not audit attempts to send UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90876">
-<summary>
-Receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891">
-<summary>
-Do not audit attempts to receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906">
-<summary>
-Send and receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90937">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="69519">
 <summary>
 Bind TCP sockets to the uucpd port.
 </summary>
@@ -66933,7 +51164,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90957">
+<interface name="corenet_udp_bind_uucpd_port" lineno="69539">
 <summary>
 Bind UDP sockets to the uucpd port.
 </summary>
@@ -66944,7 +51175,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90976">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="69558">
 <summary>
 Make a TCP connection to the uucpd port.
 </summary>
@@ -66954,7 +51185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90996">
+<interface name="corenet_send_uucpd_client_packets" lineno="69578">
 <summary>
 Send uucpd_client packets.
 </summary>
@@ -66965,7 +51196,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="69597">
 <summary>
 Do not audit attempts to send uucpd_client packets.
 </summary>
@@ -66976,7 +51207,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="91034">
+<interface name="corenet_receive_uucpd_client_packets" lineno="69616">
 <summary>
 Receive uucpd_client packets.
 </summary>
@@ -66987,7 +51218,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="69635">
 <summary>
 Do not audit attempts to receive uucpd_client packets.
 </summary>
@@ -66998,7 +51229,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="69654">
 <summary>
 Send and receive uucpd_client packets.
 </summary>
@@ -67009,7 +51240,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="69670">
 <summary>
 Do not audit attempts to send and receive uucpd_client packets.
 </summary>
@@ -67020,7 +51251,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="69685">
 <summary>
 Relabel packets to uucpd_client the packet type.
 </summary>
@@ -67030,7 +51261,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="91123">
+<interface name="corenet_send_uucpd_server_packets" lineno="69705">
 <summary>
 Send uucpd_server packets.
 </summary>
@@ -67041,7 +51272,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="69724">
 <summary>
 Do not audit attempts to send uucpd_server packets.
 </summary>
@@ -67052,7 +51283,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="91161">
+<interface name="corenet_receive_uucpd_server_packets" lineno="69743">
 <summary>
 Receive uucpd_server packets.
 </summary>
@@ -67063,7 +51294,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="69762">
 <summary>
 Do not audit attempts to receive uucpd_server packets.
 </summary>
@@ -67074,7 +51305,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="69781">
 <summary>
 Send and receive uucpd_server packets.
 </summary>
@@ -67085,7 +51316,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="69797">
 <summary>
 Do not audit attempts to send and receive uucpd_server packets.
 </summary>
@@ -67096,7 +51327,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="69812">
 <summary>
 Relabel packets to uucpd_server the packet type.
 </summary>
@@ -67106,85 +51337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252">
-<summary>
-Send and receive TCP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="91267">
-<summary>
-Send UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282">
-<summary>
-Do not audit attempts to send UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="91297">
-<summary>
-Receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312">
-<summary>
-Do not audit attempts to receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327">
-<summary>
-Send and receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="91358">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="69834">
 <summary>
 Bind TCP sockets to the varnishd port.
 </summary>
@@ -67195,7 +51348,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="91378">
+<interface name="corenet_udp_bind_varnishd_port" lineno="69854">
 <summary>
 Bind UDP sockets to the varnishd port.
 </summary>
@@ -67206,7 +51359,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="91397">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="69873">
 <summary>
 Make a TCP connection to the varnishd port.
 </summary>
@@ -67216,7 +51369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="91417">
+<interface name="corenet_send_varnishd_client_packets" lineno="69893">
 <summary>
 Send varnishd_client packets.
 </summary>
@@ -67227,7 +51380,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="69912">
 <summary>
 Do not audit attempts to send varnishd_client packets.
 </summary>
@@ -67238,7 +51391,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="91455">
+<interface name="corenet_receive_varnishd_client_packets" lineno="69931">
 <summary>
 Receive varnishd_client packets.
 </summary>
@@ -67249,7 +51402,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="69950">
 <summary>
 Do not audit attempts to receive varnishd_client packets.
 </summary>
@@ -67260,7 +51413,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="69969">
 <summary>
 Send and receive varnishd_client packets.
 </summary>
@@ -67271,7 +51424,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="69985">
 <summary>
 Do not audit attempts to send and receive varnishd_client packets.
 </summary>
@@ -67282,7 +51435,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="70000">
 <summary>
 Relabel packets to varnishd_client the packet type.
 </summary>
@@ -67292,7 +51445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="91544">
+<interface name="corenet_send_varnishd_server_packets" lineno="70020">
 <summary>
 Send varnishd_server packets.
 </summary>
@@ -67303,7 +51456,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="70039">
 <summary>
 Do not audit attempts to send varnishd_server packets.
 </summary>
@@ -67314,7 +51467,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91582">
+<interface name="corenet_receive_varnishd_server_packets" lineno="70058">
 <summary>
 Receive varnishd_server packets.
 </summary>
@@ -67325,7 +51478,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="70077">
 <summary>
 Do not audit attempts to receive varnishd_server packets.
 </summary>
@@ -67336,7 +51489,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="70096">
 <summary>
 Send and receive varnishd_server packets.
 </summary>
@@ -67347,7 +51500,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="70112">
 <summary>
 Do not audit attempts to send and receive varnishd_server packets.
 </summary>
@@ -67358,7 +51511,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="70127">
 <summary>
 Relabel packets to varnishd_server the packet type.
 </summary>
@@ -67368,85 +51521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673">
-<summary>
-Send and receive TCP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virt_port" lineno="91688">
-<summary>
-Send UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703">
-<summary>
-Do not audit attempts to send UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91718">
-<summary>
-Receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733">
-<summary>
-Do not audit attempts to receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91748">
-<summary>
-Send and receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91779">
+<interface name="corenet_tcp_bind_virt_port" lineno="70149">
 <summary>
 Bind TCP sockets to the virt port.
 </summary>
@@ -67457,7 +51532,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91799">
+<interface name="corenet_udp_bind_virt_port" lineno="70169">
 <summary>
 Bind UDP sockets to the virt port.
 </summary>
@@ -67468,7 +51543,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91818">
+<interface name="corenet_tcp_connect_virt_port" lineno="70188">
 <summary>
 Make a TCP connection to the virt port.
 </summary>
@@ -67478,7 +51553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_client_packets" lineno="91838">
+<interface name="corenet_send_virt_client_packets" lineno="70208">
 <summary>
 Send virt_client packets.
 </summary>
@@ -67489,7 +51564,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="70227">
 <summary>
 Do not audit attempts to send virt_client packets.
 </summary>
@@ -67500,7 +51575,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91876">
+<interface name="corenet_receive_virt_client_packets" lineno="70246">
 <summary>
 Receive virt_client packets.
 </summary>
@@ -67511,7 +51586,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="70265">
 <summary>
 Do not audit attempts to receive virt_client packets.
 </summary>
@@ -67522,7 +51597,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91914">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="70284">
 <summary>
 Send and receive virt_client packets.
 </summary>
@@ -67533,7 +51608,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="70300">
 <summary>
 Do not audit attempts to send and receive virt_client packets.
 </summary>
@@ -67544,7 +51619,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91945">
+<interface name="corenet_relabelto_virt_client_packets" lineno="70315">
 <summary>
 Relabel packets to virt_client the packet type.
 </summary>
@@ -67554,7 +51629,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_server_packets" lineno="91965">
+<interface name="corenet_send_virt_server_packets" lineno="70335">
 <summary>
 Send virt_server packets.
 </summary>
@@ -67565,7 +51640,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="70354">
 <summary>
 Do not audit attempts to send virt_server packets.
 </summary>
@@ -67576,7 +51651,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_server_packets" lineno="92003">
+<interface name="corenet_receive_virt_server_packets" lineno="70373">
 <summary>
 Receive virt_server packets.
 </summary>
@@ -67587,7 +51662,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="70392">
 <summary>
 Do not audit attempts to receive virt_server packets.
 </summary>
@@ -67598,7 +51673,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="92041">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="70411">
 <summary>
 Send and receive virt_server packets.
 </summary>
@@ -67609,7 +51684,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="70427">
 <summary>
 Do not audit attempts to send and receive virt_server packets.
 </summary>
@@ -67620,7 +51695,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="92072">
+<interface name="corenet_relabelto_virt_server_packets" lineno="70442">
 <summary>
 Relabel packets to virt_server the packet type.
 </summary>
@@ -67630,85 +51705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094">
-<summary>
-Send and receive TCP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="92109">
-<summary>
-Send UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124">
-<summary>
-Do not audit attempts to send UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="92139">
-<summary>
-Receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154">
-<summary>
-Do not audit attempts to receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169">
-<summary>
-Send and receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="70464">
 <summary>
 Bind TCP sockets to the virtual_places port.
 </summary>
@@ -67719,7 +51716,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="92220">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="70484">
 <summary>
 Bind UDP sockets to the virtual_places port.
 </summary>
@@ -67730,7 +51727,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="70503">
 <summary>
 Make a TCP connection to the virtual_places port.
 </summary>
@@ -67740,7 +51737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="92259">
+<interface name="corenet_send_virtual_places_client_packets" lineno="70523">
 <summary>
 Send virtual_places_client packets.
 </summary>
@@ -67751,7 +51748,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="70542">
 <summary>
 Do not audit attempts to send virtual_places_client packets.
 </summary>
@@ -67762,7 +51759,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="92297">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="70561">
 <summary>
 Receive virtual_places_client packets.
 </summary>
@@ -67773,7 +51770,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="70580">
 <summary>
 Do not audit attempts to receive virtual_places_client packets.
 </summary>
@@ -67784,7 +51781,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="70599">
 <summary>
 Send and receive virtual_places_client packets.
 </summary>
@@ -67795,7 +51792,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="70615">
 <summary>
 Do not audit attempts to send and receive virtual_places_client packets.
 </summary>
@@ -67806,7 +51803,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="70630">
 <summary>
 Relabel packets to virtual_places_client the packet type.
 </summary>
@@ -67816,7 +51813,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="92386">
+<interface name="corenet_send_virtual_places_server_packets" lineno="70650">
 <summary>
 Send virtual_places_server packets.
 </summary>
@@ -67827,7 +51824,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="70669">
 <summary>
 Do not audit attempts to send virtual_places_server packets.
 </summary>
@@ -67838,7 +51835,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="92424">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="70688">
 <summary>
 Receive virtual_places_server packets.
 </summary>
@@ -67849,7 +51846,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="70707">
 <summary>
 Do not audit attempts to receive virtual_places_server packets.
 </summary>
@@ -67860,7 +51857,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="70726">
 <summary>
 Send and receive virtual_places_server packets.
 </summary>
@@ -67871,7 +51868,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="70742">
 <summary>
 Do not audit attempts to send and receive virtual_places_server packets.
 </summary>
@@ -67882,7 +51879,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="70757">
 <summary>
 Relabel packets to virtual_places_server the packet type.
 </summary>
@@ -67892,85 +51889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515">
-<summary>
-Send and receive TCP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="92530">
-<summary>
-Send UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545">
-<summary>
-Do not audit attempts to send UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="92560">
-<summary>
-Receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575">
-<summary>
-Do not audit attempts to receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590">
-<summary>
-Send and receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="70779">
 <summary>
 Bind TCP sockets to the virt_migration port.
 </summary>
@@ -67981,7 +51900,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92641">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="70799">
 <summary>
 Bind UDP sockets to the virt_migration port.
 </summary>
@@ -67992,7 +51911,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="70818">
 <summary>
 Make a TCP connection to the virt_migration port.
 </summary>
@@ -68002,7 +51921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92680">
+<interface name="corenet_send_virt_migration_client_packets" lineno="70838">
 <summary>
 Send virt_migration_client packets.
 </summary>
@@ -68013,7 +51932,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="70857">
 <summary>
 Do not audit attempts to send virt_migration_client packets.
 </summary>
@@ -68024,7 +51943,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92718">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="70876">
 <summary>
 Receive virt_migration_client packets.
 </summary>
@@ -68035,7 +51954,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="70895">
 <summary>
 Do not audit attempts to receive virt_migration_client packets.
 </summary>
@@ -68046,7 +51965,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="70914">
 <summary>
 Send and receive virt_migration_client packets.
 </summary>
@@ -68057,7 +51976,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="70930">
 <summary>
 Do not audit attempts to send and receive virt_migration_client packets.
 </summary>
@@ -68068,7 +51987,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="70945">
 <summary>
 Relabel packets to virt_migration_client the packet type.
 </summary>
@@ -68078,7 +51997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92807">
+<interface name="corenet_send_virt_migration_server_packets" lineno="70965">
 <summary>
 Send virt_migration_server packets.
 </summary>
@@ -68089,7 +52008,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="70984">
 <summary>
 Do not audit attempts to send virt_migration_server packets.
 </summary>
@@ -68100,7 +52019,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92845">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="71003">
 <summary>
 Receive virt_migration_server packets.
 </summary>
@@ -68111,7 +52030,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="71022">
 <summary>
 Do not audit attempts to receive virt_migration_server packets.
 </summary>
@@ -68122,7 +52041,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="71041">
 <summary>
 Send and receive virt_migration_server packets.
 </summary>
@@ -68133,7 +52052,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="71057">
 <summary>
 Do not audit attempts to send and receive virt_migration_server packets.
 </summary>
@@ -68144,7 +52063,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="71072">
 <summary>
 Relabel packets to virt_migration_server the packet type.
 </summary>
@@ -68154,85 +52073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936">
-<summary>
-Send and receive TCP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92951">
-<summary>
-Send UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966">
-<summary>
-Do not audit attempts to send UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92981">
-<summary>
-Receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996">
-<summary>
-Do not audit attempts to receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011">
-<summary>
-Send and receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="93042">
+<interface name="corenet_tcp_bind_vnc_port" lineno="71094">
 <summary>
 Bind TCP sockets to the vnc port.
 </summary>
@@ -68243,7 +52084,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="93062">
+<interface name="corenet_udp_bind_vnc_port" lineno="71114">
 <summary>
 Bind UDP sockets to the vnc port.
 </summary>
@@ -68254,7 +52095,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="93081">
+<interface name="corenet_tcp_connect_vnc_port" lineno="71133">
 <summary>
 Make a TCP connection to the vnc port.
 </summary>
@@ -68264,7 +52105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_client_packets" lineno="93101">
+<interface name="corenet_send_vnc_client_packets" lineno="71153">
 <summary>
 Send vnc_client packets.
 </summary>
@@ -68275,7 +52116,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="71172">
 <summary>
 Do not audit attempts to send vnc_client packets.
 </summary>
@@ -68286,7 +52127,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="93139">
+<interface name="corenet_receive_vnc_client_packets" lineno="71191">
 <summary>
 Receive vnc_client packets.
 </summary>
@@ -68297,7 +52138,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="71210">
 <summary>
 Do not audit attempts to receive vnc_client packets.
 </summary>
@@ -68308,7 +52149,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="71229">
 <summary>
 Send and receive vnc_client packets.
 </summary>
@@ -68319,7 +52160,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="71245">
 <summary>
 Do not audit attempts to send and receive vnc_client packets.
 </summary>
@@ -68330,7 +52171,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="93208">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="71260">
 <summary>
 Relabel packets to vnc_client the packet type.
 </summary>
@@ -68340,7 +52181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_vnc_server_packets" lineno="93228">
+<interface name="corenet_send_vnc_server_packets" lineno="71280">
 <summary>
 Send vnc_server packets.
 </summary>
@@ -68351,7 +52192,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="71299">
 <summary>
 Do not audit attempts to send vnc_server packets.
 </summary>
@@ -68362,7 +52203,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="93266">
+<interface name="corenet_receive_vnc_server_packets" lineno="71318">
 <summary>
 Receive vnc_server packets.
 </summary>
@@ -68373,7 +52214,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="71337">
 <summary>
 Do not audit attempts to receive vnc_server packets.
 </summary>
@@ -68384,7 +52225,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="71356">
 <summary>
 Send and receive vnc_server packets.
 </summary>
@@ -68395,7 +52236,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="71372">
 <summary>
 Do not audit attempts to send and receive vnc_server packets.
 </summary>
@@ -68406,7 +52247,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="93335">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="71387">
 <summary>
 Relabel packets to vnc_server the packet type.
 </summary>
@@ -68416,85 +52257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357">
-<summary>
-Send and receive TCP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wccp_port" lineno="93372">
-<summary>
-Send UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387">
-<summary>
-Do not audit attempts to send UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="93402">
-<summary>
-Receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417">
-<summary>
-Do not audit attempts to receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432">
-<summary>
-Send and receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="93463">
+<interface name="corenet_tcp_bind_wccp_port" lineno="71409">
 <summary>
 Bind TCP sockets to the wccp port.
 </summary>
@@ -68505,7 +52268,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="93483">
+<interface name="corenet_udp_bind_wccp_port" lineno="71429">
 <summary>
 Bind UDP sockets to the wccp port.
 </summary>
@@ -68516,7 +52279,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="93502">
+<interface name="corenet_tcp_connect_wccp_port" lineno="71448">
 <summary>
 Make a TCP connection to the wccp port.
 </summary>
@@ -68526,7 +52289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_client_packets" lineno="93522">
+<interface name="corenet_send_wccp_client_packets" lineno="71468">
 <summary>
 Send wccp_client packets.
 </summary>
@@ -68537,7 +52300,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="71487">
 <summary>
 Do not audit attempts to send wccp_client packets.
 </summary>
@@ -68548,7 +52311,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="93560">
+<interface name="corenet_receive_wccp_client_packets" lineno="71506">
 <summary>
 Receive wccp_client packets.
 </summary>
@@ -68559,7 +52322,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="71525">
 <summary>
 Do not audit attempts to receive wccp_client packets.
 </summary>
@@ -68570,7 +52333,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="71544">
 <summary>
 Send and receive wccp_client packets.
 </summary>
@@ -68581,7 +52344,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="71560">
 <summary>
 Do not audit attempts to send and receive wccp_client packets.
 </summary>
@@ -68592,7 +52355,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93629">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="71575">
 <summary>
 Relabel packets to wccp_client the packet type.
 </summary>
@@ -68602,7 +52365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93649">
+<interface name="corenet_send_wccp_server_packets" lineno="71595">
 <summary>
 Send wccp_server packets.
 </summary>
@@ -68613,7 +52376,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="71614">
 <summary>
 Do not audit attempts to send wccp_server packets.
 </summary>
@@ -68624,7 +52387,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93687">
+<interface name="corenet_receive_wccp_server_packets" lineno="71633">
 <summary>
 Receive wccp_server packets.
 </summary>
@@ -68635,7 +52398,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="71652">
 <summary>
 Do not audit attempts to receive wccp_server packets.
 </summary>
@@ -68646,7 +52409,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="71671">
 <summary>
 Send and receive wccp_server packets.
 </summary>
@@ -68657,7 +52420,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="71687">
 <summary>
 Do not audit attempts to send and receive wccp_server packets.
 </summary>
@@ -68668,7 +52431,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93756">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="71702">
 <summary>
 Relabel packets to wccp_server the packet type.
 </summary>
@@ -68678,85 +52441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778">
-<summary>
-Send and receive TCP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_websm_port" lineno="93793">
-<summary>
-Send UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808">
-<summary>
-Do not audit attempts to send UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93823">
-<summary>
-Receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838">
-<summary>
-Do not audit attempts to receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93853">
-<summary>
-Send and receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93884">
+<interface name="corenet_tcp_bind_websm_port" lineno="71724">
 <summary>
 Bind TCP sockets to the websm port.
 </summary>
@@ -68767,7 +52452,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93904">
+<interface name="corenet_udp_bind_websm_port" lineno="71744">
 <summary>
 Bind UDP sockets to the websm port.
 </summary>
@@ -68778,7 +52463,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93923">
+<interface name="corenet_tcp_connect_websm_port" lineno="71763">
 <summary>
 Make a TCP connection to the websm port.
 </summary>
@@ -68788,7 +52473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_client_packets" lineno="93943">
+<interface name="corenet_send_websm_client_packets" lineno="71783">
 <summary>
 Send websm_client packets.
 </summary>
@@ -68799,7 +52484,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="71802">
 <summary>
 Do not audit attempts to send websm_client packets.
 </summary>
@@ -68810,7 +52495,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93981">
+<interface name="corenet_receive_websm_client_packets" lineno="71821">
 <summary>
 Receive websm_client packets.
 </summary>
@@ -68821,7 +52506,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="71840">
 <summary>
 Do not audit attempts to receive websm_client packets.
 </summary>
@@ -68832,7 +52517,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="94019">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="71859">
 <summary>
 Send and receive websm_client packets.
 </summary>
@@ -68843,7 +52528,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="71875">
 <summary>
 Do not audit attempts to send and receive websm_client packets.
 </summary>
@@ -68854,7 +52539,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="94050">
+<interface name="corenet_relabelto_websm_client_packets" lineno="71890">
 <summary>
 Relabel packets to websm_client the packet type.
 </summary>
@@ -68864,7 +52549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_websm_server_packets" lineno="94070">
+<interface name="corenet_send_websm_server_packets" lineno="71910">
 <summary>
 Send websm_server packets.
 </summary>
@@ -68875,7 +52560,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="71929">
 <summary>
 Do not audit attempts to send websm_server packets.
 </summary>
@@ -68886,7 +52571,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_websm_server_packets" lineno="94108">
+<interface name="corenet_receive_websm_server_packets" lineno="71948">
 <summary>
 Receive websm_server packets.
 </summary>
@@ -68897,7 +52582,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="71967">
 <summary>
 Do not audit attempts to receive websm_server packets.
 </summary>
@@ -68908,7 +52593,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="94146">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="71986">
 <summary>
 Send and receive websm_server packets.
 </summary>
@@ -68919,7 +52604,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="72002">
 <summary>
 Do not audit attempts to send and receive websm_server packets.
 </summary>
@@ -68930,7 +52615,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="94177">
+<interface name="corenet_relabelto_websm_server_packets" lineno="72017">
 <summary>
 Relabel packets to websm_server the packet type.
 </summary>
@@ -68940,85 +52625,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199">
-<summary>
-Send and receive TCP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_whois_port" lineno="94214">
-<summary>
-Send UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229">
-<summary>
-Do not audit attempts to send UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_whois_port" lineno="94244">
-<summary>
-Receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259">
-<summary>
-Do not audit attempts to receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="94274">
-<summary>
-Send and receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="94305">
+<interface name="corenet_tcp_bind_whois_port" lineno="72039">
 <summary>
 Bind TCP sockets to the whois port.
 </summary>
@@ -69029,7 +52636,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_whois_port" lineno="94325">
+<interface name="corenet_udp_bind_whois_port" lineno="72059">
 <summary>
 Bind UDP sockets to the whois port.
 </summary>
@@ -69040,7 +52647,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="94344">
+<interface name="corenet_tcp_connect_whois_port" lineno="72078">
 <summary>
 Make a TCP connection to the whois port.
 </summary>
@@ -69050,7 +52657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_client_packets" lineno="94364">
+<interface name="corenet_send_whois_client_packets" lineno="72098">
 <summary>
 Send whois_client packets.
 </summary>
@@ -69061,7 +52668,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="72117">
 <summary>
 Do not audit attempts to send whois_client packets.
 </summary>
@@ -69072,7 +52679,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_client_packets" lineno="94402">
+<interface name="corenet_receive_whois_client_packets" lineno="72136">
 <summary>
 Receive whois_client packets.
 </summary>
@@ -69083,7 +52690,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="72155">
 <summary>
 Do not audit attempts to receive whois_client packets.
 </summary>
@@ -69094,7 +52701,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="94440">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="72174">
 <summary>
 Send and receive whois_client packets.
 </summary>
@@ -69105,7 +52712,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="72190">
 <summary>
 Do not audit attempts to send and receive whois_client packets.
 </summary>
@@ -69116,7 +52723,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="94471">
+<interface name="corenet_relabelto_whois_client_packets" lineno="72205">
 <summary>
 Relabel packets to whois_client the packet type.
 </summary>
@@ -69126,7 +52733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_whois_server_packets" lineno="94491">
+<interface name="corenet_send_whois_server_packets" lineno="72225">
 <summary>
 Send whois_server packets.
 </summary>
@@ -69137,7 +52744,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="72244">
 <summary>
 Do not audit attempts to send whois_server packets.
 </summary>
@@ -69148,7 +52755,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_whois_server_packets" lineno="94529">
+<interface name="corenet_receive_whois_server_packets" lineno="72263">
 <summary>
 Receive whois_server packets.
 </summary>
@@ -69159,7 +52766,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="72282">
 <summary>
 Do not audit attempts to receive whois_server packets.
 </summary>
@@ -69170,7 +52777,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94567">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="72301">
 <summary>
 Send and receive whois_server packets.
 </summary>
@@ -69181,7 +52788,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="72317">
 <summary>
 Do not audit attempts to send and receive whois_server packets.
 </summary>
@@ -69192,7 +52799,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94598">
+<interface name="corenet_relabelto_whois_server_packets" lineno="72332">
 <summary>
 Relabel packets to whois_server the packet type.
 </summary>
@@ -69202,85 +52809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620">
-<summary>
-Send and receive TCP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94635">
-<summary>
-Send UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650">
-<summary>
-Do not audit attempts to send UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94665">
-<summary>
-Receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680">
-<summary>
-Do not audit attempts to receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695">
-<summary>
-Send and receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94726">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="72354">
 <summary>
 Bind TCP sockets to the winshadow port.
 </summary>
@@ -69291,7 +52820,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94746">
+<interface name="corenet_udp_bind_winshadow_port" lineno="72374">
 <summary>
 Bind UDP sockets to the winshadow port.
 </summary>
@@ -69302,7 +52831,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94765">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="72393">
 <summary>
 Make a TCP connection to the winshadow port.
 </summary>
@@ -69312,7 +52841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94785">
+<interface name="corenet_send_winshadow_client_packets" lineno="72413">
 <summary>
 Send winshadow_client packets.
 </summary>
@@ -69323,7 +52852,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="72432">
 <summary>
 Do not audit attempts to send winshadow_client packets.
 </summary>
@@ -69334,7 +52863,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94823">
+<interface name="corenet_receive_winshadow_client_packets" lineno="72451">
 <summary>
 Receive winshadow_client packets.
 </summary>
@@ -69345,7 +52874,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="72470">
 <summary>
 Do not audit attempts to receive winshadow_client packets.
 </summary>
@@ -69356,7 +52885,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="72489">
 <summary>
 Send and receive winshadow_client packets.
 </summary>
@@ -69367,7 +52896,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="72505">
 <summary>
 Do not audit attempts to send and receive winshadow_client packets.
 </summary>
@@ -69378,7 +52907,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="72520">
 <summary>
 Relabel packets to winshadow_client the packet type.
 </summary>
@@ -69388,7 +52917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94912">
+<interface name="corenet_send_winshadow_server_packets" lineno="72540">
 <summary>
 Send winshadow_server packets.
 </summary>
@@ -69399,7 +52928,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="72559">
 <summary>
 Do not audit attempts to send winshadow_server packets.
 </summary>
@@ -69410,7 +52939,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94950">
+<interface name="corenet_receive_winshadow_server_packets" lineno="72578">
 <summary>
 Receive winshadow_server packets.
 </summary>
@@ -69421,7 +52950,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="72597">
 <summary>
 Do not audit attempts to receive winshadow_server packets.
 </summary>
@@ -69432,7 +52961,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="72616">
 <summary>
 Send and receive winshadow_server packets.
 </summary>
@@ -69443,7 +52972,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="72632">
 <summary>
 Do not audit attempts to send and receive winshadow_server packets.
 </summary>
@@ -69454,7 +52983,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="72647">
 <summary>
 Relabel packets to winshadow_server the packet type.
 </summary>
@@ -69464,85 +52993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041">
-<summary>
-Send and receive TCP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="95056">
-<summary>
-Send UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071">
-<summary>
-Do not audit attempts to send UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="95086">
-<summary>
-Receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101">
-<summary>
-Do not audit attempts to receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116">
-<summary>
-Send and receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="72669">
 <summary>
 Bind TCP sockets to the wsdapi port.
 </summary>
@@ -69553,7 +53004,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="95167">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="72689">
 <summary>
 Bind UDP sockets to the wsdapi port.
 </summary>
@@ -69564,7 +53015,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="72708">
 <summary>
 Make a TCP connection to the wsdapi port.
 </summary>
@@ -69574,7 +53025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="95206">
+<interface name="corenet_send_wsdapi_client_packets" lineno="72728">
 <summary>
 Send wsdapi_client packets.
 </summary>
@@ -69585,7 +53036,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="72747">
 <summary>
 Do not audit attempts to send wsdapi_client packets.
 </summary>
@@ -69596,7 +53047,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="95244">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="72766">
 <summary>
 Receive wsdapi_client packets.
 </summary>
@@ -69607,7 +53058,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="72785">
 <summary>
 Do not audit attempts to receive wsdapi_client packets.
 </summary>
@@ -69618,7 +53069,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="72804">
 <summary>
 Send and receive wsdapi_client packets.
 </summary>
@@ -69629,7 +53080,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="72820">
 <summary>
 Do not audit attempts to send and receive wsdapi_client packets.
 </summary>
@@ -69640,7 +53091,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="72835">
 <summary>
 Relabel packets to wsdapi_client the packet type.
 </summary>
@@ -69650,7 +53101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="95333">
+<interface name="corenet_send_wsdapi_server_packets" lineno="72855">
 <summary>
 Send wsdapi_server packets.
 </summary>
@@ -69661,7 +53112,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="72874">
 <summary>
 Do not audit attempts to send wsdapi_server packets.
 </summary>
@@ -69672,7 +53123,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="95371">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="72893">
 <summary>
 Receive wsdapi_server packets.
 </summary>
@@ -69683,7 +53134,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="72912">
 <summary>
 Do not audit attempts to receive wsdapi_server packets.
 </summary>
@@ -69694,7 +53145,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="72931">
 <summary>
 Send and receive wsdapi_server packets.
 </summary>
@@ -69705,7 +53156,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="72947">
 <summary>
 Do not audit attempts to send and receive wsdapi_server packets.
 </summary>
@@ -69716,7 +53167,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="72962">
 <summary>
 Relabel packets to wsdapi_server the packet type.
 </summary>
@@ -69726,85 +53177,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462">
-<summary>
-Send and receive TCP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="95477">
-<summary>
-Send UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492">
-<summary>
-Do not audit attempts to send UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="95507">
-<summary>
-Receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522">
-<summary>
-Do not audit attempts to receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537">
-<summary>
-Send and receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="72984">
 <summary>
 Bind TCP sockets to the wsicopy port.
 </summary>
@@ -69815,7 +53188,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95588">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="73004">
 <summary>
 Bind UDP sockets to the wsicopy port.
 </summary>
@@ -69826,7 +53199,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="73023">
 <summary>
 Make a TCP connection to the wsicopy port.
 </summary>
@@ -69836,7 +53209,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95627">
+<interface name="corenet_send_wsicopy_client_packets" lineno="73043">
 <summary>
 Send wsicopy_client packets.
 </summary>
@@ -69847,7 +53220,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="73062">
 <summary>
 Do not audit attempts to send wsicopy_client packets.
 </summary>
@@ -69858,7 +53231,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95665">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="73081">
 <summary>
 Receive wsicopy_client packets.
 </summary>
@@ -69869,7 +53242,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="73100">
 <summary>
 Do not audit attempts to receive wsicopy_client packets.
 </summary>
@@ -69880,7 +53253,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="73119">
 <summary>
 Send and receive wsicopy_client packets.
 </summary>
@@ -69891,7 +53264,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="73135">
 <summary>
 Do not audit attempts to send and receive wsicopy_client packets.
 </summary>
@@ -69902,7 +53275,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="73150">
 <summary>
 Relabel packets to wsicopy_client the packet type.
 </summary>
@@ -69912,7 +53285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95754">
+<interface name="corenet_send_wsicopy_server_packets" lineno="73170">
 <summary>
 Send wsicopy_server packets.
 </summary>
@@ -69923,7 +53296,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="73189">
 <summary>
 Do not audit attempts to send wsicopy_server packets.
 </summary>
@@ -69934,7 +53307,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95792">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="73208">
 <summary>
 Receive wsicopy_server packets.
 </summary>
@@ -69945,7 +53318,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="73227">
 <summary>
 Do not audit attempts to receive wsicopy_server packets.
 </summary>
@@ -69956,7 +53329,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="73246">
 <summary>
 Send and receive wsicopy_server packets.
 </summary>
@@ -69967,7 +53340,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="73262">
 <summary>
 Do not audit attempts to send and receive wsicopy_server packets.
 </summary>
@@ -69978,7 +53351,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="73277">
 <summary>
 Relabel packets to wsicopy_server the packet type.
 </summary>
@@ -69988,85 +53361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883">
-<summary>
-Send and receive TCP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95898">
-<summary>
-Send UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913">
-<summary>
-Do not audit attempts to send UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95928">
-<summary>
-Receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943">
-<summary>
-Do not audit attempts to receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958">
-<summary>
-Send and receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="73299">
 <summary>
 Bind TCP sockets to the xdmcp port.
 </summary>
@@ -70077,7 +53372,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="96009">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="73319">
 <summary>
 Bind UDP sockets to the xdmcp port.
 </summary>
@@ -70088,7 +53383,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="73338">
 <summary>
 Make a TCP connection to the xdmcp port.
 </summary>
@@ -70098,7 +53393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="96048">
+<interface name="corenet_send_xdmcp_client_packets" lineno="73358">
 <summary>
 Send xdmcp_client packets.
 </summary>
@@ -70109,7 +53404,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="73377">
 <summary>
 Do not audit attempts to send xdmcp_client packets.
 </summary>
@@ -70120,7 +53415,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="96086">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="73396">
 <summary>
 Receive xdmcp_client packets.
 </summary>
@@ -70131,7 +53426,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="73415">
 <summary>
 Do not audit attempts to receive xdmcp_client packets.
 </summary>
@@ -70142,7 +53437,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="73434">
 <summary>
 Send and receive xdmcp_client packets.
 </summary>
@@ -70153,7 +53448,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="73450">
 <summary>
 Do not audit attempts to send and receive xdmcp_client packets.
 </summary>
@@ -70164,7 +53459,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="73465">
 <summary>
 Relabel packets to xdmcp_client the packet type.
 </summary>
@@ -70174,7 +53469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="96175">
+<interface name="corenet_send_xdmcp_server_packets" lineno="73485">
 <summary>
 Send xdmcp_server packets.
 </summary>
@@ -70185,7 +53480,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="73504">
 <summary>
 Do not audit attempts to send xdmcp_server packets.
 </summary>
@@ -70196,7 +53491,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="96213">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="73523">
 <summary>
 Receive xdmcp_server packets.
 </summary>
@@ -70207,7 +53502,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="73542">
 <summary>
 Do not audit attempts to receive xdmcp_server packets.
 </summary>
@@ -70218,7 +53513,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="73561">
 <summary>
 Send and receive xdmcp_server packets.
 </summary>
@@ -70229,7 +53524,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="73577">
 <summary>
 Do not audit attempts to send and receive xdmcp_server packets.
 </summary>
@@ -70240,7 +53535,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="73592">
 <summary>
 Relabel packets to xdmcp_server the packet type.
 </summary>
@@ -70250,85 +53545,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304">
-<summary>
-Send and receive TCP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xen_port" lineno="96319">
-<summary>
-Send UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334">
-<summary>
-Do not audit attempts to send UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xen_port" lineno="96349">
-<summary>
-Receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364">
-<summary>
-Do not audit attempts to receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="96379">
-<summary>
-Send and receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="96410">
+<interface name="corenet_tcp_bind_xen_port" lineno="73614">
 <summary>
 Bind TCP sockets to the xen port.
 </summary>
@@ -70339,7 +53556,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xen_port" lineno="96430">
+<interface name="corenet_udp_bind_xen_port" lineno="73634">
 <summary>
 Bind UDP sockets to the xen port.
 </summary>
@@ -70350,7 +53567,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="96449">
+<interface name="corenet_tcp_connect_xen_port" lineno="73653">
 <summary>
 Make a TCP connection to the xen port.
 </summary>
@@ -70360,7 +53577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_client_packets" lineno="96469">
+<interface name="corenet_send_xen_client_packets" lineno="73673">
 <summary>
 Send xen_client packets.
 </summary>
@@ -70371,7 +53588,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="73692">
 <summary>
 Do not audit attempts to send xen_client packets.
 </summary>
@@ -70382,7 +53599,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_client_packets" lineno="96507">
+<interface name="corenet_receive_xen_client_packets" lineno="73711">
 <summary>
 Receive xen_client packets.
 </summary>
@@ -70393,7 +53610,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="73730">
 <summary>
 Do not audit attempts to receive xen_client packets.
 </summary>
@@ -70404,7 +53621,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="96545">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="73749">
 <summary>
 Send and receive xen_client packets.
 </summary>
@@ -70415,7 +53632,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="73765">
 <summary>
 Do not audit attempts to send and receive xen_client packets.
 </summary>
@@ -70426,7 +53643,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96576">
+<interface name="corenet_relabelto_xen_client_packets" lineno="73780">
 <summary>
 Relabel packets to xen_client the packet type.
 </summary>
@@ -70436,7 +53653,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xen_server_packets" lineno="96596">
+<interface name="corenet_send_xen_server_packets" lineno="73800">
 <summary>
 Send xen_server packets.
 </summary>
@@ -70447,7 +53664,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="73819">
 <summary>
 Do not audit attempts to send xen_server packets.
 </summary>
@@ -70458,7 +53675,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96634">
+<interface name="corenet_receive_xen_server_packets" lineno="73838">
 <summary>
 Receive xen_server packets.
 </summary>
@@ -70469,7 +53686,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="73857">
 <summary>
 Do not audit attempts to receive xen_server packets.
 </summary>
@@ -70480,7 +53697,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96672">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="73876">
 <summary>
 Send and receive xen_server packets.
 </summary>
@@ -70491,7 +53708,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="73892">
 <summary>
 Do not audit attempts to send and receive xen_server packets.
 </summary>
@@ -70502,7 +53719,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96703">
+<interface name="corenet_relabelto_xen_server_packets" lineno="73907">
 <summary>
 Relabel packets to xen_server the packet type.
 </summary>
@@ -70512,85 +53729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725">
-<summary>
-Send and receive TCP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96740">
-<summary>
-Send UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755">
-<summary>
-Do not audit attempts to send UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96770">
-<summary>
-Receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785">
-<summary>
-Do not audit attempts to receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800">
-<summary>
-Send and receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96831">
+<interface name="corenet_tcp_bind_xfs_port" lineno="73929">
 <summary>
 Bind TCP sockets to the xfs port.
 </summary>
@@ -70601,7 +53740,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96851">
+<interface name="corenet_udp_bind_xfs_port" lineno="73949">
 <summary>
 Bind UDP sockets to the xfs port.
 </summary>
@@ -70612,7 +53751,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96870">
+<interface name="corenet_tcp_connect_xfs_port" lineno="73968">
 <summary>
 Make a TCP connection to the xfs port.
 </summary>
@@ -70622,7 +53761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96890">
+<interface name="corenet_send_xfs_client_packets" lineno="73988">
 <summary>
 Send xfs_client packets.
 </summary>
@@ -70633,7 +53772,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="74007">
 <summary>
 Do not audit attempts to send xfs_client packets.
 </summary>
@@ -70644,7 +53783,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96928">
+<interface name="corenet_receive_xfs_client_packets" lineno="74026">
 <summary>
 Receive xfs_client packets.
 </summary>
@@ -70655,7 +53794,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="74045">
 <summary>
 Do not audit attempts to receive xfs_client packets.
 </summary>
@@ -70666,7 +53805,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="74064">
 <summary>
 Send and receive xfs_client packets.
 </summary>
@@ -70677,7 +53816,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="74080">
 <summary>
 Do not audit attempts to send and receive xfs_client packets.
 </summary>
@@ -70688,7 +53827,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96997">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="74095">
 <summary>
 Relabel packets to xfs_client the packet type.
 </summary>
@@ -70698,7 +53837,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xfs_server_packets" lineno="97017">
+<interface name="corenet_send_xfs_server_packets" lineno="74115">
 <summary>
 Send xfs_server packets.
 </summary>
@@ -70709,7 +53848,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="74134">
 <summary>
 Do not audit attempts to send xfs_server packets.
 </summary>
@@ -70720,7 +53859,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="97055">
+<interface name="corenet_receive_xfs_server_packets" lineno="74153">
 <summary>
 Receive xfs_server packets.
 </summary>
@@ -70731,7 +53870,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="74172">
 <summary>
 Do not audit attempts to receive xfs_server packets.
 </summary>
@@ -70742,7 +53881,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="74191">
 <summary>
 Send and receive xfs_server packets.
 </summary>
@@ -70753,7 +53892,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="74207">
 <summary>
 Do not audit attempts to send and receive xfs_server packets.
 </summary>
@@ -70764,7 +53903,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="97124">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="74222">
 <summary>
 Relabel packets to xfs_server the packet type.
 </summary>
@@ -70774,85 +53913,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146">
-<summary>
-Send and receive TCP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xserver_port" lineno="97161">
-<summary>
-Send UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176">
-<summary>
-Do not audit attempts to send UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="97191">
-<summary>
-Receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206">
-<summary>
-Do not audit attempts to receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221">
-<summary>
-Send and receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="97252">
+<interface name="corenet_tcp_bind_xserver_port" lineno="74244">
 <summary>
 Bind TCP sockets to the xserver port.
 </summary>
@@ -70863,7 +53924,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="97272">
+<interface name="corenet_udp_bind_xserver_port" lineno="74264">
 <summary>
 Bind UDP sockets to the xserver port.
 </summary>
@@ -70874,7 +53935,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="97291">
+<interface name="corenet_tcp_connect_xserver_port" lineno="74283">
 <summary>
 Make a TCP connection to the xserver port.
 </summary>
@@ -70884,7 +53945,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_client_packets" lineno="97311">
+<interface name="corenet_send_xserver_client_packets" lineno="74303">
 <summary>
 Send xserver_client packets.
 </summary>
@@ -70895,7 +53956,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="74322">
 <summary>
 Do not audit attempts to send xserver_client packets.
 </summary>
@@ -70906,7 +53967,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="97349">
+<interface name="corenet_receive_xserver_client_packets" lineno="74341">
 <summary>
 Receive xserver_client packets.
 </summary>
@@ -70917,7 +53978,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="74360">
 <summary>
 Do not audit attempts to receive xserver_client packets.
 </summary>
@@ -70928,7 +53989,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="74379">
 <summary>
 Send and receive xserver_client packets.
 </summary>
@@ -70939,7 +54000,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="74395">
 <summary>
 Do not audit attempts to send and receive xserver_client packets.
 </summary>
@@ -70950,7 +54011,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="97418">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="74410">
 <summary>
 Relabel packets to xserver_client the packet type.
 </summary>
@@ -70960,7 +54021,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_xserver_server_packets" lineno="97438">
+<interface name="corenet_send_xserver_server_packets" lineno="74430">
 <summary>
 Send xserver_server packets.
 </summary>
@@ -70971,7 +54032,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="74449">
 <summary>
 Do not audit attempts to send xserver_server packets.
 </summary>
@@ -70982,7 +54043,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="97476">
+<interface name="corenet_receive_xserver_server_packets" lineno="74468">
 <summary>
 Receive xserver_server packets.
 </summary>
@@ -70993,7 +54054,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="74487">
 <summary>
 Do not audit attempts to receive xserver_server packets.
 </summary>
@@ -71004,7 +54065,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="74506">
 <summary>
 Send and receive xserver_server packets.
 </summary>
@@ -71015,7 +54076,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="74522">
 <summary>
 Do not audit attempts to send and receive xserver_server packets.
 </summary>
@@ -71026,7 +54087,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="97545">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="74537">
 <summary>
 Relabel packets to xserver_server the packet type.
 </summary>
@@ -71036,85 +54097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567">
-<summary>
-Send and receive TCP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97582">
-<summary>
-Send UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597">
-<summary>
-Do not audit attempts to send UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97612">
-<summary>
-Receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627">
-<summary>
-Do not audit attempts to receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642">
-<summary>
-Send and receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97673">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="74559">
 <summary>
 Bind TCP sockets to the zarafa port.
 </summary>
@@ -71125,7 +54108,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97693">
+<interface name="corenet_udp_bind_zarafa_port" lineno="74579">
 <summary>
 Bind UDP sockets to the zarafa port.
 </summary>
@@ -71136,7 +54119,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97712">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="74598">
 <summary>
 Make a TCP connection to the zarafa port.
 </summary>
@@ -71146,7 +54129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97732">
+<interface name="corenet_send_zarafa_client_packets" lineno="74618">
 <summary>
 Send zarafa_client packets.
 </summary>
@@ -71157,7 +54140,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="74637">
 <summary>
 Do not audit attempts to send zarafa_client packets.
 </summary>
@@ -71168,7 +54151,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97770">
+<interface name="corenet_receive_zarafa_client_packets" lineno="74656">
 <summary>
 Receive zarafa_client packets.
 </summary>
@@ -71179,7 +54162,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="74675">
 <summary>
 Do not audit attempts to receive zarafa_client packets.
 </summary>
@@ -71190,7 +54173,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="74694">
 <summary>
 Send and receive zarafa_client packets.
 </summary>
@@ -71201,7 +54184,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="74710">
 <summary>
 Do not audit attempts to send and receive zarafa_client packets.
 </summary>
@@ -71212,7 +54195,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="74725">
 <summary>
 Relabel packets to zarafa_client the packet type.
 </summary>
@@ -71222,7 +54205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97859">
+<interface name="corenet_send_zarafa_server_packets" lineno="74745">
 <summary>
 Send zarafa_server packets.
 </summary>
@@ -71233,7 +54216,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="74764">
 <summary>
 Do not audit attempts to send zarafa_server packets.
 </summary>
@@ -71244,7 +54227,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97897">
+<interface name="corenet_receive_zarafa_server_packets" lineno="74783">
 <summary>
 Receive zarafa_server packets.
 </summary>
@@ -71255,7 +54238,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="74802">
 <summary>
 Do not audit attempts to receive zarafa_server packets.
 </summary>
@@ -71266,7 +54249,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="74821">
 <summary>
 Send and receive zarafa_server packets.
 </summary>
@@ -71277,7 +54260,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="74837">
 <summary>
 Do not audit attempts to send and receive zarafa_server packets.
 </summary>
@@ -71288,7 +54271,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="74852">
 <summary>
 Relabel packets to zarafa_server the packet type.
 </summary>
@@ -71298,85 +54281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988">
-<summary>
-Send and receive TCP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="98003">
-<summary>
-Send UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018">
-<summary>
-Do not audit attempts to send UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="98033">
-<summary>
-Receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048">
-<summary>
-Do not audit attempts to receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063">
-<summary>
-Send and receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="98094">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="74874">
 <summary>
 Bind TCP sockets to the zabbix port.
 </summary>
@@ -71387,7 +54292,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="98114">
+<interface name="corenet_udp_bind_zabbix_port" lineno="74894">
 <summary>
 Bind UDP sockets to the zabbix port.
 </summary>
@@ -71398,7 +54303,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="98133">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="74913">
 <summary>
 Make a TCP connection to the zabbix port.
 </summary>
@@ -71408,7 +54313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="98153">
+<interface name="corenet_send_zabbix_client_packets" lineno="74933">
 <summary>
 Send zabbix_client packets.
 </summary>
@@ -71419,7 +54324,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="74952">
 <summary>
 Do not audit attempts to send zabbix_client packets.
 </summary>
@@ -71430,7 +54335,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="98191">
+<interface name="corenet_receive_zabbix_client_packets" lineno="74971">
 <summary>
 Receive zabbix_client packets.
 </summary>
@@ -71441,7 +54346,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="74990">
 <summary>
 Do not audit attempts to receive zabbix_client packets.
 </summary>
@@ -71452,7 +54357,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="75009">
 <summary>
 Send and receive zabbix_client packets.
 </summary>
@@ -71463,7 +54368,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="75025">
 <summary>
 Do not audit attempts to send and receive zabbix_client packets.
 </summary>
@@ -71474,7 +54379,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="75040">
 <summary>
 Relabel packets to zabbix_client the packet type.
 </summary>
@@ -71484,7 +54389,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="98280">
+<interface name="corenet_send_zabbix_server_packets" lineno="75060">
 <summary>
 Send zabbix_server packets.
 </summary>
@@ -71495,7 +54400,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="75079">
 <summary>
 Do not audit attempts to send zabbix_server packets.
 </summary>
@@ -71506,7 +54411,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="98318">
+<interface name="corenet_receive_zabbix_server_packets" lineno="75098">
 <summary>
 Receive zabbix_server packets.
 </summary>
@@ -71517,7 +54422,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="75117">
 <summary>
 Do not audit attempts to receive zabbix_server packets.
 </summary>
@@ -71528,7 +54433,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="75136">
 <summary>
 Send and receive zabbix_server packets.
 </summary>
@@ -71539,7 +54444,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="75152">
 <summary>
 Do not audit attempts to send and receive zabbix_server packets.
 </summary>
@@ -71550,7 +54455,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="75167">
 <summary>
 Relabel packets to zabbix_server the packet type.
 </summary>
@@ -71560,85 +54465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409">
-<summary>
-Send and receive TCP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424">
-<summary>
-Send UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439">
-<summary>
-Do not audit attempts to send UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454">
-<summary>
-Receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469">
-<summary>
-Do not audit attempts to receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484">
-<summary>
-Send and receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="75189">
 <summary>
 Bind TCP sockets to the zabbix_agent port.
 </summary>
@@ -71649,7 +54476,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="75209">
 <summary>
 Bind UDP sockets to the zabbix_agent port.
 </summary>
@@ -71660,7 +54487,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="75228">
 <summary>
 Make a TCP connection to the zabbix_agent port.
 </summary>
@@ -71670,7 +54497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="75248">
 <summary>
 Send zabbix_agent_client packets.
 </summary>
@@ -71681,7 +54508,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="75267">
 <summary>
 Do not audit attempts to send zabbix_agent_client packets.
 </summary>
@@ -71692,7 +54519,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="75286">
 <summary>
 Receive zabbix_agent_client packets.
 </summary>
@@ -71703,7 +54530,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="75305">
 <summary>
 Do not audit attempts to receive zabbix_agent_client packets.
 </summary>
@@ -71714,7 +54541,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="75324">
 <summary>
 Send and receive zabbix_agent_client packets.
 </summary>
@@ -71725,7 +54552,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="75340">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_client packets.
 </summary>
@@ -71736,7 +54563,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="75355">
 <summary>
 Relabel packets to zabbix_agent_client the packet type.
 </summary>
@@ -71746,7 +54573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="75375">
 <summary>
 Send zabbix_agent_server packets.
 </summary>
@@ -71757,7 +54584,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="75394">
 <summary>
 Do not audit attempts to send zabbix_agent_server packets.
 </summary>
@@ -71768,7 +54595,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="75413">
 <summary>
 Receive zabbix_agent_server packets.
 </summary>
@@ -71779,7 +54606,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="75432">
 <summary>
 Do not audit attempts to receive zabbix_agent_server packets.
 </summary>
@@ -71790,7 +54617,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="75451">
 <summary>
 Send and receive zabbix_agent_server packets.
 </summary>
@@ -71801,7 +54628,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="75467">
 <summary>
 Do not audit attempts to send and receive zabbix_agent_server packets.
 </summary>
@@ -71812,7 +54639,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="75482">
 <summary>
 Relabel packets to zabbix_agent_server the packet type.
 </summary>
@@ -71822,85 +54649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830">
-<summary>
-Send and receive TCP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845">
-<summary>
-Send UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875">
-<summary>
-Receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905">
-<summary>
-Send and receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="75504">
 <summary>
 Bind TCP sockets to the zookeeper_client port.
 </summary>
@@ -71911,7 +54660,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="75524">
 <summary>
 Bind UDP sockets to the zookeeper_client port.
 </summary>
@@ -71922,7 +54671,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="75543">
 <summary>
 Make a TCP connection to the zookeeper_client port.
 </summary>
@@ -71932,7 +54681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="75563">
 <summary>
 Send zookeeper_client_client packets.
 </summary>
@@ -71943,7 +54692,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="75582">
 <summary>
 Do not audit attempts to send zookeeper_client_client packets.
 </summary>
@@ -71954,7 +54703,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="75601">
 <summary>
 Receive zookeeper_client_client packets.
 </summary>
@@ -71965,7 +54714,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="75620">
 <summary>
 Do not audit attempts to receive zookeeper_client_client packets.
 </summary>
@@ -71976,7 +54725,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="75639">
 <summary>
 Send and receive zookeeper_client_client packets.
 </summary>
@@ -71987,7 +54736,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="75655">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_client packets.
 </summary>
@@ -71998,7 +54747,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="75670">
 <summary>
 Relabel packets to zookeeper_client_client the packet type.
 </summary>
@@ -72008,7 +54757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="75690">
 <summary>
 Send zookeeper_client_server packets.
 </summary>
@@ -72019,7 +54768,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="75709">
 <summary>
 Do not audit attempts to send zookeeper_client_server packets.
 </summary>
@@ -72030,7 +54779,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="75728">
 <summary>
 Receive zookeeper_client_server packets.
 </summary>
@@ -72041,7 +54790,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="75747">
 <summary>
 Do not audit attempts to receive zookeeper_client_server packets.
 </summary>
@@ -72052,7 +54801,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="75766">
 <summary>
 Send and receive zookeeper_client_server packets.
 </summary>
@@ -72063,7 +54812,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="75782">
 <summary>
 Do not audit attempts to send and receive zookeeper_client_server packets.
 </summary>
@@ -72074,7 +54823,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="75797">
 <summary>
 Relabel packets to zookeeper_client_server the packet type.
 </summary>
@@ -72084,85 +54833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251">
-<summary>
-Send and receive TCP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266">
-<summary>
-Send UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296">
-<summary>
-Receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326">
-<summary>
-Send and receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="75819">
 <summary>
 Bind TCP sockets to the zookeeper_election port.
 </summary>
@@ -72173,7 +54844,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="75839">
 <summary>
 Bind UDP sockets to the zookeeper_election port.
 </summary>
@@ -72184,7 +54855,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="75858">
 <summary>
 Make a TCP connection to the zookeeper_election port.
 </summary>
@@ -72194,7 +54865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="75878">
 <summary>
 Send zookeeper_election_client packets.
 </summary>
@@ -72205,7 +54876,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="75897">
 <summary>
 Do not audit attempts to send zookeeper_election_client packets.
 </summary>
@@ -72216,7 +54887,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="75916">
 <summary>
 Receive zookeeper_election_client packets.
 </summary>
@@ -72227,7 +54898,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="75935">
 <summary>
 Do not audit attempts to receive zookeeper_election_client packets.
 </summary>
@@ -72238,7 +54909,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="75954">
 <summary>
 Send and receive zookeeper_election_client packets.
 </summary>
@@ -72249,7 +54920,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="75970">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_client packets.
 </summary>
@@ -72260,7 +54931,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="75985">
 <summary>
 Relabel packets to zookeeper_election_client the packet type.
 </summary>
@@ -72270,7 +54941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="76005">
 <summary>
 Send zookeeper_election_server packets.
 </summary>
@@ -72281,7 +54952,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="76024">
 <summary>
 Do not audit attempts to send zookeeper_election_server packets.
 </summary>
@@ -72292,7 +54963,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="76043">
 <summary>
 Receive zookeeper_election_server packets.
 </summary>
@@ -72303,7 +54974,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="76062">
 <summary>
 Do not audit attempts to receive zookeeper_election_server packets.
 </summary>
@@ -72314,7 +54985,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="76081">
 <summary>
 Send and receive zookeeper_election_server packets.
 </summary>
@@ -72325,7 +54996,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="76097">
 <summary>
 Do not audit attempts to send and receive zookeeper_election_server packets.
 </summary>
@@ -72336,7 +55007,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="76112">
 <summary>
 Relabel packets to zookeeper_election_server the packet type.
 </summary>
@@ -72346,85 +55017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672">
-<summary>
-Send and receive TCP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687">
-<summary>
-Send UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717">
-<summary>
-Receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747">
-<summary>
-Send and receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="76134">
 <summary>
 Bind TCP sockets to the zookeeper_leader port.
 </summary>
@@ -72435,7 +55028,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="76154">
 <summary>
 Bind UDP sockets to the zookeeper_leader port.
 </summary>
@@ -72446,7 +55039,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="76173">
 <summary>
 Make a TCP connection to the zookeeper_leader port.
 </summary>
@@ -72456,7 +55049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="76193">
 <summary>
 Send zookeeper_leader_client packets.
 </summary>
@@ -72467,7 +55060,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="76212">
 <summary>
 Do not audit attempts to send zookeeper_leader_client packets.
 </summary>
@@ -72478,7 +55071,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="76231">
 <summary>
 Receive zookeeper_leader_client packets.
 </summary>
@@ -72489,7 +55082,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="76250">
 <summary>
 Do not audit attempts to receive zookeeper_leader_client packets.
 </summary>
@@ -72500,7 +55093,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="76269">
 <summary>
 Send and receive zookeeper_leader_client packets.
 </summary>
@@ -72511,7 +55104,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="76285">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_client packets.
 </summary>
@@ -72522,7 +55115,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="76300">
 <summary>
 Relabel packets to zookeeper_leader_client the packet type.
 </summary>
@@ -72532,7 +55125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="76320">
 <summary>
 Send zookeeper_leader_server packets.
 </summary>
@@ -72543,7 +55136,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="76339">
 <summary>
 Do not audit attempts to send zookeeper_leader_server packets.
 </summary>
@@ -72554,7 +55147,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="76358">
 <summary>
 Receive zookeeper_leader_server packets.
 </summary>
@@ -72565,7 +55158,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="76377">
 <summary>
 Do not audit attempts to receive zookeeper_leader_server packets.
 </summary>
@@ -72576,7 +55169,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="76396">
 <summary>
 Send and receive zookeeper_leader_server packets.
 </summary>
@@ -72587,7 +55180,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="76412">
 <summary>
 Do not audit attempts to send and receive zookeeper_leader_server packets.
 </summary>
@@ -72598,7 +55191,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="76427">
 <summary>
 Relabel packets to zookeeper_leader_server the packet type.
 </summary>
@@ -72608,85 +55201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093">
-<summary>
-Send and receive TCP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zebra_port" lineno="100108">
-<summary>
-Send UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123">
-<summary>
-Do not audit attempts to send UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="100138">
-<summary>
-Receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153">
-<summary>
-Do not audit attempts to receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168">
-<summary>
-Send and receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="100199">
+<interface name="corenet_tcp_bind_zebra_port" lineno="76449">
 <summary>
 Bind TCP sockets to the zebra port.
 </summary>
@@ -72697,7 +55212,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="100219">
+<interface name="corenet_udp_bind_zebra_port" lineno="76469">
 <summary>
 Bind UDP sockets to the zebra port.
 </summary>
@@ -72708,7 +55223,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="100238">
+<interface name="corenet_tcp_connect_zebra_port" lineno="76488">
 <summary>
 Make a TCP connection to the zebra port.
 </summary>
@@ -72718,7 +55233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_client_packets" lineno="100258">
+<interface name="corenet_send_zebra_client_packets" lineno="76508">
 <summary>
 Send zebra_client packets.
 </summary>
@@ -72729,7 +55244,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="76527">
 <summary>
 Do not audit attempts to send zebra_client packets.
 </summary>
@@ -72740,7 +55255,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="100296">
+<interface name="corenet_receive_zebra_client_packets" lineno="76546">
 <summary>
 Receive zebra_client packets.
 </summary>
@@ -72751,7 +55266,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="76565">
 <summary>
 Do not audit attempts to receive zebra_client packets.
 </summary>
@@ -72762,7 +55277,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="76584">
 <summary>
 Send and receive zebra_client packets.
 </summary>
@@ -72773,7 +55288,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="76600">
 <summary>
 Do not audit attempts to send and receive zebra_client packets.
 </summary>
@@ -72784,7 +55299,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="100365">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="76615">
 <summary>
 Relabel packets to zebra_client the packet type.
 </summary>
@@ -72794,7 +55309,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zebra_server_packets" lineno="100385">
+<interface name="corenet_send_zebra_server_packets" lineno="76635">
 <summary>
 Send zebra_server packets.
 </summary>
@@ -72805,7 +55320,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="76654">
 <summary>
 Do not audit attempts to send zebra_server packets.
 </summary>
@@ -72816,7 +55331,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="100423">
+<interface name="corenet_receive_zebra_server_packets" lineno="76673">
 <summary>
 Receive zebra_server packets.
 </summary>
@@ -72827,7 +55342,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="76692">
 <summary>
 Do not audit attempts to receive zebra_server packets.
 </summary>
@@ -72838,7 +55353,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="76711">
 <summary>
 Send and receive zebra_server packets.
 </summary>
@@ -72849,7 +55364,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="76727">
 <summary>
 Do not audit attempts to send and receive zebra_server packets.
 </summary>
@@ -72860,7 +55375,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="100492">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="76742">
 <summary>
 Relabel packets to zebra_server the packet type.
 </summary>
@@ -72870,85 +55385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514">
-<summary>
-Send and receive TCP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zented_port" lineno="100529">
-<summary>
-Send UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544">
-<summary>
-Do not audit attempts to send UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zented_port" lineno="100559">
-<summary>
-Receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574">
-<summary>
-Do not audit attempts to receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100589">
-<summary>
-Send and receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100620">
+<interface name="corenet_tcp_bind_zented_port" lineno="76764">
 <summary>
 Bind TCP sockets to the zented port.
 </summary>
@@ -72959,7 +55396,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100640">
+<interface name="corenet_udp_bind_zented_port" lineno="76784">
 <summary>
 Bind UDP sockets to the zented port.
 </summary>
@@ -72970,7 +55407,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100659">
+<interface name="corenet_tcp_connect_zented_port" lineno="76803">
 <summary>
 Make a TCP connection to the zented port.
 </summary>
@@ -72980,7 +55417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_client_packets" lineno="100679">
+<interface name="corenet_send_zented_client_packets" lineno="76823">
 <summary>
 Send zented_client packets.
 </summary>
@@ -72991,7 +55428,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="76842">
 <summary>
 Do not audit attempts to send zented_client packets.
 </summary>
@@ -73002,7 +55439,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100717">
+<interface name="corenet_receive_zented_client_packets" lineno="76861">
 <summary>
 Receive zented_client packets.
 </summary>
@@ -73013,7 +55450,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="76880">
 <summary>
 Do not audit attempts to receive zented_client packets.
 </summary>
@@ -73024,7 +55461,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100755">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="76899">
 <summary>
 Send and receive zented_client packets.
 </summary>
@@ -73035,7 +55472,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="76915">
 <summary>
 Do not audit attempts to send and receive zented_client packets.
 </summary>
@@ -73046,7 +55483,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100786">
+<interface name="corenet_relabelto_zented_client_packets" lineno="76930">
 <summary>
 Relabel packets to zented_client the packet type.
 </summary>
@@ -73056,7 +55493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zented_server_packets" lineno="100806">
+<interface name="corenet_send_zented_server_packets" lineno="76950">
 <summary>
 Send zented_server packets.
 </summary>
@@ -73067,7 +55504,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="76969">
 <summary>
 Do not audit attempts to send zented_server packets.
 </summary>
@@ -73078,7 +55515,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100844">
+<interface name="corenet_receive_zented_server_packets" lineno="76988">
 <summary>
 Receive zented_server packets.
 </summary>
@@ -73089,7 +55526,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="77007">
 <summary>
 Do not audit attempts to receive zented_server packets.
 </summary>
@@ -73100,7 +55537,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100882">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="77026">
 <summary>
 Send and receive zented_server packets.
 </summary>
@@ -73111,7 +55548,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="77042">
 <summary>
 Do not audit attempts to send and receive zented_server packets.
 </summary>
@@ -73122,7 +55559,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100913">
+<interface name="corenet_relabelto_zented_server_packets" lineno="77057">
 <summary>
 Relabel packets to zented_server the packet type.
 </summary>
@@ -73132,85 +55569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935">
-<summary>
-Send and receive TCP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zope_port" lineno="100950">
-<summary>
-Send UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965">
-<summary>
-Do not audit attempts to send UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100980">
-<summary>
-Receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995">
-<summary>
-Do not audit attempts to receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="101010">
-<summary>
-Send and receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="101041">
+<interface name="corenet_tcp_bind_zope_port" lineno="77079">
 <summary>
 Bind TCP sockets to the zope port.
 </summary>
@@ -73221,7 +55580,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_udp_bind_zope_port" lineno="101061">
+<interface name="corenet_udp_bind_zope_port" lineno="77099">
 <summary>
 Bind UDP sockets to the zope port.
 </summary>
@@ -73232,7 +55591,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="101080">
+<interface name="corenet_tcp_connect_zope_port" lineno="77118">
 <summary>
 Make a TCP connection to the zope port.
 </summary>
@@ -73242,7 +55601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_client_packets" lineno="101100">
+<interface name="corenet_send_zope_client_packets" lineno="77138">
 <summary>
 Send zope_client packets.
 </summary>
@@ -73253,7 +55612,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="77157">
 <summary>
 Do not audit attempts to send zope_client packets.
 </summary>
@@ -73264,7 +55623,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_client_packets" lineno="101138">
+<interface name="corenet_receive_zope_client_packets" lineno="77176">
 <summary>
 Receive zope_client packets.
 </summary>
@@ -73275,7 +55634,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="77195">
 <summary>
 Do not audit attempts to receive zope_client packets.
 </summary>
@@ -73286,7 +55645,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="101176">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="77214">
 <summary>
 Send and receive zope_client packets.
 </summary>
@@ -73297,7 +55656,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="77230">
 <summary>
 Do not audit attempts to send and receive zope_client packets.
 </summary>
@@ -73308,7 +55667,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="101207">
+<interface name="corenet_relabelto_zope_client_packets" lineno="77245">
 <summary>
 Relabel packets to zope_client the packet type.
 </summary>
@@ -73318,7 +55677,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_send_zope_server_packets" lineno="101227">
+<interface name="corenet_send_zope_server_packets" lineno="77265">
 <summary>
 Send zope_server packets.
 </summary>
@@ -73329,7 +55688,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="77284">
 <summary>
 Do not audit attempts to send zope_server packets.
 </summary>
@@ -73340,7 +55699,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_receive_zope_server_packets" lineno="101265">
+<interface name="corenet_receive_zope_server_packets" lineno="77303">
 <summary>
 Receive zope_server packets.
 </summary>
@@ -73351,7 +55710,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="77322">
 <summary>
 Do not audit attempts to receive zope_server packets.
 </summary>
@@ -73362,7 +55721,7 @@ Domain allowed access.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="101303">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="77341">
 <summary>
 Send and receive zope_server packets.
 </summary>
@@ -73373,7 +55732,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="77357">
 <summary>
 Do not audit attempts to send and receive zope_server packets.
 </summary>
@@ -73384,7 +55743,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="101334">
+<interface name="corenet_relabelto_zope_server_packets" lineno="77372">
 <summary>
 Relabel packets to zope_server the packet type.
 </summary>
@@ -73394,7 +55753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="77395">
 <summary>
 Send and receive TCP network traffic on the lo interface.
 </summary>
@@ -73405,7 +55764,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_udp_send_lo_if" lineno="101376">
+<interface name="corenet_udp_send_lo_if" lineno="77414">
 <summary>
 Send UDP network traffic on the lo interface.
 </summary>
@@ -73416,7 +55775,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_udp_receive_lo_if" lineno="101395">
+<interface name="corenet_udp_receive_lo_if" lineno="77433">
 <summary>
 Receive UDP network traffic on the lo interface.
 </summary>
@@ -73427,7 +55786,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="101414">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="77452">
 <summary>
 Send and receive UDP network traffic on the lo interface.
 </summary>
@@ -73438,7 +55797,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="corenet_raw_send_lo_if" lineno="101430">
+<interface name="corenet_raw_send_lo_if" lineno="77468">
 <summary>
 Send raw IP packets on the lo interface.
 </summary>
@@ -73449,7 +55808,7 @@ Domain allowed access.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="corenet_raw_receive_lo_if" lineno="101449">
+<interface name="corenet_raw_receive_lo_if" lineno="77487">
 <summary>
 Receive raw IP packets on the lo interface.
 </summary>
@@ -73460,7 +55819,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="101468">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="77506">
 <summary>
 Send and receive raw IP packets on the lo interface.
 </summary>
@@ -74829,7 +57188,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kmsg" lineno="2417">
+<interface name="dev_rw_infiniband" lineno="2417">
+<summary>
+Allow read/write access to InfiniBand devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_kmsg" lineno="2435">
 <summary>
 Read the kernel messages
 </summary>
@@ -74839,7 +57208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2435">
+<interface name="dev_dontaudit_read_kmsg" lineno="2453">
 <summary>
 Do not audit attempts to read the kernel messages
 </summary>
@@ -74849,7 +57218,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_kmsg" lineno="2453">
+<interface name="dev_write_kmsg" lineno="2471">
 <summary>
 Write to the kernel messages device
 </summary>
@@ -74859,7 +57228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kmsg" lineno="2471">
+<interface name="dev_rw_kmsg" lineno="2489">
 <summary>
 Read and write to the kernel messages device
 </summary>
@@ -74869,7 +57238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_kmsg" lineno="2489">
+<interface name="dev_mounton_kmsg" lineno="2507">
 <summary>
 Mount on the kernel messages device
 </summary>
@@ -74879,7 +57248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_ksm_dev" lineno="2507">
+<interface name="dev_getattr_ksm_dev" lineno="2525">
 <summary>
 Get the attributes of the ksm devices.
 </summary>
@@ -74889,7 +57258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_ksm_dev" lineno="2525">
+<interface name="dev_setattr_ksm_dev" lineno="2543">
 <summary>
 Set the attributes of the ksm devices.
 </summary>
@@ -74899,7 +57268,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_ksm" lineno="2543">
+<interface name="dev_read_ksm" lineno="2561">
 <summary>
 Read the ksm devices.
 </summary>
@@ -74909,7 +57278,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_ksm" lineno="2561">
+<interface name="dev_rw_ksm" lineno="2579">
 <summary>
 Read and write to ksm devices.
 </summary>
@@ -74919,7 +57288,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_kvm_dev" lineno="2579">
+<interface name="dev_getattr_kvm_dev" lineno="2597">
 <summary>
 Get the attributes of the kvm devices.
 </summary>
@@ -74929,7 +57298,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_kvm_dev" lineno="2597">
+<interface name="dev_setattr_kvm_dev" lineno="2615">
 <summary>
 Set the attributes of the kvm devices.
 </summary>
@@ -74939,7 +57308,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_kvm" lineno="2615">
+<interface name="dev_read_kvm" lineno="2633">
 <summary>
 Read the kvm devices.
 </summary>
@@ -74949,7 +57318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_kvm" lineno="2633">
+<interface name="dev_rw_kvm" lineno="2651">
 <summary>
 Read and write to kvm devices.
 </summary>
@@ -74959,7 +57328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lirc" lineno="2651">
+<interface name="dev_read_lirc" lineno="2669">
 <summary>
 Read the lirc device.
 </summary>
@@ -74969,7 +57338,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lirc" lineno="2669">
+<interface name="dev_rw_lirc" lineno="2687">
 <summary>
 Read and write the lirc device.
 </summary>
@@ -74979,7 +57348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_lirc" lineno="2693">
+<interface name="dev_filetrans_lirc" lineno="2711">
 <summary>
 Automatic type transition to the type
 for lirc device nodes when created in /dev.
@@ -74995,7 +57364,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_loop_control" lineno="2711">
+<interface name="dev_rw_loop_control" lineno="2729">
 <summary>
 Read and write the loop-control device.
 </summary>
@@ -75005,7 +57374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_lvm_control" lineno="2729">
+<interface name="dev_getattr_lvm_control" lineno="2747">
 <summary>
 Get the attributes of the lvm comtrol device.
 </summary>
@@ -75015,7 +57384,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_lvm_control" lineno="2747">
+<interface name="dev_read_lvm_control" lineno="2765">
 <summary>
 Read the lvm comtrol device.
 </summary>
@@ -75025,7 +57394,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_lvm_control" lineno="2765">
+<interface name="dev_rw_lvm_control" lineno="2783">
 <summary>
 Read and write the lvm control device.
 </summary>
@@ -75035,7 +57404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2783">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2801">
 <summary>
 Do not audit attempts to read and write lvm control device.
 </summary>
@@ -75045,7 +57414,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2801">
+<interface name="dev_delete_lvm_control_dev" lineno="2819">
 <summary>
 Delete the lvm control device.
 </summary>
@@ -75055,7 +57424,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2837">
 <summary>
 dontaudit getattr raw memory devices (e.g. /dev/mem).
 </summary>
@@ -75065,7 +57434,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_raw_memory" lineno="2840">
+<interface name="dev_read_raw_memory" lineno="2858">
 <summary>
 Read raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75078,7 +57447,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_raw_memory_cond" lineno="2870">
+<interface name="dev_read_raw_memory_cond" lineno="2888">
 <summary>
 Read raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -75096,7 +57465,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2897">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2915">
 <summary>
 Do not audit attempts to read raw memory devices
 (e.g. /dev/mem).
@@ -75110,7 +57479,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_raw_memory" lineno="2918">
+<interface name="dev_write_raw_memory" lineno="2936">
 <summary>
 Write raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75123,7 +57492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_raw_memory_cond" lineno="2948">
+<interface name="dev_write_raw_memory_cond" lineno="2966">
 <summary>
 Write raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -75141,7 +57510,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_rx_raw_memory" lineno="2974">
+<interface name="dev_rx_raw_memory" lineno="2992">
 <summary>
 Read and execute raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75154,7 +57523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_wx_raw_memory" lineno="2996">
+<interface name="dev_wx_raw_memory" lineno="3014">
 <summary>
 Write and execute raw memory devices (e.g. /dev/mem).
 This is extremely dangerous as it can bypass the
@@ -75167,7 +57536,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_wx_raw_memory_cond" lineno="3023">
+<interface name="dev_wx_raw_memory_cond" lineno="3041">
 <summary>
 Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
 This is extremely dangerous as it can bypass the
@@ -75185,7 +57554,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_misc_dev" lineno="3046">
+<interface name="dev_getattr_misc_dev" lineno="3064">
 <summary>
 Get the attributes of miscellaneous devices.
 </summary>
@@ -75195,7 +57564,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3083">
 <summary>
 Do not audit attempts to get the attributes
 of miscellaneous devices.
@@ -75206,7 +57575,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_misc_dev" lineno="3083">
+<interface name="dev_setattr_misc_dev" lineno="3101">
 <summary>
 Set the attributes of miscellaneous devices.
 </summary>
@@ -75216,7 +57585,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3120">
 <summary>
 Do not audit attempts to set the attributes
 of miscellaneous devices.
@@ -75227,7 +57596,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_misc" lineno="3120">
+<interface name="dev_read_misc" lineno="3138">
 <summary>
 Read miscellaneous devices.
 </summary>
@@ -75237,7 +57606,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_misc" lineno="3138">
+<interface name="dev_write_misc" lineno="3156">
 <summary>
 Write miscellaneous devices.
 </summary>
@@ -75247,7 +57616,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_rw_misc" lineno="3156">
+<interface name="dev_dontaudit_rw_misc" lineno="3174">
 <summary>
 Do not audit attempts to read and write miscellaneous devices.
 </summary>
@@ -75257,7 +57626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_modem_dev" lineno="3174">
+<interface name="dev_getattr_modem_dev" lineno="3192">
 <summary>
 Get the attributes of the modem devices.
 </summary>
@@ -75267,7 +57636,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_modem_dev" lineno="3192">
+<interface name="dev_setattr_modem_dev" lineno="3210">
 <summary>
 Set the attributes of the modem devices.
 </summary>
@@ -75277,7 +57646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_modem" lineno="3210">
+<interface name="dev_read_modem" lineno="3228">
 <summary>
 Read the modem devices.
 </summary>
@@ -75287,7 +57656,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_modem" lineno="3228">
+<interface name="dev_rw_modem" lineno="3246">
 <summary>
 Read and write to modem devices.
 </summary>
@@ -75297,7 +57666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mouse_dev" lineno="3246">
+<interface name="dev_getattr_mouse_dev" lineno="3264">
 <summary>
 Get the attributes of the mouse devices.
 </summary>
@@ -75307,7 +57676,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_mouse_dev" lineno="3264">
+<interface name="dev_setattr_mouse_dev" lineno="3282">
 <summary>
 Set the attributes of the mouse devices.
 </summary>
@@ -75317,7 +57686,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_mouse" lineno="3282">
+<interface name="dev_read_mouse" lineno="3300">
 <summary>
 Read the mouse devices.
 </summary>
@@ -75327,7 +57696,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mouse" lineno="3300">
+<interface name="dev_rw_mouse" lineno="3318">
 <summary>
 Read and write to mouse devices.
 </summary>
@@ -75337,7 +57706,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3319">
+<interface name="dev_getattr_mtrr_dev" lineno="3337">
 <summary>
 Get the attributes of the memory type range
 registers (MTRR) device.
@@ -75348,7 +57717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3339">
+<interface name="dev_dontaudit_write_mtrr" lineno="3357">
 <summary>
 Do not audit attempts to write the memory type
 range registers (MTRR).
@@ -75359,7 +57728,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_mtrr" lineno="3358">
+<interface name="dev_rw_mtrr" lineno="3376">
 <summary>
 Read and write the memory type range registers (MTRR).
 </summary>
@@ -75369,37 +57738,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3377">
-<summary>
-Get the attributes of the network control device  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_read_netcontrol" lineno="3392">
-<summary>
-Read the network control identity.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_rw_netcontrol" lineno="3407">
-<summary>
-Read and write the the network control device.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_getattr_null_dev" lineno="3422">
+<interface name="dev_getattr_null_dev" lineno="3395">
 <summary>
 Get the attributes of the null device nodes.
 </summary>
@@ -75409,7 +57748,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_null_dev" lineno="3440">
+<interface name="dev_setattr_null_dev" lineno="3413">
 <summary>
 Set the attributes of the null device nodes.
 </summary>
@@ -75419,7 +57758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_null_dev" lineno="3459">
+<interface name="dev_dontaudit_setattr_null_dev" lineno="3432">
 <summary>
 Do not audit attempts to set the attributes of
 the null device nodes.
@@ -75430,7 +57769,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_delete_null" lineno="3477">
+<interface name="dev_delete_null" lineno="3450">
 <summary>
 Delete the null device (/dev/null).
 </summary>
@@ -75440,7 +57779,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_null" lineno="3495">
+<interface name="dev_rw_null" lineno="3468">
 <summary>
 Read and write to the null device (/dev/null).
 </summary>
@@ -75450,7 +57789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_null_dev" lineno="3513">
+<interface name="dev_create_null_dev" lineno="3486">
 <summary>
 Create the null device (/dev/null).
 </summary>
@@ -75460,7 +57799,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_null_service" lineno="3532">
+<interface name="dev_manage_null_service" lineno="3505">
 <summary>
 Manage services with script type null_device_t for when
 /lib/systemd/system/something.service is a link to /dev/null
@@ -75471,7 +57810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3525">
 <summary>
 Do not audit attempts to get the attributes
 of the BIOS non-volatile RAM device.
@@ -75482,7 +57821,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_nvram" lineno="3570">
+<interface name="dev_rw_nvram" lineno="3543">
 <summary>
 Read and write BIOS non-volatile RAM.
 </summary>
@@ -75492,7 +57831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_printer_dev" lineno="3588">
+<interface name="dev_getattr_printer_dev" lineno="3561">
 <summary>
 Get the attributes of the printer device nodes.
 </summary>
@@ -75502,7 +57841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_printer_dev" lineno="3606">
+<interface name="dev_setattr_printer_dev" lineno="3579">
 <summary>
 Set the attributes of the printer device nodes.
 </summary>
@@ -75512,7 +57851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_append_printer" lineno="3625">
+<interface name="dev_append_printer" lineno="3598">
 <summary>
 Append the printer device.
 </summary>
@@ -75522,7 +57861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_printer" lineno="3643">
+<interface name="dev_rw_printer" lineno="3616">
 <summary>
 Read and write the printer device.
 </summary>
@@ -75532,7 +57871,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3661">
+<interface name="dev_getattr_pmqos_dev" lineno="3634">
 <summary>
 Get the attributes of PM QoS devices
 </summary>
@@ -75542,7 +57881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_pmqos" lineno="3679">
+<interface name="dev_read_pmqos" lineno="3652">
 <summary>
 Read the PM QoS devices.
 </summary>
@@ -75552,7 +57891,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_pmqos" lineno="3697">
+<interface name="dev_rw_pmqos" lineno="3670">
 <summary>
 Read and write the the PM QoS devices.
 </summary>
@@ -75562,7 +57901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_qemu_dev" lineno="3716">
+<interface name="dev_getattr_qemu_dev" lineno="3689">
 <summary>
 Get the attributes of the QEMU
 microcode and id interfaces.
@@ -75573,7 +57912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_qemu_dev" lineno="3735">
+<interface name="dev_setattr_qemu_dev" lineno="3708">
 <summary>
 Set the attributes of the QEMU
 microcode and id interfaces.
@@ -75584,7 +57923,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_qemu" lineno="3753">
+<interface name="dev_read_qemu" lineno="3726">
 <summary>
 Read the QEMU device
 </summary>
@@ -75594,7 +57933,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_qemu" lineno="3771">
+<interface name="dev_rw_qemu" lineno="3744">
 <summary>
 Read and write the the QEMU device.
 </summary>
@@ -75604,7 +57943,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_rand" lineno="3805">
+<interface name="dev_read_rand" lineno="3778">
 <summary>
 Read from random number generator
 devices (e.g., /dev/random).
@@ -75630,7 +57969,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_rand" lineno="3824">
+<interface name="dev_dontaudit_read_rand" lineno="3797">
 <summary>
 Do not audit attempts to read from random
 number generator devices (e.g., /dev/random)
@@ -75641,7 +57980,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_append_rand" lineno="3843">
+<interface name="dev_dontaudit_append_rand" lineno="3816">
 <summary>
 Do not audit attempts to append to random
 number generator devices (e.g., /dev/random)
@@ -75652,7 +57991,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_rand" lineno="3863">
+<interface name="dev_write_rand" lineno="3836">
 <summary>
 Write to the random device (e.g., /dev/random). This adds
 entropy used to generate the random data read from the
@@ -75664,7 +58003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_rand_dev" lineno="3881">
+<interface name="dev_create_rand_dev" lineno="3854">
 <summary>
 Create the random device (/dev/random).
 </summary>
@@ -75674,7 +58013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_realtime_clock" lineno="3899">
+<interface name="dev_read_realtime_clock" lineno="3872">
 <summary>
 Read the realtime clock (/dev/rtc).
 </summary>
@@ -75684,7 +58023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_realtime_clock" lineno="3917">
+<interface name="dev_write_realtime_clock" lineno="3890">
 <summary>
 Set the realtime clock (/dev/rtc).
 </summary>
@@ -75694,7 +58033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_realtime_clock" lineno="3937">
+<interface name="dev_rw_realtime_clock" lineno="3910">
 <summary>
 Read and set the realtime clock (/dev/rtc).
 </summary>
@@ -75704,7 +58043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_scanner_dev" lineno="3952">
+<interface name="dev_getattr_scanner_dev" lineno="3925">
 <summary>
 Get the attributes of the scanner device.
 </summary>
@@ -75714,7 +58053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3944">
 <summary>
 Do not audit attempts to get the attributes of
 the scanner device.
@@ -75725,7 +58064,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_scanner_dev" lineno="3989">
+<interface name="dev_setattr_scanner_dev" lineno="3962">
 <summary>
 Set the attributes of the scanner device.
 </summary>
@@ -75735,7 +58074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3981">
 <summary>
 Do not audit attempts to set the attributes of
 the scanner device.
@@ -75746,7 +58085,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_scanner" lineno="4026">
+<interface name="dev_rw_scanner" lineno="3999">
 <summary>
 Read and write the scanner device.
 </summary>
@@ -75756,7 +58095,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sound_dev" lineno="4044">
+<interface name="dev_getattr_sound_dev" lineno="4017">
 <summary>
 Get the attributes of the sound devices.
 </summary>
@@ -75766,7 +58105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_sound_dev" lineno="4062">
+<interface name="dev_setattr_sound_dev" lineno="4035">
 <summary>
 Set the attributes of the sound devices.
 </summary>
@@ -75776,7 +58115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound" lineno="4080">
+<interface name="dev_read_sound" lineno="4053">
 <summary>
 Read the sound devices.
 </summary>
@@ -75786,7 +58125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound" lineno="4099">
+<interface name="dev_write_sound" lineno="4072">
 <summary>
 Write the sound devices.
 </summary>
@@ -75796,7 +58135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sound_mixer" lineno="4118">
+<interface name="dev_read_sound_mixer" lineno="4091">
 <summary>
 Read the sound mixer devices.
 </summary>
@@ -75806,7 +58145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sound_mixer" lineno="4137">
+<interface name="dev_write_sound_mixer" lineno="4110">
 <summary>
 Write the sound mixer devices.
 </summary>
@@ -75816,7 +58155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="4156">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4129">
 <summary>
 Get the attributes of the the power management device.
 </summary>
@@ -75826,7 +58165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="4174">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4147">
 <summary>
 Set the attributes of the the power management device.
 </summary>
@@ -75836,7 +58175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_power_management" lineno="4192">
+<interface name="dev_rw_power_management" lineno="4165">
 <summary>
 Read and write the the power management device.
 </summary>
@@ -75846,7 +58185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_smartcard_dev" lineno="4210">
+<interface name="dev_getattr_smartcard_dev" lineno="4183">
 <summary>
 Getattr on smartcard devices
 </summary>
@@ -75856,7 +58195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4202">
 <summary>
 dontaudit getattr on smartcard devices
 </summary>
@@ -75866,7 +58205,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_smartcard" lineno="4248">
+<interface name="dev_rw_smartcard" lineno="4221">
 <summary>
 Read and write smartcard devices.
 </summary>
@@ -75876,7 +58215,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_smartcard" lineno="4266">
+<interface name="dev_manage_smartcard" lineno="4239">
 <summary>
 Create, read, write, and delete smartcard devices.
 </summary>
@@ -75886,7 +58225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_sysdig" lineno="4284">
+<interface name="dev_rw_sysdig" lineno="4257">
 <summary>
 Read, write and map the sysdig device.
 </summary>
@@ -75896,7 +58235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs" lineno="4303">
+<interface name="dev_mounton_sysfs" lineno="4276">
 <summary>
 Mount a filesystem on sysfs.  (Deprecated)
 </summary>
@@ -75906,7 +58245,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_sysfs" lineno="4318">
+<interface name="dev_associate_sysfs" lineno="4291">
 <summary>
 Associate a file to a sysfs filesystem.
 </summary>
@@ -75916,7 +58255,7 @@ The type of the file to be associated to sysfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4336">
+<interface name="dev_getattr_sysfs_dirs" lineno="4309">
 <summary>
 Get the attributes of sysfs directories.
 </summary>
@@ -75926,7 +58265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_sysfs" lineno="4354">
+<interface name="dev_getattr_sysfs" lineno="4327">
 <summary>
 Get the attributes of sysfs filesystem
 </summary>
@@ -75936,7 +58275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_sysfs" lineno="4372">
+<interface name="dev_mount_sysfs" lineno="4345">
 <summary>
 mount a sysfs filesystem
 </summary>
@@ -75946,7 +58285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_remount_sysfs" lineno="4390">
+<interface name="dev_remount_sysfs" lineno="4363">
 <summary>
 Remount a sysfs filesystem.
 </summary>
@@ -75956,7 +58295,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4408">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4381">
 <summary>
 Do not audit getting the attributes of sysfs filesystem
 </summary>
@@ -75966,7 +58305,7 @@ Domain to dontaudit access from
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4426">
+<interface name="dev_dontaudit_read_sysfs" lineno="4399">
 <summary>
 Dont audit attempts to read hardware state information
 </summary>
@@ -75976,7 +58315,7 @@ Domain for which the attempts do not need to be audited
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4446">
+<interface name="dev_mounton_sysfs_dirs" lineno="4419">
 <summary>
 Mount on sysfs directories.
 </summary>
@@ -75986,7 +58325,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_sysfs" lineno="4464">
+<interface name="dev_search_sysfs" lineno="4437">
 <summary>
 Search the sysfs directories.
 </summary>
@@ -75996,7 +58335,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4482">
+<interface name="dev_dontaudit_search_sysfs" lineno="4455">
 <summary>
 Do not audit attempts to search sysfs.
 </summary>
@@ -76006,7 +58345,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_sysfs" lineno="4500">
+<interface name="dev_list_sysfs" lineno="4473">
 <summary>
 List the contents of the sysfs directories.
 </summary>
@@ -76016,7 +58355,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sysfs_dirs" lineno="4519">
+<interface name="dev_write_sysfs_dirs" lineno="4492">
 <summary>
 Write in a sysfs directories.
 </summary>
@@ -76026,7 +58365,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4510">
 <summary>
 Do not audit attempts to write in a sysfs directory.
 </summary>
@@ -76036,7 +58375,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4555">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4528">
 <summary>
 Do not audit attempts to write to a sysfs file.
 </summary>
@@ -76046,7 +58385,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4574">
+<interface name="dev_manage_sysfs_dirs" lineno="4547">
 <summary>
 Create, read, write, and delete sysfs
 directories.
@@ -76057,7 +58396,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sysfs" lineno="4601">
+<interface name="dev_read_sysfs" lineno="4574">
 <summary>
 Read hardware state information.
 </summary>
@@ -76076,7 +58415,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_write_sysfs" lineno="4629">
+<interface name="dev_write_sysfs" lineno="4602">
 <summary>
 Write to hardware state information.
 </summary>
@@ -76093,7 +58432,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_rw_sysfs" lineno="4648">
+<interface name="dev_rw_sysfs" lineno="4621">
 <summary>
 Allow caller to modify hardware state information.
 </summary>
@@ -76103,7 +58442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_sysfs_files" lineno="4669">
+<interface name="dev_create_sysfs_files" lineno="4642">
 <summary>
 Add a sysfs file
 </summary>
@@ -76113,7 +58452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4687">
+<interface name="dev_relabel_sysfs_dirs" lineno="4660">
 <summary>
 Relabel hardware state directories.
 </summary>
@@ -76123,7 +58462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_all_sysfs" lineno="4705">
+<interface name="dev_relabel_all_sysfs" lineno="4678">
 <summary>
 Relabel from/to all sysfs types.
 </summary>
@@ -76133,7 +58472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_all_sysfs" lineno="4725">
+<interface name="dev_setattr_all_sysfs" lineno="4698">
 <summary>
 Set the attributes of sysfs files, directories and symlinks.
 </summary>
@@ -76143,7 +58482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_tpm" lineno="4745">
+<interface name="dev_rw_tpm" lineno="4718">
 <summary>
 Read and write the TPM device.
 </summary>
@@ -76153,7 +58492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_urand" lineno="4786">
+<interface name="dev_read_urand" lineno="4759">
 <summary>
 Read from pseudo random number generator devices (e.g., /dev/urandom).
 </summary>
@@ -76186,7 +58525,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_urand" lineno="4805">
+<interface name="dev_dontaudit_read_urand" lineno="4778">
 <summary>
 Do not audit attempts to read from pseudo
 random devices (e.g., /dev/urandom)
@@ -76197,7 +58536,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_urand" lineno="4824">
+<interface name="dev_write_urand" lineno="4797">
 <summary>
 Write to the pseudo random device (e.g., /dev/urandom). This
 sets the random number generator seed.
@@ -76208,7 +58547,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_urand_dev" lineno="4842">
+<interface name="dev_create_urand_dev" lineno="4815">
 <summary>
 Create the urandom device (/dev/urandom).
 </summary>
@@ -76218,7 +58557,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4860">
+<interface name="dev_setattr_urand_dev" lineno="4833">
+<summary>
+Set attributes on the urandom device (/dev/urandom).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_generic_usb_dev" lineno="4851">
 <summary>
 Getattr generic the USB devices.
 </summary>
@@ -76228,7 +58577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4878">
+<interface name="dev_setattr_generic_usb_dev" lineno="4869">
 <summary>
 Setattr generic the USB devices.
 </summary>
@@ -76238,7 +58587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_generic_usb_dev" lineno="4896">
+<interface name="dev_read_generic_usb_dev" lineno="4887">
 <summary>
 Read generic the USB devices.
 </summary>
@@ -76248,7 +58597,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4914">
+<interface name="dev_rw_generic_usb_dev" lineno="4905">
 <summary>
 Read and write generic the USB devices.
 </summary>
@@ -76258,7 +58607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4932">
+<interface name="dev_relabel_generic_usb_dev" lineno="4923">
 <summary>
 Relabel generic the USB devices.
 </summary>
@@ -76268,7 +58617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbmon_dev" lineno="4950">
+<interface name="dev_read_usbmon_dev" lineno="4941">
 <summary>
 Read USB monitor devices.
 </summary>
@@ -76278,7 +58627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_usbmon_dev" lineno="4968">
+<interface name="dev_write_usbmon_dev" lineno="4959">
 <summary>
 Write USB monitor devices.
 </summary>
@@ -76288,7 +58637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_usbfs" lineno="4986">
+<interface name="dev_mount_usbfs" lineno="4977">
 <summary>
 Mount a usbfs filesystem.
 </summary>
@@ -76298,7 +58647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_usbfs" lineno="5004">
+<interface name="dev_associate_usbfs" lineno="4995">
 <summary>
 Associate a file to a usbfs filesystem.
 </summary>
@@ -76308,7 +58657,7 @@ The type of the file to be associated to usbfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="5022">
+<interface name="dev_getattr_usbfs_dirs" lineno="5013">
 <summary>
 Get the attributes of a directory in the usb filesystem.
 </summary>
@@ -76318,7 +58667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5032">
 <summary>
 Do not audit attempts to get the attributes
 of a directory in the usb filesystem.
@@ -76329,7 +58678,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_usbfs" lineno="5059">
+<interface name="dev_search_usbfs" lineno="5050">
 <summary>
 Search the directory containing USB hardware information.
 </summary>
@@ -76339,7 +58688,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_usbfs" lineno="5077">
+<interface name="dev_list_usbfs" lineno="5068">
 <summary>
 Allow caller to get a list of usb hardware.
 </summary>
@@ -76349,7 +58698,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_usbfs_files" lineno="5098">
+<interface name="dev_setattr_usbfs_files" lineno="5089">
 <summary>
 Set the attributes of usbfs filesystem.
 </summary>
@@ -76359,7 +58708,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbfs" lineno="5118">
+<interface name="dev_read_usbfs" lineno="5109">
 <summary>
 Read USB hardware information using
 the usbfs filesystem interface.
@@ -76370,7 +58719,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_usbfs" lineno="5138">
+<interface name="dev_rw_usbfs" lineno="5129">
 <summary>
 Allow caller to modify usb hardware configuration files.
 </summary>
@@ -76380,7 +58729,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_video_dev" lineno="5158">
+<interface name="dev_getattr_video_dev" lineno="5149">
 <summary>
 Get the attributes of video4linux devices.
 </summary>
@@ -76390,7 +58739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_userio_dev" lineno="5176">
+<interface name="dev_rw_userio_dev" lineno="5167">
 <summary>
 Read and write userio device.
 </summary>
@@ -76400,7 +58749,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5195">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5186">
 <summary>
 Do not audit attempts to get the attributes
 of video4linux device nodes.
@@ -76411,7 +58760,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_video_dev" lineno="5213">
+<interface name="dev_setattr_video_dev" lineno="5204">
 <summary>
 Set the attributes of video4linux device nodes.
 </summary>
@@ -76421,7 +58770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5232">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5223">
 <summary>
 Do not audit attempts to set the attributes
 of video4linux device nodes.
@@ -76432,7 +58781,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_video_dev" lineno="5250">
+<interface name="dev_read_video_dev" lineno="5241">
 <summary>
 Read the video4linux devices.
 </summary>
@@ -76442,7 +58791,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_video_dev" lineno="5268">
+<interface name="dev_write_video_dev" lineno="5259">
 <summary>
 Write the video4linux devices.
 </summary>
@@ -76452,7 +58801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vfio_dev" lineno="5286">
+<interface name="dev_rw_vfio_dev" lineno="5277">
 <summary>
 Read and write vfio devices.
 </summary>
@@ -76462,7 +58811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5304">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5295">
 <summary>
 Relabel vfio devices.
 </summary>
@@ -76472,7 +58821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vhost" lineno="5322">
+<interface name="dev_rw_vhost" lineno="5313">
 <summary>
 Allow read/write the vhost devices
 </summary>
@@ -76482,7 +58831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vmware" lineno="5340">
+<interface name="dev_rw_vmware" lineno="5331">
 <summary>
 Read and write VMWare devices.
 </summary>
@@ -76492,7 +58841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_vmware" lineno="5358">
+<interface name="dev_rwx_vmware" lineno="5349">
 <summary>
 Read, write, and mmap VMWare devices.
 </summary>
@@ -76502,7 +58851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_watchdog" lineno="5377">
+<interface name="dev_read_watchdog" lineno="5368">
 <summary>
 Read from watchdog devices.
 </summary>
@@ -76512,7 +58861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_watchdog" lineno="5395">
+<interface name="dev_write_watchdog" lineno="5386">
 <summary>
 Write to watchdog devices.
 </summary>
@@ -76522,7 +58871,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_wireless" lineno="5413">
+<interface name="dev_read_wireless" lineno="5404">
 <summary>
 Read the wireless device.
 </summary>
@@ -76532,7 +58881,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_wireless" lineno="5431">
+<interface name="dev_rw_wireless" lineno="5422">
 <summary>
 Read and write the the wireless device.
 </summary>
@@ -76542,7 +58891,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_wireless" lineno="5449">
+<interface name="dev_manage_wireless" lineno="5440">
 <summary>
 manage the wireless device.
 </summary>
@@ -76552,7 +58901,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xen" lineno="5467">
+<interface name="dev_rw_xen" lineno="5458">
 <summary>
 Read and write Xen devices.
 </summary>
@@ -76562,7 +58911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_xen" lineno="5486">
+<interface name="dev_manage_xen" lineno="5477">
 <summary>
 Create, read, write, and delete Xen devices.
 </summary>
@@ -76572,7 +58921,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_xen" lineno="5510">
+<interface name="dev_filetrans_xen" lineno="5501">
 <summary>
 Automatic type transition to the type
 for xen device nodes when created in /dev.
@@ -76588,7 +58937,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5528">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5519">
 <summary>
 Get the attributes of X server miscellaneous devices.
 </summary>
@@ -76598,7 +58947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5546">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5537">
 <summary>
 Set the attributes of X server miscellaneous devices.
 </summary>
@@ -76608,7 +58957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xserver_misc" lineno="5564">
+<interface name="dev_rw_xserver_misc" lineno="5555">
 <summary>
 Read and write X server miscellaneous devices.
 </summary>
@@ -76618,7 +58967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_map_xserver_misc" lineno="5582">
+<interface name="dev_map_xserver_misc" lineno="5573">
 <summary>
 Map X server miscellaneous devices.
 </summary>
@@ -76628,7 +58977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_zero" lineno="5600">
+<interface name="dev_rw_zero" lineno="5591">
 <summary>
 Read and write to the zero device (/dev/zero).
 </summary>
@@ -76638,7 +58987,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_zero" lineno="5618">
+<interface name="dev_rwx_zero" lineno="5609">
 <summary>
 Read, write, and execute the zero device (/dev/zero).
 </summary>
@@ -76648,7 +58997,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_execmod_zero" lineno="5637">
+<interface name="dev_execmod_zero" lineno="5628">
 <summary>
 Execmod the zero device (/dev/zero).
 </summary>
@@ -76658,7 +59007,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_zero_dev" lineno="5656">
+<interface name="dev_create_zero_dev" lineno="5647">
 <summary>
 Create the zero device (/dev/zero).
 </summary>
@@ -76668,7 +59017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_cpu_online" lineno="5679">
+<interface name="dev_read_cpu_online" lineno="5670">
 <summary>
 Read cpu online hardware state information
 </summary>
@@ -76683,7 +59032,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_unconfined" lineno="5699">
+<interface name="dev_unconfined" lineno="5690">
 <summary>
 Unconfined access to devices.
 </summary>
@@ -76693,7 +59042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_cpu_online" lineno="5719">
+<interface name="dev_relabel_cpu_online" lineno="5710">
 <summary>
 Relabel cpu online hardware state information.
 </summary>
@@ -76703,7 +59052,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5729">
 <summary>
 Dont audit attempts to read usbmon devices
 </summary>
@@ -77806,46 +60155,7 @@ Type to be used for mount points.
 </summary>
 </param>
 </interface>
-<interface name="files_pid_file" lineno="231">
-<summary>
-Make the specified type usable for
-runtime process ID files.  (Deprecated)
-</summary>
-<desc>
-<p>
-Make the specified type usable for runtime process ID files,
-typically found in /var/run.
-This will also make the type usable for files, making
-calls to files_type() redundant.  Failure to use this interface
-for a PID file type may result in problems with starting
-or stopping services.
-</p>
-<p>
-Related interfaces:
-</p>
-<ul>
-<li>files_runtime_filetrans()</li>
-</ul>
-<p>
-Example usage with a domain that can create and
-write its PID file with a private PID file type in the
-/var/run directory:
-</p>
-<p>
-type mypidfile_t;
-files_runtime_file(mypidfile_t)
-allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_runtime_filetrans(mydomain_t, mypidfile_t, file)
-</p>
-</desc>
-<param name="type">
-<summary>
-Type to be used for PID files.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="files_runtime_file" lineno="275">
+<interface name="files_runtime_file" lineno="231">
 <summary>
 Make the specified type usable for
 runtime process ID files.
@@ -77884,7 +60194,7 @@ Type to be used for PID files.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_config_file" lineno="315">
+<interface name="files_config_file" lineno="271">
 <summary>
 Make the specified type a
 configuration file.
@@ -77915,7 +60225,7 @@ Type to be used as a configuration file.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_poly" lineno="335">
+<interface name="files_poly" lineno="291">
 <summary>
 Make the specified type a
 polyinstantiated directory.
@@ -77927,7 +60237,7 @@ polyinstantiated directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_parent" lineno="356">
+<interface name="files_poly_parent" lineno="312">
 <summary>
 Make the specified type a parent
 of a polyinstantiated directory.
@@ -77939,7 +60249,7 @@ parent directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_member" lineno="377">
+<interface name="files_poly_member" lineno="333">
 <summary>
 Make the specified type a
 polyinstantiation member directory.
@@ -77951,7 +60261,7 @@ member directory.
 </summary>
 </param>
 </interface>
-<interface name="files_poly_member_tmp" lineno="404">
+<interface name="files_poly_member_tmp" lineno="360">
 <summary>
 Make the domain use the specified
 type of polyinstantiated directory.
@@ -77969,7 +60279,7 @@ member directory.
 </summary>
 </param>
 </interface>
-<interface name="files_tmp_file" lineno="451">
+<interface name="files_tmp_file" lineno="407">
 <summary>
 Make the specified type a file
 used for temporary files.
@@ -78008,7 +60318,7 @@ temporary file.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="files_tmpfs_file" lineno="472">
+<interface name="files_tmpfs_file" lineno="428">
 <summary>
 Transform the type into a file, for use on a
 virtual memory filesystem (tmpfs).
@@ -78019,7 +60329,7 @@ The type to be transformed.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_dirs" lineno="491">
+<interface name="files_getattr_all_dirs" lineno="447">
 <summary>
 Get the attributes of all directories.
 </summary>
@@ -78029,7 +60339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="510">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
 <summary>
 Do not audit attempts to get the attributes
 of all directories.
@@ -78040,7 +60350,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_non_security" lineno="528">
+<interface name="files_list_non_security" lineno="484">
 <summary>
 List all non-security directories.
 </summary>
@@ -78050,7 +60360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_non_security" lineno="547">
+<interface name="files_dontaudit_list_non_security" lineno="503">
 <summary>
 Do not audit attempts to list all
 non-security directories.
@@ -78061,7 +60371,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_non_security" lineno="566">
+<interface name="files_mounton_non_security" lineno="522">
 <summary>
 Mount a filesystem on all non-security
 directories and files.
@@ -78072,7 +60382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_non_security_dirs" lineno="585">
+<interface name="files_write_non_security_dirs" lineno="541">
 <summary>
 Allow attempts to modify any directory
 </summary>
@@ -78082,7 +60392,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_security_dirs" lineno="603">
+<interface name="files_manage_non_security_dirs" lineno="559">
 <summary>
 Allow attempts to manage non-security directories
 </summary>
@@ -78092,7 +60402,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_non_security_dirs" lineno="621">
+<interface name="files_create_non_security_dirs" lineno="577">
+<summary>
+Create non-security directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_non_security_dirs" lineno="595">
 <summary>
 Relabel from/to non-security directories.
 </summary>
@@ -78102,7 +60422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_files" lineno="639">
+<interface name="files_getattr_all_files" lineno="613">
 <summary>
 Get the attributes of all files.
 </summary>
@@ -78112,7 +60432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="659">
+<interface name="files_dontaudit_getattr_all_files" lineno="633">
 <summary>
 Do not audit attempts to get the attributes
 of all files.
@@ -78123,7 +60443,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="678">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="652">
 <summary>
 Do not audit attempts to get the attributes
 of non security files.
@@ -78134,7 +60454,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_security_files" lineno="697">
+<interface name="files_manage_non_security_files" lineno="671">
 <summary>
 Create, read, write, and delete all non-security files.
 </summary>
@@ -78145,7 +60465,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_non_security_files" lineno="716">
+<interface name="files_relabel_non_security_files" lineno="690">
 <summary>
 Relabel from/to all non-security files.
 </summary>
@@ -78156,7 +60476,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_files" lineno="734">
+<interface name="files_read_all_files" lineno="708">
 <summary>
 Read all files.
 </summary>
@@ -78166,7 +60486,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_execmod_all_files" lineno="765">
+<interface name="files_execmod_all_files" lineno="739">
 <summary>
 Allow shared library text relocations in all files.
 </summary>
@@ -78184,7 +60504,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_security_files" lineno="784">
+<interface name="files_read_non_security_files" lineno="758">
 <summary>
 Read all non-security files.
 </summary>
@@ -78195,7 +60515,29 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_dirs_except" lineno="810">
+<interface name="files_write_non_security_files" lineno="778">
+<summary>
+Write all non-security files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_create_non_security_files" lineno="798">
+<summary>
+Create all non-security files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_read_all_dirs_except" lineno="824">
 <summary>
 Read all directories on the filesystem, except
 the listed exceptions.
@@ -78212,7 +60554,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_files_except" lineno="835">
+<interface name="files_read_all_files_except" lineno="849">
 <summary>
 Read all files on the filesystem, except
 the listed exceptions.
@@ -78229,7 +60571,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_symlinks_except" lineno="860">
+<interface name="files_read_all_symlinks_except" lineno="874">
 <summary>
 Read all symbolic links on the filesystem, except
 the listed exceptions.
@@ -78246,7 +60588,7 @@ must be negated by the caller.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_symlinks" lineno="878">
+<interface name="files_getattr_all_symlinks" lineno="892">
 <summary>
 Get the attributes of all symbolic links.
 </summary>
@@ -78256,7 +60598,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="897">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="911">
 <summary>
 Do not audit attempts to get the attributes
 of all symbolic links.
@@ -78267,7 +60609,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="915">
+<interface name="files_dontaudit_read_all_symlinks" lineno="929">
 <summary>
 Do not audit attempts to read all symbolic links.
 </summary>
@@ -78277,7 +60619,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="948">
 <summary>
 Do not audit attempts to get the attributes
 of non security symbolic links.
@@ -78288,7 +60630,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="967">
 <summary>
 Do not audit attempts to get the attributes
 of non security block devices.
@@ -78299,7 +60641,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="986">
 <summary>
 Do not audit attempts to get the attributes
 of non security character devices.
@@ -78310,7 +60652,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_symlinks" lineno="991">
+<interface name="files_read_all_symlinks" lineno="1005">
 <summary>
 Read all symbolic links.
 </summary>
@@ -78321,7 +60663,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_all_pipes" lineno="1010">
+<interface name="files_getattr_all_pipes" lineno="1024">
 <summary>
 Get the attributes of all named pipes.
 </summary>
@@ -78331,7 +60673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="1030">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="1044">
 <summary>
 Do not audit attempts to get the attributes
 of all named pipes.
@@ -78342,7 +60684,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1063">
 <summary>
 Do not audit attempts to get the attributes
 of non security named pipes.
@@ -78353,7 +60695,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_sockets" lineno="1067">
+<interface name="files_getattr_all_sockets" lineno="1081">
 <summary>
 Get the attributes of all named sockets.
 </summary>
@@ -78363,7 +60705,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1087">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1101">
 <summary>
 Do not audit attempts to get the attributes
 of all named sockets.
@@ -78374,7 +60716,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1120">
 <summary>
 Do not audit attempts to get the attributes
 of non security named sockets.
@@ -78385,7 +60727,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_blk_files" lineno="1124">
+<interface name="files_read_all_blk_files" lineno="1138">
 <summary>
 Read all block nodes with file types.
 </summary>
@@ -78395,7 +60737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_chr_files" lineno="1142">
+<interface name="files_read_all_chr_files" lineno="1156">
 <summary>
 Read all character nodes with file types.
 </summary>
@@ -78405,7 +60747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_files" lineno="1168">
+<interface name="files_relabel_all_files" lineno="1182">
 <summary>
 Relabel all files on the filesystem, except
 the listed exceptions.
@@ -78423,7 +60765,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_rw_all_files" lineno="1206">
+<interface name="files_rw_all_files" lineno="1220">
 <summary>
 rw all files on the filesystem, except
 the listed exceptions.
@@ -78441,7 +60783,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_files" lineno="1232">
+<interface name="files_manage_all_files" lineno="1246">
 <summary>
 Manage all files on the filesystem, except
 the listed exceptions.
@@ -78459,7 +60801,7 @@ must be negated by the caller.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_all" lineno="1255">
+<interface name="files_search_all" lineno="1269">
 <summary>
 Search the contents of all directories on
 extended attribute filesystems.
@@ -78470,7 +60812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all" lineno="1274">
+<interface name="files_list_all" lineno="1288">
 <summary>
 List the contents of all directories on
 extended attribute filesystems.
@@ -78481,7 +60823,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_files_as" lineno="1292">
+<interface name="files_create_all_files_as" lineno="1306">
 <summary>
 Create all files as is.
 </summary>
@@ -78491,7 +60833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1312">
+<interface name="files_dontaudit_search_all_dirs" lineno="1326">
 <summary>
 Do not audit attempts to search the
 contents of any directories on extended
@@ -78503,7 +60845,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1335">
+<interface name="files_getattr_all_file_type_fs" lineno="1349">
 <summary>
 Get the attributes of all filesystems
 with the type of a file.
@@ -78514,7 +60856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1353">
+<interface name="files_relabelto_all_file_type_fs" lineno="1367">
 <summary>
 Relabel a filesystem to the type of a file.
 </summary>
@@ -78524,7 +60866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1371">
+<interface name="files_relabel_all_file_type_fs" lineno="1385">
 <summary>
 Relabel a filesystem to and from the type of a file.
 </summary>
@@ -78534,7 +60876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mount_all_file_type_fs" lineno="1389">
+<interface name="files_mount_all_file_type_fs" lineno="1403">
 <summary>
 Mount all filesystems with the type of a file.
 </summary>
@@ -78544,7 +60886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1407">
+<interface name="files_unmount_all_file_type_fs" lineno="1421">
 <summary>
 Unmount all filesystems with the type of a file.
 </summary>
@@ -78554,7 +60896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_non_auth_dirs" lineno="1426">
+<interface name="files_list_non_auth_dirs" lineno="1440">
 <summary>
 Read all non-authentication related
 directories.
@@ -78565,7 +60907,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_files" lineno="1445">
+<interface name="files_read_non_auth_files" lineno="1459">
 <summary>
 Read all non-authentication related
 files.
@@ -78576,7 +60918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_non_auth_symlinks" lineno="1464">
+<interface name="files_read_non_auth_symlinks" lineno="1478">
 <summary>
 Read all non-authentication related
 symbolic links.
@@ -78587,7 +60929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_non_auth_files" lineno="1482">
+<interface name="files_rw_non_auth_files" lineno="1496">
 <summary>
 rw non-authentication related files.
 </summary>
@@ -78597,7 +60939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_non_auth_files" lineno="1502">
+<interface name="files_manage_non_auth_files" lineno="1516">
 <summary>
 Manage non-authentication related
 files.
@@ -78609,7 +60951,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_map_non_auth_files" lineno="1526">
+<interface name="files_map_non_auth_files" lineno="1540">
 <summary>
 Mmap non-authentication related
 files.
@@ -78621,7 +60963,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_non_auth_files" lineno="1546">
+<interface name="files_relabel_non_auth_files" lineno="1560">
 <summary>
 Relabel all non-authentication related
 files.
@@ -78633,7 +60975,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_config_dirs" lineno="1579">
+<interface name="files_manage_config_dirs" lineno="1593">
 <summary>
 Manage all configuration directories on filesystem
 </summary>
@@ -78644,7 +60986,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_dirs" lineno="1598">
+<interface name="files_relabel_config_dirs" lineno="1612">
 <summary>
 Relabel configuration directories
 </summary>
@@ -78655,7 +60997,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_dontaudit_relabel_config_dirs" lineno="1617">
+<interface name="files_dontaudit_relabel_config_dirs" lineno="1631">
 <summary>
 Do not audit attempts to relabel configuration directories
 </summary>
@@ -78666,7 +61008,7 @@ Domain not to audit.
 </param>
 
 </interface>
-<interface name="files_read_config_files" lineno="1635">
+<interface name="files_read_config_files" lineno="1649">
 <summary>
 Read config files in /etc.
 </summary>
@@ -78676,7 +61018,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_config_files" lineno="1656">
+<interface name="files_manage_config_files" lineno="1670">
 <summary>
 Manage all configuration files on filesystem
 </summary>
@@ -78687,7 +61029,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_relabel_config_files" lineno="1675">
+<interface name="files_relabel_config_files" lineno="1689">
 <summary>
 Relabel configuration files
 </summary>
@@ -78698,7 +61040,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="files_dontaudit_relabel_config_files" lineno="1694">
+<interface name="files_dontaudit_relabel_config_files" lineno="1708">
 <summary>
 Do not audit attempts to relabel configuration files
 </summary>
@@ -78709,7 +61051,7 @@ Domain not to audit.
 </param>
 
 </interface>
-<interface name="files_mounton_all_mountpoints" lineno="1712">
+<interface name="files_mounton_all_mountpoints" lineno="1726">
 <summary>
 Mount a filesystem on all mount points.
 </summary>
@@ -78719,7 +61061,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_mountpoints" lineno="1733">
+<interface name="files_getattr_all_mountpoints" lineno="1747">
 <summary>
 Get the attributes of all mount points.
 </summary>
@@ -78729,7 +61071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_mountpoints" lineno="1751">
+<interface name="files_setattr_all_mountpoints" lineno="1765">
 <summary>
 Set the attributes of all mount points.
 </summary>
@@ -78739,7 +61081,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1783">
 <summary>
 Do not audit attempts to set the attributes on all mount points.
 </summary>
@@ -78749,7 +61091,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_all_mountpoints" lineno="1787">
+<interface name="files_search_all_mountpoints" lineno="1801">
 <summary>
 Search all mount points.
 </summary>
@@ -78759,7 +61101,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1805">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1819">
 <summary>
 Do not audit searching of all mount points.
 </summary>
@@ -78769,7 +61111,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_mountpoints" lineno="1823">
+<interface name="files_list_all_mountpoints" lineno="1837">
 <summary>
 List all mount points.
 </summary>
@@ -78779,7 +61121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1841">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1855">
 <summary>
 Do not audit listing of all mount points.
 </summary>
@@ -78789,7 +61131,27 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_write_all_mountpoints" lineno="1859">
+<interface name="files_watch_all_mountpoints" lineno="1873">
+<summary>
+Watch all mountpoints.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_watch_all_mount_perm" lineno="1891">
+<summary>
+Watch all mountpoints.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_write_all_mountpoints" lineno="1909">
 <summary>
 Check if all mountpoints are writable.
 </summary>
@@ -78799,7 +61161,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1877">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1927">
 <summary>
 Do not audit attempts to write to mount points.
 </summary>
@@ -78809,7 +61171,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_root" lineno="1895">
+<interface name="files_list_root" lineno="1945">
 <summary>
 List the contents of the root directory.
 </summary>
@@ -78819,7 +61181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_symlinks" lineno="1915">
+<interface name="files_delete_root_symlinks" lineno="1965">
 <summary>
 Delete symbolic links in the
 root directory.
@@ -78830,7 +61192,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1933">
+<interface name="files_dontaudit_write_root_dirs" lineno="1983">
 <summary>
 Do not audit attempts to write to / dirs.
 </summary>
@@ -78840,7 +61202,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1952">
+<interface name="files_dontaudit_rw_root_dir" lineno="2002">
 <summary>
 Do not audit attempts to write
 files in the root directory.
@@ -78851,7 +61213,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_root_dirs" lineno="1970">
+<interface name="files_watch_root_dirs" lineno="2020">
 <summary>
 Watch the root directory.
 </summary>
@@ -78861,7 +61223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_root_filetrans" lineno="2004">
+<interface name="files_root_filetrans" lineno="2054">
 <summary>
 Create an object in the root directory, with a private
 type using a type transition.
@@ -78887,7 +61249,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_root_files" lineno="2023">
+<interface name="files_dontaudit_read_root_files" lineno="2073">
 <summary>
 Do not audit attempts to read files in
 the root directory.
@@ -78898,7 +61260,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_files" lineno="2042">
+<interface name="files_dontaudit_rw_root_files" lineno="2092">
 <summary>
 Do not audit attempts to read or write
 files in the root directory.
@@ -78909,7 +61271,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="2061">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2111">
 <summary>
 Do not audit attempts to read or write
 character device nodes in the root directory.
@@ -78920,7 +61282,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_chr_files" lineno="2080">
+<interface name="files_delete_root_chr_files" lineno="2130">
 <summary>
 Delete character device nodes in
 the root directory.
@@ -78931,7 +61293,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_files" lineno="2098">
+<interface name="files_delete_root_files" lineno="2148">
 <summary>
 Delete files in the root directory.
 </summary>
@@ -78941,7 +61303,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_root_files" lineno="2116">
+<interface name="files_exec_root_files" lineno="2166">
 <summary>
 Execute files in the root directory.
 </summary>
@@ -78951,7 +61313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_root_dir_entry" lineno="2134">
+<interface name="files_delete_root_dir_entry" lineno="2184">
 <summary>
 Remove entries from the root directory.
 </summary>
@@ -78961,7 +61323,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_root_dir" lineno="2152">
+<interface name="files_manage_root_dir" lineno="2202">
 <summary>
 Manage the root directory.
 </summary>
@@ -78971,7 +61333,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_rootfs" lineno="2171">
+<interface name="files_getattr_rootfs" lineno="2221">
 <summary>
 Get the attributes of a rootfs
 file system.
@@ -78982,7 +61344,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_rootfs" lineno="2189">
+<interface name="files_associate_rootfs" lineno="2239">
 <summary>
 Associate to root file system.
 </summary>
@@ -78992,7 +61354,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_rootfs" lineno="2207">
+<interface name="files_relabel_rootfs" lineno="2257">
 <summary>
 Relabel to and from rootfs file system.
 </summary>
@@ -79002,7 +61364,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unmount_rootfs" lineno="2225">
+<interface name="files_unmount_rootfs" lineno="2275">
 <summary>
 Unmount a rootfs filesystem.
 </summary>
@@ -79012,7 +61374,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_root" lineno="2243">
+<interface name="files_mounton_root" lineno="2293">
 <summary>
 Mount on the root directory (/)
 </summary>
@@ -79022,7 +61384,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_boot_fs" lineno="2262">
+<interface name="files_getattr_boot_fs" lineno="2312">
 <summary>
 Get the attributes of a filesystem
 mounted on /boot.
@@ -79033,7 +61395,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_remount_boot" lineno="2280">
+<interface name="files_remount_boot" lineno="2330">
 <summary>
 Remount a filesystem mounted on /boot.
 </summary>
@@ -79043,7 +61405,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_boot_dirs" lineno="2298">
+<interface name="files_getattr_boot_dirs" lineno="2348">
 <summary>
 Get attributes of the /boot directory.
 </summary>
@@ -79053,7 +61415,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2367">
 <summary>
 Do not audit attempts to get attributes
 of the /boot directory.
@@ -79064,7 +61426,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_boot" lineno="2335">
+<interface name="files_search_boot" lineno="2385">
 <summary>
 Search the /boot directory.
 </summary>
@@ -79074,7 +61436,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_boot" lineno="2353">
+<interface name="files_dontaudit_search_boot" lineno="2403">
 <summary>
 Do not audit attempts to search the /boot directory.
 </summary>
@@ -79084,7 +61446,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_boot" lineno="2371">
+<interface name="files_list_boot" lineno="2421">
 <summary>
 List the /boot directory.
 </summary>
@@ -79094,7 +61456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_boot" lineno="2389">
+<interface name="files_dontaudit_list_boot" lineno="2439">
 <summary>
 Do not audit attempts to list the /boot directory.
 </summary>
@@ -79104,7 +61466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_dirs" lineno="2407">
+<interface name="files_create_boot_dirs" lineno="2457">
 <summary>
 Create directories in /boot
 </summary>
@@ -79114,7 +61476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_dirs" lineno="2426">
+<interface name="files_manage_boot_dirs" lineno="2476">
 <summary>
 Create, read, write, and delete
 directories in /boot.
@@ -79125,7 +61487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_boot_filetrans" lineno="2460">
+<interface name="files_boot_filetrans" lineno="2510">
 <summary>
 Create a private type object in boot
 with an automatic type transition
@@ -79151,7 +61513,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_files" lineno="2479">
+<interface name="files_read_boot_files" lineno="2529">
 <summary>
 read files in the /boot directory.
 </summary>
@@ -79162,7 +61524,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_boot_files" lineno="2499">
+<interface name="files_manage_boot_files" lineno="2549">
 <summary>
 Create, read, write, and delete files
 in the /boot directory.
@@ -79174,7 +61536,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelfrom_boot_files" lineno="2517">
+<interface name="files_relabelfrom_boot_files" lineno="2567">
 <summary>
 Relabel from files in the /boot directory.
 </summary>
@@ -79184,7 +61546,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_boot_symlinks" lineno="2535">
+<interface name="files_read_boot_symlinks" lineno="2585">
 <summary>
 Read symbolic links in the /boot directory.
 </summary>
@@ -79194,7 +61556,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_boot_symlinks" lineno="2554">
+<interface name="files_rw_boot_symlinks" lineno="2604">
 <summary>
 Read and write symbolic links
 in the /boot directory.
@@ -79205,7 +61567,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_boot_symlinks" lineno="2574">
+<interface name="files_manage_boot_symlinks" lineno="2624">
 <summary>
 Create, read, write, and delete symbolic links
 in the /boot directory.
@@ -79216,7 +61578,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_img" lineno="2592">
+<interface name="files_read_kernel_img" lineno="2642">
 <summary>
 Read kernel files in the /boot directory.
 </summary>
@@ -79226,7 +61588,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_img" lineno="2613">
+<interface name="files_create_kernel_img" lineno="2663">
 <summary>
 Install a kernel into the /boot directory.
 </summary>
@@ -79237,7 +61599,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_kernel" lineno="2633">
+<interface name="files_delete_kernel" lineno="2683">
 <summary>
 Delete a kernel from /boot.
 </summary>
@@ -79248,7 +61610,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_default_dirs" lineno="2651">
+<interface name="files_getattr_default_dirs" lineno="2701">
 <summary>
 Getattr of directories with the default file type.
 </summary>
@@ -79258,7 +61620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2670">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2720">
 <summary>
 Do not audit attempts to get the attributes of
 directories with the default file type.
@@ -79269,7 +61631,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_default" lineno="2688">
+<interface name="files_search_default" lineno="2738">
 <summary>
 Search the contents of directories with the default file type.
 </summary>
@@ -79279,7 +61641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_default" lineno="2706">
+<interface name="files_list_default" lineno="2756">
 <summary>
 List contents of directories with the default file type.
 </summary>
@@ -79289,7 +61651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_default" lineno="2725">
+<interface name="files_dontaudit_list_default" lineno="2775">
 <summary>
 Do not audit attempts to list contents of
 directories with the default file type.
@@ -79300,7 +61662,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_dirs" lineno="2744">
+<interface name="files_manage_default_dirs" lineno="2794">
 <summary>
 Create, read, write, and delete directories with
 the default file type.
@@ -79311,7 +61673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_default" lineno="2762">
+<interface name="files_mounton_default" lineno="2812">
 <summary>
 Mount a filesystem on a directory with the default file type.
 </summary>
@@ -79321,7 +61683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2781">
+<interface name="files_dontaudit_getattr_default_files" lineno="2831">
 <summary>
 Do not audit attempts to get the attributes of
 files with the default file type.
@@ -79332,7 +61694,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_files" lineno="2799">
+<interface name="files_read_default_files" lineno="2849">
 <summary>
 Read files with the default file type.
 </summary>
@@ -79342,7 +61704,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_default_files" lineno="2818">
+<interface name="files_dontaudit_read_default_files" lineno="2868">
 <summary>
 Do not audit attempts to read files
 with the default file type.
@@ -79353,7 +61715,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_default_files" lineno="2837">
+<interface name="files_manage_default_files" lineno="2887">
 <summary>
 Create, read, write, and delete files with
 the default file type.
@@ -79364,7 +61726,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_symlinks" lineno="2855">
+<interface name="files_read_default_symlinks" lineno="2905">
 <summary>
 Read symbolic links with the default file type.
 </summary>
@@ -79374,7 +61736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_sockets" lineno="2873">
+<interface name="files_read_default_sockets" lineno="2923">
 <summary>
 Read sockets with the default file type.
 </summary>
@@ -79384,7 +61746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_default_pipes" lineno="2891">
+<interface name="files_read_default_pipes" lineno="2941">
 <summary>
 Read named pipes with the default file type.
 </summary>
@@ -79394,7 +61756,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_etc" lineno="2909">
+<interface name="files_search_etc" lineno="2959">
 <summary>
 Search the contents of /etc directories.
 </summary>
@@ -79404,7 +61766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_etc_dirs" lineno="2927">
+<interface name="files_setattr_etc_dirs" lineno="2977">
 <summary>
 Set the attributes of the /etc directories.
 </summary>
@@ -79414,7 +61776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_etc" lineno="2945">
+<interface name="files_list_etc" lineno="2995">
 <summary>
 List the contents of /etc directories.
 </summary>
@@ -79424,7 +61786,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2963">
+<interface name="files_dontaudit_write_etc_dirs" lineno="3013">
 <summary>
 Do not audit attempts to write to /etc dirs.
 </summary>
@@ -79434,7 +61796,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_dirs" lineno="2981">
+<interface name="files_rw_etc_dirs" lineno="3031">
 <summary>
 Add and remove entries from /etc directories.
 </summary>
@@ -79444,7 +61806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_dirs" lineno="3000">
+<interface name="files_manage_etc_dirs" lineno="3050">
 <summary>
 Manage generic directories in /etc
 </summary>
@@ -79455,7 +61817,7 @@ Domain allowed access
 </param>
 
 </interface>
-<interface name="files_relabelto_etc_dirs" lineno="3018">
+<interface name="files_relabelto_etc_dirs" lineno="3068">
 <summary>
 Relabel directories to etc_t.
 </summary>
@@ -79465,7 +61827,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_dirs" lineno="3037">
+<interface name="files_mounton_etc_dirs" lineno="3087">
 <summary>
 Mount a filesystem on the
 etc directories.
@@ -79476,7 +61838,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_dirs" lineno="3055">
+<interface name="files_remount_etc" lineno="3105">
+<summary>
+Remount etc filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_watch_etc_dirs" lineno="3123">
 <summary>
 Watch /etc directories
 </summary>
@@ -79486,7 +61858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_files" lineno="3107">
+<interface name="files_read_etc_files" lineno="3175">
 <summary>
 Read generic files in /etc.
 </summary>
@@ -79530,7 +61902,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_map_etc_files" lineno="3139">
+<interface name="files_map_etc_files" lineno="3207">
 <summary>
 Map generic files in /etc.
 </summary>
@@ -79552,7 +61924,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3157">
+<interface name="files_dontaudit_write_etc_files" lineno="3225">
 <summary>
 Do not audit attempts to write generic files in /etc.
 </summary>
@@ -79562,7 +61934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_files" lineno="3176">
+<interface name="files_rw_etc_files" lineno="3244">
 <summary>
 Read and write generic files in /etc.
 </summary>
@@ -79573,7 +61945,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_files" lineno="3198">
+<interface name="files_manage_etc_files" lineno="3266">
 <summary>
 Create, read, write, and delete generic
 files in /etc.
@@ -79585,7 +61957,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_manage_etc_files" lineno="3219">
+<interface name="files_dontaudit_manage_etc_files" lineno="3287">
 <summary>
 Do not audit attempts to create, read, write,
 and delete generic files in /etc.
@@ -79597,7 +61969,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_etc_files" lineno="3237">
+<interface name="files_delete_etc_files" lineno="3305">
 <summary>
 Delete system configuration files in /etc.
 </summary>
@@ -79607,7 +61979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_etc_files" lineno="3255">
+<interface name="files_exec_etc_files" lineno="3323">
 <summary>
 Execute generic files in /etc.
 </summary>
@@ -79617,7 +61989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_files" lineno="3275">
+<interface name="files_watch_etc_files" lineno="3343">
 <summary>
 Watch /etc files.
 </summary>
@@ -79627,7 +61999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_get_etc_unit_status" lineno="3293">
+<interface name="files_get_etc_unit_status" lineno="3361">
 <summary>
 Get etc_t service status.
 </summary>
@@ -79637,7 +62009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_start_etc_service" lineno="3312">
+<interface name="files_start_etc_service" lineno="3380">
 <summary>
 start etc_t service
 </summary>
@@ -79647,7 +62019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_stop_etc_service" lineno="3331">
+<interface name="files_stop_etc_service" lineno="3399">
 <summary>
 stop etc_t service
 </summary>
@@ -79657,7 +62029,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_etc_files" lineno="3350">
+<interface name="files_relabel_etc_files" lineno="3418">
 <summary>
 Relabel from and to generic files in /etc.
 </summary>
@@ -79667,7 +62039,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_symlinks" lineno="3369">
+<interface name="files_read_etc_symlinks" lineno="3437">
 <summary>
 Read symbolic links in /etc.
 </summary>
@@ -79677,7 +62049,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_etc_symlinks" lineno="3387">
+<interface name="files_watch_etc_symlinks" lineno="3455">
 <summary>
 Watch /etc symlinks
 </summary>
@@ -79687,7 +62059,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_symlinks" lineno="3405">
+<interface name="files_manage_etc_symlinks" lineno="3473">
 <summary>
 Create, read, write, and delete symbolic links in /etc.
 </summary>
@@ -79697,7 +62069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans" lineno="3439">
+<interface name="files_etc_filetrans" lineno="3507">
 <summary>
 Create objects in /etc with a private
 type using a type_transition.
@@ -79723,7 +62095,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_boot_flag" lineno="3469">
+<interface name="files_create_boot_flag" lineno="3537">
 <summary>
 Create a boot flag.
 </summary>
@@ -79745,7 +62117,7 @@ The name of the object being created.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_delete_boot_flag" lineno="3495">
+<interface name="files_delete_boot_flag" lineno="3563">
 <summary>
 Delete a boot flag.
 </summary>
@@ -79762,7 +62134,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3514">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3582">
 <summary>
 Get the attributes of the
 etc_runtime directories.
@@ -79773,7 +62145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3533">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3601">
 <summary>
 Mount a filesystem on the
 etc_runtime directories.
@@ -79784,7 +62156,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3551">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3619">
 <summary>
 Relabel to etc_runtime_t dirs.
 </summary>
@@ -79794,7 +62166,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3637">
 <summary>
 Do not audit attempts to set the attributes of the etc_runtime files
 </summary>
@@ -79804,7 +62176,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime_files" lineno="3607">
+<interface name="files_read_etc_runtime_files" lineno="3675">
 <summary>
 Read files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79834,7 +62206,7 @@ Domain allowed access.
 <infoflow type="read" weight="10" />
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3697">
 <summary>
 Do not audit attempts to read files
 in /etc that are dynamically
@@ -79846,7 +62218,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3648">
+<interface name="files_dontaudit_read_etc_files" lineno="3716">
 <summary>
 Do not audit attempts to read files
 in /etc
@@ -79857,7 +62229,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3735">
 <summary>
 Do not audit attempts to write
 etc runtime files.
@@ -79868,7 +62240,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_etc_runtime_files" lineno="3687">
+<interface name="files_rw_etc_runtime_files" lineno="3755">
 <summary>
 Read and write files in /etc that are dynamically
 created on boot, such as mtab.
@@ -79880,7 +62252,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_etc_runtime_files" lineno="3709">
+<interface name="files_manage_etc_runtime_files" lineno="3777">
 <summary>
 Create, read, write, and delete files in
 /etc that are dynamically created on boot,
@@ -79893,7 +62265,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3727">
+<interface name="files_relabelto_etc_runtime_files" lineno="3795">
 <summary>
 Relabel to etc_runtime_t files.
 </summary>
@@ -79903,7 +62275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3756">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3824">
 <summary>
 Create, etc runtime objects with an automatic
 type transition.
@@ -79924,7 +62296,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_home_dir" lineno="3775">
+<interface name="files_getattr_home_dir" lineno="3843">
 <summary>
 Get the attributes of the home directories root
 (/home).
@@ -79935,7 +62307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3796">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3864">
 <summary>
 Do not audit attempts to get the
 attributes of the home directories root
@@ -79947,7 +62319,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_search_home" lineno="3815">
+<interface name="files_search_home" lineno="3883">
 <summary>
 Search home directories root (/home).
 </summary>
@@ -79957,7 +62329,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_home" lineno="3835">
+<interface name="files_dontaudit_search_home" lineno="3903">
 <summary>
 Do not audit attempts to search
 home directories root (/home).
@@ -79968,7 +62340,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_home" lineno="3855">
+<interface name="files_dontaudit_list_home" lineno="3923">
 <summary>
 Do not audit attempts to list
 home directories root (/home).
@@ -79979,7 +62351,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_home" lineno="3874">
+<interface name="files_list_home" lineno="3942">
 <summary>
 Get listing of home directories.
 </summary>
@@ -79989,7 +62361,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_home" lineno="3893">
+<interface name="files_relabelto_home" lineno="3961">
 <summary>
 Relabel to user home root (/home).
 </summary>
@@ -79999,7 +62371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_home" lineno="3911">
+<interface name="files_relabelfrom_home" lineno="3979">
 <summary>
 Relabel from user home root (/home).
 </summary>
@@ -80009,7 +62381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_home" lineno="3929">
+<interface name="files_watch_home" lineno="3997">
 <summary>
 Watch the user home root (/home).
 </summary>
@@ -80019,7 +62391,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_home_filetrans" lineno="3962">
+<interface name="files_home_filetrans" lineno="4030">
 <summary>
 Create objects in /home.
 </summary>
@@ -80044,7 +62416,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3980">
+<interface name="files_getattr_lost_found_dirs" lineno="4048">
 <summary>
 Get the attributes of lost+found directories.
 </summary>
@@ -80054,7 +62426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4067">
 <summary>
 Do not audit attempts to get the attributes of
 lost+found directories.
@@ -80065,7 +62437,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_lost_found" lineno="4017">
+<interface name="files_list_lost_found" lineno="4085">
 <summary>
 List the contents of lost+found directories.
 </summary>
@@ -80075,7 +62447,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_lost_found" lineno="4037">
+<interface name="files_manage_lost_found" lineno="4105">
 <summary>
 Create, read, write, and delete objects in
 lost+found directories.
@@ -80087,7 +62459,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_search_mnt" lineno="4059">
+<interface name="files_search_mnt" lineno="4127">
 <summary>
 Search the contents of /mnt.
 </summary>
@@ -80097,7 +62469,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_mnt" lineno="4077">
+<interface name="files_dontaudit_search_mnt" lineno="4145">
 <summary>
 Do not audit attempts to search /mnt.
 </summary>
@@ -80107,7 +62479,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_mnt" lineno="4095">
+<interface name="files_list_mnt" lineno="4163">
 <summary>
 List the contents of /mnt.
 </summary>
@@ -80117,7 +62489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_mnt" lineno="4113">
+<interface name="files_dontaudit_list_mnt" lineno="4181">
 <summary>
 Do not audit attempts to list the contents of /mnt.
 </summary>
@@ -80127,7 +62499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_mnt" lineno="4131">
+<interface name="files_mounton_mnt" lineno="4199">
 <summary>
 Mount a filesystem on /mnt.
 </summary>
@@ -80137,7 +62509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_dirs" lineno="4150">
+<interface name="files_manage_mnt_dirs" lineno="4218">
 <summary>
 Create, read, write, and delete directories in /mnt.
 </summary>
@@ -80148,7 +62520,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_mnt_files" lineno="4168">
+<interface name="files_manage_mnt_files" lineno="4236">
 <summary>
 Create, read, write, and delete files in /mnt.
 </summary>
@@ -80158,7 +62530,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_files" lineno="4186">
+<interface name="files_read_mnt_files" lineno="4254">
 <summary>
 read files in /mnt.
 </summary>
@@ -80168,7 +62540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_mnt_symlinks" lineno="4204">
+<interface name="files_read_mnt_symlinks" lineno="4272">
 <summary>
 Read symbolic links in /mnt.
 </summary>
@@ -80178,7 +62550,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mnt_symlinks" lineno="4222">
+<interface name="files_manage_mnt_symlinks" lineno="4290">
 <summary>
 Create, read, write, and delete symbolic links in /mnt.
 </summary>
@@ -80188,7 +62560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_kernel_modules" lineno="4240">
+<interface name="files_search_kernel_modules" lineno="4308">
 <summary>
 Search the contents of the kernel module directories.
 </summary>
@@ -80198,7 +62570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_kernel_modules" lineno="4259">
+<interface name="files_list_kernel_modules" lineno="4327">
 <summary>
 List the contents of the kernel module directories.
 </summary>
@@ -80208,7 +62580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_kernel_modules" lineno="4278">
+<interface name="files_getattr_kernel_modules" lineno="4346">
 <summary>
 Get the attributes of kernel module files.
 </summary>
@@ -80218,7 +62590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_modules" lineno="4296">
+<interface name="files_read_kernel_modules" lineno="4364">
 <summary>
 Read kernel module files.
 </summary>
@@ -80228,7 +62600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mmap_read_kernel_modules" lineno="4316">
+<interface name="files_mmap_read_kernel_modules" lineno="4384">
 <summary>
 Read and mmap kernel module files.
 </summary>
@@ -80238,7 +62610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_kernel_modules" lineno="4337">
+<interface name="files_write_kernel_modules" lineno="4405">
 <summary>
 Write kernel module files.
 </summary>
@@ -80248,7 +62620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_modules" lineno="4356">
+<interface name="files_delete_kernel_modules" lineno="4424">
 <summary>
 Delete kernel module files.
 </summary>
@@ -80258,7 +62630,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_kernel_modules" lineno="4376">
+<interface name="files_manage_kernel_modules" lineno="4444">
 <summary>
 Create, read, write, and delete
 kernel module files.
@@ -80270,7 +62642,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_kernel_modules" lineno="4396">
+<interface name="files_relabel_kernel_modules" lineno="4464">
 <summary>
 Relabel from and to kernel module files.
 </summary>
@@ -80280,7 +62652,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_kernel_modules_filetrans" lineno="4431">
+<interface name="files_mounton_kernel_modules_dirs" lineno="4483">
+<summary>
+Mount on kernel module directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_kernel_modules_filetrans" lineno="4517">
 <summary>
 Create objects in the kernel module directories
 with a private type via an automatic type transition.
@@ -80306,7 +62688,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_load_kernel_modules" lineno="4449">
+<interface name="files_load_kernel_modules" lineno="4535">
 <summary>
 Load kernel module files.
 </summary>
@@ -80316,7 +62698,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_load_kernel_modules" lineno="4468">
+<interface name="files_dontaudit_load_kernel_modules" lineno="4554">
 <summary>
 Load kernel module files.
 </summary>
@@ -80326,7 +62708,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_world_readable" lineno="4488">
+<interface name="files_list_world_readable" lineno="4574">
 <summary>
 List world-readable directories.
 </summary>
@@ -80337,7 +62719,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_files" lineno="4507">
+<interface name="files_read_world_readable_files" lineno="4593">
 <summary>
 Read world-readable files.
 </summary>
@@ -80348,7 +62730,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_symlinks" lineno="4526">
+<interface name="files_read_world_readable_symlinks" lineno="4612">
 <summary>
 Read world-readable symbolic links.
 </summary>
@@ -80359,7 +62741,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_world_readable_pipes" lineno="4544">
+<interface name="files_read_world_readable_pipes" lineno="4630">
 <summary>
 Read world-readable named pipes.
 </summary>
@@ -80369,7 +62751,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_world_readable_sockets" lineno="4562">
+<interface name="files_read_world_readable_sockets" lineno="4648">
 <summary>
 Read world-readable sockets.
 </summary>
@@ -80379,7 +62761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_associate_tmp" lineno="4582">
+<interface name="files_associate_tmp" lineno="4668">
 <summary>
 Allow the specified type to associate
 to a filesystem with the type of the
@@ -80391,7 +62773,7 @@ Type of the file to associate.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_tmp_dirs" lineno="4600">
+<interface name="files_getattr_tmp_dirs" lineno="4686">
 <summary>
 Get the	attributes of the tmp directory (/tmp).
 </summary>
@@ -80401,7 +62783,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4705">
 <summary>
 Do not audit attempts to get the
 attributes of the tmp directory (/tmp).
@@ -80412,7 +62794,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_tmp" lineno="4637">
+<interface name="files_search_tmp" lineno="4723">
 <summary>
 Search the tmp directory (/tmp).
 </summary>
@@ -80422,7 +62804,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_tmp" lineno="4655">
+<interface name="files_dontaudit_search_tmp" lineno="4741">
 <summary>
 Do not audit attempts to search the tmp directory (/tmp).
 </summary>
@@ -80432,7 +62814,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_tmp" lineno="4673">
+<interface name="files_list_tmp" lineno="4759">
 <summary>
 Read the tmp directory (/tmp).
 </summary>
@@ -80442,7 +62824,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_tmp" lineno="4691">
+<interface name="files_dontaudit_list_tmp" lineno="4777">
 <summary>
 Do not audit listing of the tmp directory (/tmp).
 </summary>
@@ -80452,7 +62834,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4709">
+<interface name="files_delete_tmp_dir_entry" lineno="4795">
 <summary>
 Remove entries from the tmp directory.
 </summary>
@@ -80462,7 +62844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_files" lineno="4727">
+<interface name="files_read_generic_tmp_files" lineno="4813">
 <summary>
 Read files in the tmp directory (/tmp).
 </summary>
@@ -80472,7 +62854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4745">
+<interface name="files_manage_generic_tmp_dirs" lineno="4831">
 <summary>
 Manage temporary directories in /tmp.
 </summary>
@@ -80482,7 +62864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_generic_tmp_dirs" lineno="4763">
+<interface name="files_relabel_generic_tmp_dirs" lineno="4849">
 <summary>
 Relabel temporary directories in /tmp.
 </summary>
@@ -80492,7 +62874,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_tmp_files" lineno="4781">
+<interface name="files_manage_generic_tmp_files" lineno="4867">
 <summary>
 Manage temporary files and directories in /tmp.
 </summary>
@@ -80502,7 +62884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4799">
+<interface name="files_read_generic_tmp_symlinks" lineno="4885">
 <summary>
 Read symbolic links in the tmp directory (/tmp).
 </summary>
@@ -80512,7 +62894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4817">
+<interface name="files_rw_generic_tmp_sockets" lineno="4903">
 <summary>
 Read and write generic named sockets in the tmp directory (/tmp).
 </summary>
@@ -80522,7 +62904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_tmp" lineno="4835">
+<interface name="files_mounton_tmp" lineno="4921">
 <summary>
 Mount filesystems in the tmp directory (/tmp)
 </summary>
@@ -80532,7 +62914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4853">
+<interface name="files_setattr_all_tmp_dirs" lineno="4939">
 <summary>
 Set the attributes of all tmp directories.
 </summary>
@@ -80542,7 +62924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_all_tmp" lineno="4871">
+<interface name="files_list_all_tmp" lineno="4957">
 <summary>
 List all tmp directories.
 </summary>
@@ -80552,7 +62934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4891">
+<interface name="files_relabel_all_tmp_dirs" lineno="4977">
 <summary>
 Relabel to and from all temporary
 directory types.
@@ -80564,7 +62946,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4998">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp files.
@@ -80575,7 +62957,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_tmp_files" lineno="4931">
+<interface name="files_getattr_all_tmp_files" lineno="5017">
 <summary>
 Allow attempts to get the attributes
 of all tmp files.
@@ -80586,7 +62968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_tmp_files" lineno="4951">
+<interface name="files_relabel_all_tmp_files" lineno="5037">
 <summary>
 Relabel to and from all temporary
 file types.
@@ -80598,7 +62980,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5058">
 <summary>
 Do not audit attempts to get the attributes
 of all tmp sock_file.
@@ -80609,7 +62991,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_tmp_files" lineno="4990">
+<interface name="files_read_all_tmp_files" lineno="5076">
 <summary>
 Read all tmp files.
 </summary>
@@ -80619,7 +63001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_tmp_filetrans" lineno="5024">
+<interface name="files_tmp_filetrans" lineno="5110">
 <summary>
 Create an object in the tmp directories, with a private
 type using a type transition.
@@ -80645,7 +63027,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_purge_tmp" lineno="5042">
+<interface name="files_purge_tmp" lineno="5128">
 <summary>
 Delete the contents of /tmp.
 </summary>
@@ -80655,7 +63037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_all_tmpfs_files" lineno="5065">
+<interface name="files_getattr_all_tmpfs_files" lineno="5151">
 <summary>
 Get the attributes of all tmpfs files.
 </summary>
@@ -80665,7 +63047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_usr_dirs" lineno="5084">
+<interface name="files_setattr_usr_dirs" lineno="5170">
 <summary>
 Set the attributes of the /usr directory.
 </summary>
@@ -80675,7 +63057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_usr" lineno="5102">
+<interface name="files_search_usr" lineno="5188">
 <summary>
 Search the content of /usr.
 </summary>
@@ -80685,7 +63067,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_usr" lineno="5121">
+<interface name="files_list_usr" lineno="5207">
 <summary>
 List the contents of generic
 directories in /usr.
@@ -80696,7 +63078,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="5139">
+<interface name="files_dontaudit_write_usr_dirs" lineno="5225">
 <summary>
 Do not audit write of /usr dirs
 </summary>
@@ -80706,7 +63088,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_usr_dirs" lineno="5157">
+<interface name="files_rw_usr_dirs" lineno="5243">
 <summary>
 Add and remove entries from /usr directories.
 </summary>
@@ -80716,7 +63098,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="5176">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="5262">
 <summary>
 Do not audit attempts to add and remove
 entries from /usr directories.
@@ -80727,7 +63109,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_dirs" lineno="5194">
+<interface name="files_delete_usr_dirs" lineno="5280">
 <summary>
 Delete generic directories in /usr in the caller domain.
 </summary>
@@ -80737,7 +63119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_usr_dirs" lineno="5212">
+<interface name="files_watch_usr_dirs" lineno="5298">
 <summary>
 Watch generic directories in /usr.
 </summary>
@@ -80747,7 +63129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_usr_files" lineno="5230">
+<interface name="files_delete_usr_files" lineno="5316">
 <summary>
 Delete generic files in /usr in the caller domain.
 </summary>
@@ -80757,7 +63139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_files" lineno="5248">
+<interface name="files_getattr_usr_files" lineno="5334">
 <summary>
 Get the attributes of files in /usr.
 </summary>
@@ -80767,7 +63149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_map_usr_files" lineno="5267">
+<interface name="files_map_usr_files" lineno="5353">
 <summary>
 Map generic files in /usr.
 </summary>
@@ -80778,7 +63160,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_read_usr_files" lineno="5303">
+<interface name="files_read_usr_files" lineno="5389">
 <summary>
 Read generic files in /usr.
 </summary>
@@ -80806,7 +63188,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="files_exec_usr_files" lineno="5323">
+<interface name="files_exec_usr_files" lineno="5409">
 <summary>
 Execute generic programs in /usr in the caller domain.
 </summary>
@@ -80816,7 +63198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5343">
+<interface name="files_dontaudit_write_usr_files" lineno="5429">
 <summary>
 dontaudit write of /usr files
 </summary>
@@ -80826,7 +63208,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_usr_files" lineno="5361">
+<interface name="files_manage_usr_files" lineno="5447">
 <summary>
 Create, read, write, and delete files in the /usr directory.
 </summary>
@@ -80836,7 +63218,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelto_usr_files" lineno="5379">
+<interface name="files_relabelto_usr_files" lineno="5465">
 <summary>
 Relabel a file to the type used in /usr.
 </summary>
@@ -80846,7 +63228,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabelfrom_usr_files" lineno="5397">
+<interface name="files_relabelfrom_usr_files" lineno="5483">
 <summary>
 Relabel a file from the type used in /usr.
 </summary>
@@ -80856,7 +63238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_symlinks" lineno="5415">
+<interface name="files_read_usr_symlinks" lineno="5501">
 <summary>
 Read symbolic links in /usr.
 </summary>
@@ -80866,7 +63248,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_usr_filetrans" lineno="5448">
+<interface name="files_usr_filetrans" lineno="5534">
 <summary>
 Create objects in the /usr directory
 </summary>
@@ -80891,7 +63273,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_search_src" lineno="5466">
+<interface name="files_search_src" lineno="5552">
 <summary>
 Search directories in /usr/src.
 </summary>
@@ -80901,7 +63283,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_src" lineno="5484">
+<interface name="files_dontaudit_search_src" lineno="5570">
 <summary>
 Do not audit attempts to search /usr/src.
 </summary>
@@ -80911,7 +63293,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_usr_src_files" lineno="5502">
+<interface name="files_getattr_usr_src_files" lineno="5588">
 <summary>
 Get the attributes of files in /usr/src.
 </summary>
@@ -80921,7 +63303,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_usr_src_files" lineno="5523">
+<interface name="files_read_usr_src_files" lineno="5609">
 <summary>
 Read files in /usr/src.
 </summary>
@@ -80931,7 +63313,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_usr_src_files" lineno="5544">
+<interface name="files_exec_usr_src_files" lineno="5630">
 <summary>
 Execute programs in /usr/src in the caller domain.
 </summary>
@@ -80941,7 +63323,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_kernel_symbol_table" lineno="5564">
+<interface name="files_create_kernel_symbol_table" lineno="5650">
 <summary>
 Install a system.map into the /boot directory.
 </summary>
@@ -80951,7 +63333,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_kernel_symbol_table" lineno="5583">
+<interface name="files_read_kernel_symbol_table" lineno="5669">
 <summary>
 Read system.map in the /boot directory.
 </summary>
@@ -80961,7 +63343,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5602">
+<interface name="files_delete_kernel_symbol_table" lineno="5688">
 <summary>
 Delete a system.map in the /boot directory.
 </summary>
@@ -80971,7 +63353,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var" lineno="5621">
+<interface name="files_search_var" lineno="5707">
 <summary>
 Search the contents of /var.
 </summary>
@@ -80981,7 +63363,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5639">
+<interface name="files_dontaudit_write_var_dirs" lineno="5725">
 <summary>
 Do not audit attempts to write to /var.
 </summary>
@@ -80991,7 +63373,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_write_var_dirs" lineno="5657">
+<interface name="files_write_var_dirs" lineno="5743">
 <summary>
 Allow attempts to write to /var.dirs
 </summary>
@@ -81001,7 +63383,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_var" lineno="5676">
+<interface name="files_dontaudit_search_var" lineno="5762">
 <summary>
 Do not audit attempts to search
 the contents of /var.
@@ -81012,7 +63394,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_var" lineno="5694">
+<interface name="files_list_var" lineno="5780">
 <summary>
 List the contents of /var.
 </summary>
@@ -81022,7 +63404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_var" lineno="5713">
+<interface name="files_dontaudit_list_var" lineno="5799">
 <summary>
 Do not audit attempts to list
 the contents of /var.
@@ -81033,7 +63415,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_dirs" lineno="5732">
+<interface name="files_manage_var_dirs" lineno="5818">
 <summary>
 Create, read, write, and delete directories
 in the /var directory.
@@ -81044,7 +63426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_dirs" lineno="5750">
+<interface name="files_relabel_var_dirs" lineno="5836">
 <summary>
 relabelto/from var directories
 </summary>
@@ -81054,7 +63436,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_files" lineno="5768">
+<interface name="files_read_var_files" lineno="5854">
 <summary>
 Read files in the /var directory.
 </summary>
@@ -81064,7 +63446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_append_var_files" lineno="5786">
+<interface name="files_append_var_files" lineno="5872">
 <summary>
 Append files in the /var directory.
 </summary>
@@ -81074,7 +63456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_files" lineno="5804">
+<interface name="files_rw_var_files" lineno="5890">
 <summary>
 Read and write files in the /var directory.
 </summary>
@@ -81084,7 +63466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5823">
+<interface name="files_dontaudit_rw_var_files" lineno="5909">
 <summary>
 Do not audit attempts to read and write
 files in the /var directory.
@@ -81095,7 +63477,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_files" lineno="5841">
+<interface name="files_manage_var_files" lineno="5927">
 <summary>
 Create, read, write, and delete files in the /var directory.
 </summary>
@@ -81105,7 +63487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_symlinks" lineno="5859">
+<interface name="files_read_var_symlinks" lineno="5945">
 <summary>
 Read symbolic links in the /var directory.
 </summary>
@@ -81115,7 +63497,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_symlinks" lineno="5878">
+<interface name="files_manage_var_symlinks" lineno="5964">
 <summary>
 Create, read, write, and delete symbolic
 links in the /var directory.
@@ -81126,7 +63508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_filetrans" lineno="5911">
+<interface name="files_var_filetrans" lineno="5997">
 <summary>
 Create objects in the /var directory
 </summary>
@@ -81151,7 +63533,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5929">
+<interface name="files_getattr_var_lib_dirs" lineno="6015">
 <summary>
 Get the attributes of the /var/lib directory.
 </summary>
@@ -81161,7 +63543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var_lib" lineno="5961">
+<interface name="files_search_var_lib" lineno="6047">
 <summary>
 Search the /var/lib directory.
 </summary>
@@ -81185,7 +63567,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5981">
+<interface name="files_dontaudit_search_var_lib" lineno="6067">
 <summary>
 Do not audit attempts to search the
 contents of /var/lib.
@@ -81197,7 +63579,7 @@ Domain to not audit.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_list_var_lib" lineno="5999">
+<interface name="files_list_var_lib" lineno="6085">
 <summary>
 List the contents of the /var/lib directory.
 </summary>
@@ -81207,7 +63589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_lib_dirs" lineno="6017">
+<interface name="files_rw_var_lib_dirs" lineno="6103">
 <summary>
 Read-write /var/lib directories
 </summary>
@@ -81217,7 +63599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_lib_dirs" lineno="6035">
+<interface name="files_manage_var_lib_dirs" lineno="6121">
 <summary>
 manage var_lib_t dirs
 </summary>
@@ -81227,7 +63609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_lib_dirs" lineno="6054">
+<interface name="files_relabel_var_lib_dirs" lineno="6140">
 <summary>
 relabel var_lib_t dirs
 </summary>
@@ -81237,7 +63619,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_lib_filetrans" lineno="6088">
+<interface name="files_var_lib_filetrans" lineno="6174">
 <summary>
 Create objects in the /var/lib directory
 </summary>
@@ -81262,7 +63644,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_files" lineno="6107">
+<interface name="files_read_var_lib_files" lineno="6193">
 <summary>
 Read generic files in /var/lib.
 </summary>
@@ -81272,7 +63654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_symlinks" lineno="6126">
+<interface name="files_read_var_lib_symlinks" lineno="6212">
 <summary>
 Read generic symbolic links in /var/lib
 </summary>
@@ -81282,7 +63664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_urandom_seed" lineno="6148">
+<interface name="files_manage_urandom_seed" lineno="6234">
 <summary>
 Create, read, write, and delete the
 pseudorandom number generator seed.
@@ -81293,7 +63675,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mounttab" lineno="6168">
+<interface name="files_manage_mounttab" lineno="6254">
 <summary>
 Allow domain to manage mount tables
 necessary for rpcd, nfsd, etc.
@@ -81304,7 +63686,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_lock_dirs" lineno="6187">
+<interface name="files_setattr_lock_dirs" lineno="6273">
 <summary>
 Set the attributes of the generic lock directories.
 </summary>
@@ -81314,7 +63696,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_locks" lineno="6205">
+<interface name="files_search_locks" lineno="6291">
 <summary>
 Search the locks directory (/var/lock).
 </summary>
@@ -81324,7 +63706,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_locks" lineno="6225">
+<interface name="files_dontaudit_search_locks" lineno="6311">
 <summary>
 Do not audit attempts to search the
 locks directory (/var/lock).
@@ -81335,7 +63717,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_locks" lineno="6244">
+<interface name="files_list_locks" lineno="6330">
 <summary>
 List generic lock directories.
 </summary>
@@ -81345,7 +63727,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_lock_dirs" lineno="6263">
+<interface name="files_check_write_lock_dirs" lineno="6349">
 <summary>
 Test write access on lock directories.
 </summary>
@@ -81355,7 +63737,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_add_entry_lock_dirs" lineno="6282">
+<interface name="files_add_entry_lock_dirs" lineno="6368">
 <summary>
 Add entries in the /var/lock directories.
 </summary>
@@ -81365,7 +63747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_lock_dirs" lineno="6302">
+<interface name="files_rw_lock_dirs" lineno="6388">
 <summary>
 Add and remove entries in the /var/lock
 directories.
@@ -81376,7 +63758,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_lock_dirs" lineno="6321">
+<interface name="files_create_lock_dirs" lineno="6407">
 <summary>
 Create lock directories
 </summary>
@@ -81386,7 +63768,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6342">
+<interface name="files_relabel_all_lock_dirs" lineno="6428">
 <summary>
 Relabel to and from all lock directory types.
 </summary>
@@ -81397,7 +63779,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_generic_locks" lineno="6363">
+<interface name="files_getattr_generic_locks" lineno="6449">
 <summary>
 Get the attributes of generic lock files.
 </summary>
@@ -81407,7 +63789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_generic_locks" lineno="6384">
+<interface name="files_delete_generic_locks" lineno="6470">
 <summary>
 Delete generic lock files.
 </summary>
@@ -81417,7 +63799,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_locks" lineno="6405">
+<interface name="files_manage_generic_locks" lineno="6491">
 <summary>
 Create, read, write, and delete generic
 lock files.
@@ -81428,7 +63810,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_locks" lineno="6427">
+<interface name="files_delete_all_locks" lineno="6513">
 <summary>
 Delete all lock files.
 </summary>
@@ -81439,7 +63821,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_locks" lineno="6448">
+<interface name="files_read_all_locks" lineno="6534">
 <summary>
 Read all lock files.
 </summary>
@@ -81449,7 +63831,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_locks" lineno="6471">
+<interface name="files_manage_all_locks" lineno="6557">
 <summary>
 manage all lock files.
 </summary>
@@ -81459,7 +63841,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_locks" lineno="6494">
+<interface name="files_relabel_all_locks" lineno="6580">
 <summary>
 Relabel from/to all lock files.
 </summary>
@@ -81469,7 +63851,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_lock_filetrans" lineno="6533">
+<interface name="files_lock_filetrans" lineno="6619">
 <summary>
 Create an object in the locks directory, with a private
 type using a type transition.
@@ -81495,91 +63877,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554">
-<summary>
-Do not audit attempts to get the attributes
-of the /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_mounton_pid_dirs" lineno="6569">
-<summary>
-mounton a /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_setattr_pid_dirs" lineno="6584">
-<summary>
-Set the attributes of the /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_search_pids" lineno="6600">
-<summary>
-Search the contents of runtime process
-ID directories (/var/run).  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_search_pids" lineno="6616">
-<summary>
-Do not audit attempts to search
-the /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_list_pids" lineno="6632">
-<summary>
-List the contents of the runtime process
-ID directories (/var/run).  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_check_write_pid_dirs" lineno="6647">
-<summary>
-Check write access on /var/run directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_create_pid_dirs" lineno="6662">
-<summary>
-Create a /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6640">
 <summary>
 Do not audit attempts to get the attributes
 of the /var/run directory.
@@ -81590,7 +63888,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_runtime_dirs" lineno="6697">
+<interface name="files_mounton_runtime_dirs" lineno="6659">
 <summary>
 mounton a /var/run directory.
 </summary>
@@ -81600,7 +63898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_runtime_dirs" lineno="6715">
+<interface name="files_setattr_runtime_dirs" lineno="6677">
 <summary>
 Set the attributes of the /var/run directory.
 </summary>
@@ -81610,7 +63908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_runtime" lineno="6735">
+<interface name="files_search_runtime" lineno="6697">
 <summary>
 Search the contents of runtime process
 ID directories (/var/run).
@@ -81621,7 +63919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_runtime" lineno="6755">
+<interface name="files_dontaudit_search_runtime" lineno="6717">
 <summary>
 Do not audit attempts to search
 the /var/run directory.
@@ -81632,7 +63930,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_runtime" lineno="6775">
+<interface name="files_list_runtime" lineno="6737">
 <summary>
 List the contents of the runtime process
 ID directories (/var/run).
@@ -81643,7 +63941,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_runtime_dirs" lineno="6794">
+<interface name="files_check_write_runtime_dirs" lineno="6756">
 <summary>
 Check write access on /var/run directories.
 </summary>
@@ -81653,7 +63951,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_runtime_dirs" lineno="6812">
+<interface name="files_create_runtime_dirs" lineno="6774">
 <summary>
 Create a /var/run directory.
 </summary>
@@ -81663,7 +63961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_runtime_dirs" lineno="6830">
+<interface name="files_watch_runtime_dirs" lineno="6792">
 <summary>
 Watch /var/run directories.
 </summary>
@@ -81673,208 +63971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_pids" lineno="6848">
-<summary>
-Read generic process ID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_write_generic_pid_pipes" lineno="6863">
-<summary>
-Write named generic process ID pipes.   (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_pid_filetrans" lineno="6920">
-<summary>
-Create an object in the process ID directory, with a private type.  (Deprecated)
-</summary>
-<desc>
-<p>
-Create an object in the process ID directory (e.g., /var/run)
-with a private type.  Typically this is used for creating
-private PID files in /var/run with the private type instead
-of the general PID file type. To accomplish this goal,
-either the program must be SELinux-aware, or use this interface.
-</p>
-<p>
-Related interfaces:
-</p>
-<ul>
-<li>files_runtime_file()</li>
-</ul>
-<p>
-Example usage with a domain that can create and
-write its PID file with a private PID file type in the
-/var/run directory:
-</p>
-<p>
-type mypidfile_t;
-files_runtime_file(mypidfile_t)
-allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_runtime_filetrans(mydomain_t, mypidfile_t, file)
-</p>
-</desc>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6940">
-<summary>
-Create a generic lock directory within the run directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="files_rw_generic_pids" lineno="6955">
-<summary>
-Read and write generic process ID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6971">
-<summary>
-Do not audit attempts to get the attributes of
-daemon runtime data files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6986">
-<summary>
-Do not audit attempts to write to daemon runtime data files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="7001">
-<summary>
-Do not audit attempts to ioctl daemon runtime data files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_manage_all_pid_dirs" lineno="7017">
-<summary>
-manage all pidfile directories
-in the /var/run directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_read_all_pids" lineno="7033">
-<summary>
-Read all process ID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="files_exec_generic_pid_files" lineno="7048">
-<summary>
-Execute generic programs in /var/run in the caller domain.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_files" lineno="7063">
-<summary>
-Relabel all pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_delete_all_pids" lineno="7079">
-<summary>
-Delete all process IDs.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="files_create_all_pid_sockets" lineno="7098">
-<summary>
-Create all pid sockets.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_create_all_pid_pipes" lineno="7113">
-<summary>
-Create all pid named pipes.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_read_runtime_files" lineno="7128">
+<interface name="files_read_runtime_files" lineno="6810">
 <summary>
 Read generic runtime files.
 </summary>
@@ -81884,7 +63981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_runtime" lineno="7148">
+<interface name="files_exec_runtime" lineno="6830">
 <summary>
 Execute generic programs in /var/run in the caller domain.
 </summary>
@@ -81894,7 +63991,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_runtime_files" lineno="7166">
+<interface name="files_rw_runtime_files" lineno="6848">
 <summary>
 Read and write generic runtime files.
 </summary>
@@ -81904,7 +64001,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_runtime_symlinks" lineno="7186">
+<interface name="files_delete_runtime_symlinks" lineno="6868">
 <summary>
 Delete generic runtime symlinks.
 </summary>
@@ -81914,7 +64011,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_runtime_pipes" lineno="7204">
+<interface name="files_write_runtime_pipes" lineno="6886">
 <summary>
 Write named generic runtime pipes.
 </summary>
@@ -81924,7 +64021,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_dirs" lineno="7224">
+<interface name="files_delete_all_runtime_dirs" lineno="6906">
 <summary>
 Delete all runtime dirs.
 </summary>
@@ -81935,7 +64032,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_dirs" lineno="7242">
+<interface name="files_manage_all_runtime_dirs" lineno="6924">
 <summary>
 Create, read, write, and delete all runtime directories.
 </summary>
@@ -81945,7 +64042,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="7260">
+<interface name="files_relabel_all_runtime_dirs" lineno="6942">
 <summary>
 Relabel all runtime directories.
 </summary>
@@ -81955,7 +64052,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6961">
 <summary>
 Do not audit attempts to get the attributes of
 all runtime data files.
@@ -81966,7 +64063,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_runtime_files" lineno="7300">
+<interface name="files_read_all_runtime_files" lineno="6982">
 <summary>
 Read all runtime files.
 </summary>
@@ -81977,7 +64074,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7003">
 <summary>
 Do not audit attempts to ioctl all runtime files.
 </summary>
@@ -81987,7 +64084,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7341">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7023">
 <summary>
 Do not audit attempts to write to all runtime files.
 </summary>
@@ -81997,7 +64094,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_files" lineno="7362">
+<interface name="files_delete_all_runtime_files" lineno="7044">
 <summary>
 Delete all runtime files.
 </summary>
@@ -82008,7 +64105,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_files" lineno="7381">
+<interface name="files_manage_all_runtime_files" lineno="7063">
 <summary>
 Create, read, write and delete all
 var_run (pid) files
@@ -82019,7 +64116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_files" lineno="7399">
+<interface name="files_relabel_all_runtime_files" lineno="7081">
 <summary>
 Relabel all runtime files.
 </summary>
@@ -82029,7 +64126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7418">
+<interface name="files_delete_all_runtime_symlinks" lineno="7100">
 <summary>
 Delete all runtime symlinks.
 </summary>
@@ -82040,7 +64137,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7437">
+<interface name="files_manage_all_runtime_symlinks" lineno="7119">
 <summary>
 Create, read, write and delete all
 var_run (pid) symbolic links.
@@ -82051,7 +64148,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7455">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7137">
 <summary>
 Relabel all runtime symbolic links.
 </summary>
@@ -82061,7 +64158,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_pipes" lineno="7473">
+<interface name="files_create_all_runtime_pipes" lineno="7155">
 <summary>
 Create all runtime named pipes
 </summary>
@@ -82071,7 +64168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7492">
+<interface name="files_delete_all_runtime_pipes" lineno="7174">
 <summary>
 Delete all runtime named pipes
 </summary>
@@ -82081,7 +64178,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_sockets" lineno="7511">
+<interface name="files_create_all_runtime_sockets" lineno="7193">
 <summary>
 Create all runtime sockets.
 </summary>
@@ -82091,7 +64188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7529">
+<interface name="files_delete_all_runtime_sockets" lineno="7211">
 <summary>
 Delete all runtime sockets.
 </summary>
@@ -82101,7 +64198,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7547">
+<interface name="files_relabel_all_runtime_sockets" lineno="7229">
 <summary>
 Relabel all runtime named sockets.
 </summary>
@@ -82111,7 +64208,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_runtime_filetrans" lineno="7607">
+<interface name="files_runtime_filetrans" lineno="7289">
 <summary>
 Create an object in the /run directory, with a private type.
 </summary>
@@ -82163,7 +64260,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7632">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7314">
 <summary>
 Create a generic lock directory within the run directories.
 </summary>
@@ -82178,7 +64275,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_spool_sockets" lineno="7650">
+<interface name="files_create_all_spool_sockets" lineno="7332">
 <summary>
 Create all spool sockets
 </summary>
@@ -82188,7 +64285,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_spool_sockets" lineno="7668">
+<interface name="files_delete_all_spool_sockets" lineno="7350">
 <summary>
 Delete all spool sockets
 </summary>
@@ -82198,58 +64295,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_pid_dirs" lineno="7686">
-<summary>
-Delete all process ID directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_manage_all_pids" lineno="7702">
-<summary>
-Create, read, write and delete all
-var_run (pid) content  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_dirs" lineno="7719">
-<summary>
-Relabel to/from all var_run (pid) directories  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="7734">
-<summary>
-Relabel to/from all var_run (pid) socket files  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pids" lineno="7749">
-<summary>
-Relabel to/from all var_run (pid) files and directories  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_mounton_all_poly_members" lineno="7767">
+<interface name="files_mounton_all_poly_members" lineno="7369">
 <summary>
 Mount filesystems on all polyinstantiation
 member directories.
@@ -82260,7 +64306,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_spool" lineno="7786">
+<interface name="files_search_spool" lineno="7388">
 <summary>
 Search the contents of generic spool
 directories (/var/spool).
@@ -82271,7 +64317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_spool" lineno="7805">
+<interface name="files_dontaudit_search_spool" lineno="7407">
 <summary>
 Do not audit attempts to search generic
 spool directories.
@@ -82282,7 +64328,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_spool" lineno="7824">
+<interface name="files_list_spool" lineno="7426">
 <summary>
 List the contents of generic spool
 (/var/spool) directories.
@@ -82293,7 +64339,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7843">
+<interface name="files_manage_generic_spool_dirs" lineno="7445">
 <summary>
 Create, read, write, and delete generic
 spool directories (/var/spool).
@@ -82304,7 +64350,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_spool" lineno="7862">
+<interface name="files_read_generic_spool" lineno="7464">
 <summary>
 Read generic spool files.
 </summary>
@@ -82314,7 +64360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool" lineno="7882">
+<interface name="files_manage_generic_spool" lineno="7484">
 <summary>
 Create, read, write, and delete generic
 spool files.
@@ -82325,7 +64371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_spool_filetrans" lineno="7918">
+<interface name="files_spool_filetrans" lineno="7520">
 <summary>
 Create objects in the spool directory
 with a private type with a type transition.
@@ -82352,7 +64398,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_polyinstantiate_all" lineno="7938">
+<interface name="files_polyinstantiate_all" lineno="7540">
 <summary>
 Allow access to manage all polyinstantiated
 directories on the system.
@@ -82363,7 +64409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unconfined" lineno="7992">
+<interface name="files_unconfined" lineno="7594">
 <summary>
 Unconfined access to files.
 </summary>
@@ -82373,7 +64419,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="8014">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7616">
 <summary>
 Create, read, write, and delete symbolic links in
 /etc that are dynamically created on boot.
@@ -82385,7 +64431,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="8032">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7634">
 <summary>
 Do not audit attempts to read etc_runtime resources
 </summary>
@@ -82395,7 +64441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_src" lineno="8050">
+<interface name="files_list_src" lineno="7652">
 <summary>
 List usr/src files
 </summary>
@@ -82405,7 +64451,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_read_src_files" lineno="8068">
+<interface name="files_read_src_files" lineno="7670">
 <summary>
 Read usr/src files
 </summary>
@@ -82415,7 +64461,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_manage_src_files" lineno="8086">
+<interface name="files_manage_src_files" lineno="7688">
 <summary>
 Manage /usr/src files
 </summary>
@@ -82425,7 +64471,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="8117">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7719">
 <summary>
 Create a resource in the generic lib location
 with an automatic type transition towards the kernel modules
@@ -82447,7 +64493,7 @@ Optional name of the resource
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime" lineno="8135">
+<interface name="files_read_etc_runtime" lineno="7737">
 <summary>
 Read etc runtime resources
 </summary>
@@ -82457,7 +64503,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="8157">
+<interface name="files_relabel_all_non_security_file_types" lineno="7759">
 <summary>
 Allow relabel from and to non-security types
 </summary>
@@ -82468,7 +64514,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_non_security_file_types" lineno="8187">
+<interface name="files_manage_all_non_security_file_types" lineno="7789">
 <summary>
 Manage non-security-sensitive resource types
 </summary>
@@ -82479,7 +64525,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_all_pidfiles" lineno="8209">
+<interface name="files_relabel_all_pidfiles" lineno="7811">
 <summary>
 Allow relabeling from and to any pidfile associated type
 </summary>
@@ -82897,7 +64943,37 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mount_cgroup" lineno="672">
+<interface name="fs_mount_bpf" lineno="672">
+<summary>
+Mount a bpf filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_create_bpf_dirs" lineno="690">
+<summary>
+Create bpf directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_bpf_files" lineno="708">
+<summary>
+Manage bpf files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mount_cgroup" lineno="726">
 <summary>
 Mount cgroup filesystems.
 </summary>
@@ -82907,7 +64983,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_cgroup" lineno="690">
+<interface name="fs_remount_cgroup" lineno="744">
 <summary>
 Remount cgroup filesystems.
 </summary>
@@ -82917,7 +64993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_cgroup" lineno="708">
+<interface name="fs_unmount_cgroup" lineno="762">
 <summary>
 Unmount cgroup filesystems.
 </summary>
@@ -82927,7 +65003,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cgroup" lineno="726">
+<interface name="fs_getattr_cgroup" lineno="780">
 <summary>
 Get attributes of cgroup filesystems.
 </summary>
@@ -82937,7 +65013,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_cgroup_dirs" lineno="744">
+<interface name="fs_search_cgroup_dirs" lineno="798">
 <summary>
 Search cgroup directories.
 </summary>
@@ -82947,7 +65023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_cgroup_dirs" lineno="764">
+<interface name="fs_list_cgroup_dirs" lineno="818">
 <summary>
 list cgroup directories.
 </summary>
@@ -82957,7 +65033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_ioctl_cgroup_dirs" lineno="783">
+<interface name="fs_ioctl_cgroup_dirs" lineno="837">
 <summary>
 Ioctl cgroup directories.
 </summary>
@@ -82967,7 +65043,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_cgroup_dirs" lineno="802">
+<interface name="fs_delete_cgroup_dirs" lineno="856">
 <summary>
 Delete cgroup directories.
 </summary>
@@ -82977,7 +65053,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_dirs" lineno="821">
+<interface name="fs_manage_cgroup_dirs" lineno="875">
 <summary>
 Manage cgroup directories.
 </summary>
@@ -82987,7 +65063,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="841">
+<interface name="fs_relabel_cgroup_dirs" lineno="895">
 <summary>
 Relabel cgroup directories.
 </summary>
@@ -82997,7 +65073,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cgroup_files" lineno="859">
+<interface name="fs_getattr_cgroup_files" lineno="913">
 <summary>
 Get attributes of cgroup files.
 </summary>
@@ -83007,7 +65083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cgroup_files" lineno="879">
+<interface name="fs_read_cgroup_files" lineno="933">
 <summary>
 Read cgroup files.
 </summary>
@@ -83017,7 +65093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_watch_cgroup_files" lineno="900">
+<interface name="fs_watch_cgroup_files" lineno="954">
 <summary>
 Watch cgroup files.
 </summary>
@@ -83027,7 +65103,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_create_cgroup_links" lineno="919">
+<interface name="fs_create_cgroup_links" lineno="973">
 <summary>
 Create cgroup lnk_files.
 </summary>
@@ -83037,7 +65113,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_cgroup_files" lineno="939">
+<interface name="fs_write_cgroup_files" lineno="993">
 <summary>
 Write cgroup files.
 </summary>
@@ -83047,7 +65123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_cgroup_files" lineno="958">
+<interface name="fs_rw_cgroup_files" lineno="1012">
 <summary>
 Read and write cgroup files.
 </summary>
@@ -83057,7 +65133,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="980">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="1034">
 <summary>
 Do not audit attempts to open,
 get attributes, read and write
@@ -83069,7 +65145,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cgroup_files" lineno="998">
+<interface name="fs_manage_cgroup_files" lineno="1052">
 <summary>
 Manage cgroup files.
 </summary>
@@ -83079,7 +65155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="1018">
+<interface name="fs_relabel_cgroup_symlinks" lineno="1072">
 <summary>
 Relabel cgroup symbolic links.
 </summary>
@@ -83089,7 +65165,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cgroup" lineno="1036">
+<interface name="fs_watch_cgroup_dirs" lineno="1090">
+<summary>
+Watch cgroup directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mounton_cgroup" lineno="1108">
 <summary>
 Mount on cgroup directories.
 </summary>
@@ -83099,7 +65185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cgroup_filetrans" lineno="1070">
+<interface name="fs_cgroup_filetrans" lineno="1142">
 <summary>
 Create an object in a cgroup tmpfs filesystem, with a private
 type using a type transition.
@@ -83125,7 +65211,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1163">
 <summary>
 Do not audit attempts to read
 dirs on a CIFS or SMB filesystem.
@@ -83136,7 +65222,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_cifs" lineno="1109">
+<interface name="fs_mount_cifs" lineno="1181">
 <summary>
 Mount a CIFS or SMB network filesystem.
 </summary>
@@ -83146,7 +65232,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_cifs" lineno="1128">
+<interface name="fs_remount_cifs" lineno="1200">
 <summary>
 Remount a CIFS or SMB network filesystem.
 This allows some mount options to be changed.
@@ -83157,7 +65243,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_cifs" lineno="1146">
+<interface name="fs_unmount_cifs" lineno="1218">
 <summary>
 Unmount a CIFS or SMB network filesystem.
 </summary>
@@ -83167,7 +65253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_cifs" lineno="1166">
+<interface name="fs_getattr_cifs" lineno="1238">
 <summary>
 Get the attributes of a CIFS or
 SMB network filesystem.
@@ -83179,7 +65265,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_cifs" lineno="1184">
+<interface name="fs_search_cifs" lineno="1256">
 <summary>
 Search directories on a CIFS or SMB filesystem.
 </summary>
@@ -83189,7 +65275,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_cifs" lineno="1203">
+<interface name="fs_list_cifs" lineno="1275">
 <summary>
 List the contents of directories on a
 CIFS or SMB filesystem.
@@ -83200,7 +65286,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1222">
+<interface name="fs_dontaudit_list_cifs" lineno="1294">
 <summary>
 Do not audit attempts to list the contents
 of directories on a CIFS or SMB filesystem.
@@ -83211,7 +65297,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_cifs" lineno="1240">
+<interface name="fs_mounton_cifs" lineno="1312">
 <summary>
 Mounton a CIFS filesystem.
 </summary>
@@ -83221,7 +65307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_files" lineno="1259">
+<interface name="fs_read_cifs_files" lineno="1331">
 <summary>
 Read files on a CIFS or SMB filesystem.
 </summary>
@@ -83232,7 +65318,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_read_all_inherited_image_files" lineno="1279">
+<interface name="fs_read_all_inherited_image_files" lineno="1351">
 <summary>
 Read all inherited filesystem image files.
 </summary>
@@ -83243,7 +65329,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_read_all_image_files" lineno="1298">
+<interface name="fs_read_all_image_files" lineno="1370">
 <summary>
 Read all filesystem image files.
 </summary>
@@ -83254,7 +65340,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_read_all_image_files" lineno="1317">
+<interface name="fs_mmap_read_all_image_files" lineno="1389">
 <summary>
 Mmap-read all filesystem image files.
 </summary>
@@ -83265,7 +65351,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_rw_all_image_files" lineno="1336">
+<interface name="fs_rw_all_image_files" lineno="1408">
 <summary>
 Read and write all filesystem image files.
 </summary>
@@ -83276,7 +65362,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_rw_all_image_files" lineno="1355">
+<interface name="fs_mmap_rw_all_image_files" lineno="1427">
 <summary>
 Mmap-Read-write all filesystem image files.
 </summary>
@@ -83287,7 +65373,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_write_all_image_files" lineno="1374">
+<interface name="fs_dontaudit_write_all_image_files" lineno="1446">
 <summary>
 Do not audit attempts to write all filesystem image files.
 </summary>
@@ -83298,7 +65384,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1394">
+<interface name="fs_getattr_noxattr_fs" lineno="1466">
 <summary>
 Get the attributes of filesystems that
 do not have extended attribute support.
@@ -83310,7 +65396,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_list_noxattr_fs" lineno="1412">
+<interface name="fs_list_noxattr_fs" lineno="1484">
 <summary>
 Read all noxattrfs directories.
 </summary>
@@ -83320,7 +65406,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1503">
 <summary>
 Do not audit attempts to list all
 noxattrfs directories.
@@ -83331,7 +65417,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1449">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1521">
 <summary>
 Create, read, write, and delete all noxattrfs directories.
 </summary>
@@ -83341,7 +65427,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1467">
+<interface name="fs_read_noxattr_fs_files" lineno="1539">
 <summary>
 Read all noxattrfs files.
 </summary>
@@ -83351,7 +65437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1559">
 <summary>
 Do not audit attempts to read all
 noxattrfs files.
@@ -83362,7 +65448,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1577">
 <summary>
 Dont audit attempts to write to noxattrfs files.
 </summary>
@@ -83372,7 +65458,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1523">
+<interface name="fs_manage_noxattr_fs_files" lineno="1595">
 <summary>
 Create, read, write, and delete all noxattrfs files.
 </summary>
@@ -83382,7 +65468,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1542">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1614">
 <summary>
 Read all noxattrfs symbolic links.
 </summary>
@@ -83392,7 +65478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1633">
 <summary>
 Manage all noxattrfs symbolic links.
 </summary>
@@ -83402,7 +65488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1581">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1653">
 <summary>
 Relabel all objects from filesystems that
 do not support extended attributes.
@@ -83413,7 +65499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1607">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1679">
 <summary>
 Do not audit attempts to read
 files on a CIFS or SMB filesystem.
@@ -83424,7 +65510,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_append_cifs_files" lineno="1627">
+<interface name="fs_append_cifs_files" lineno="1699">
 <summary>
 Append files
 on a CIFS filesystem.
@@ -83436,7 +65522,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1647">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1719">
 <summary>
 dontaudit Append files
 on a CIFS filesystem.
@@ -83448,7 +65534,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1666">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1738">
 <summary>
 Do not audit attempts to read or
 write files on a CIFS or SMB filesystem.
@@ -83459,7 +65545,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_symlinks" lineno="1684">
+<interface name="fs_read_cifs_symlinks" lineno="1756">
 <summary>
 Read symbolic links on a CIFS or SMB filesystem.
 </summary>
@@ -83469,7 +65555,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1704">
+<interface name="fs_read_cifs_named_pipes" lineno="1776">
 <summary>
 Read named pipes
 on a CIFS or SMB network filesystem.
@@ -83480,7 +65566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1723">
+<interface name="fs_read_cifs_named_sockets" lineno="1795">
 <summary>
 Read named sockets
 on a CIFS or SMB network filesystem.
@@ -83491,7 +65577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_cifs_files" lineno="1744">
+<interface name="fs_exec_cifs_files" lineno="1816">
 <summary>
 Execute files on a CIFS or SMB
 network filesystem, in the caller
@@ -83504,7 +65590,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_cifs_dirs" lineno="1765">
+<interface name="fs_manage_cifs_dirs" lineno="1837">
 <summary>
 Create, read, write, and delete directories
 on a CIFS or SMB network filesystem.
@@ -83516,7 +65602,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1857">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -83528,7 +65614,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_files" lineno="1805">
+<interface name="fs_manage_cifs_files" lineno="1877">
 <summary>
 Create, read, write, and delete files
 on a CIFS or SMB network filesystem.
@@ -83540,7 +65626,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1825">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1897">
 <summary>
 Do not audit attempts to create, read,
 write, and delete files
@@ -83552,7 +65638,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1844">
+<interface name="fs_manage_cifs_symlinks" lineno="1916">
 <summary>
 Create, read, write, and delete symbolic links
 on a CIFS or SMB network filesystem.
@@ -83563,7 +65649,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1863">
+<interface name="fs_manage_cifs_named_pipes" lineno="1935">
 <summary>
 Create, read, write, and delete named pipes
 on a CIFS or SMB network filesystem.
@@ -83574,7 +65660,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1882">
+<interface name="fs_manage_cifs_named_sockets" lineno="1954">
 <summary>
 Create, read, write, and delete named sockets
 on a CIFS or SMB network filesystem.
@@ -83585,7 +65671,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_cifs_domtrans" lineno="1925">
+<interface name="fs_cifs_domtrans" lineno="1997">
 <summary>
 Execute a file on a CIFS or SMB filesystem
 in the specified domain.
@@ -83620,7 +65706,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_dirs" lineno="1945">
+<interface name="fs_manage_configfs_dirs" lineno="2017">
 <summary>
 Create, read, write, and delete dirs
 on a configfs filesystem.
@@ -83631,7 +65717,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_configfs_files" lineno="1964">
+<interface name="fs_manage_configfs_files" lineno="2036">
 <summary>
 Create, read, write, and delete files
 on a configfs filesystem.
@@ -83642,7 +65728,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_dos_fs" lineno="1983">
+<interface name="fs_mount_dos_fs" lineno="2055">
 <summary>
 Mount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -83653,7 +65739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_dos_fs" lineno="2003">
+<interface name="fs_remount_dos_fs" lineno="2075">
 <summary>
 Remount a DOS filesystem, such as
 FAT32 or NTFS.  This allows
@@ -83665,7 +65751,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_dos_fs" lineno="2022">
+<interface name="fs_unmount_dos_fs" lineno="2094">
 <summary>
 Unmount a DOS filesystem, such as
 FAT32 or NTFS.
@@ -83676,7 +65762,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_fs" lineno="2042">
+<interface name="fs_getattr_dos_fs" lineno="2114">
 <summary>
 Get the attributes of a DOS
 filesystem, such as FAT32 or NTFS.
@@ -83688,7 +65774,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="2061">
+<interface name="fs_relabelfrom_dos_fs" lineno="2133">
 <summary>
 Allow changing of the label of a
 DOS filesystem using the context= mount option.
@@ -83699,7 +65785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_dos_dirs" lineno="2079">
+<interface name="fs_getattr_dos_dirs" lineno="2151">
 <summary>
 Get attributes of directories on a dosfs filesystem.
 </summary>
@@ -83709,7 +65795,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_dos" lineno="2097">
+<interface name="fs_search_dos" lineno="2169">
 <summary>
 Search dosfs filesystem.
 </summary>
@@ -83719,7 +65805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_dos" lineno="2115">
+<interface name="fs_list_dos" lineno="2187">
 <summary>
 List dirs DOS filesystem.
 </summary>
@@ -83729,7 +65815,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_dirs" lineno="2134">
+<interface name="fs_manage_dos_dirs" lineno="2206">
 <summary>
 Create, read, write, and delete dirs
 on a DOS filesystem.
@@ -83740,7 +65826,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_dos_files" lineno="2152">
+<interface name="fs_read_dos_files" lineno="2224">
 <summary>
 Read files on a DOS filesystem.
 </summary>
@@ -83750,7 +65836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mmap_read_dos_files" lineno="2170">
+<interface name="fs_mmap_read_dos_files" lineno="2242">
 <summary>
 Read and map files on a DOS filesystem.
 </summary>
@@ -83760,7 +65846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_dos_files" lineno="2190">
+<interface name="fs_manage_dos_files" lineno="2262">
 <summary>
 Create, read, write, and delete files
 on a DOS filesystem.
@@ -83771,7 +65857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_ecryptfs" lineno="2208">
+<interface name="fs_list_ecryptfs" lineno="2280">
 <summary>
 Read symbolic links on an eCryptfs filesystem.
 </summary>
@@ -83781,7 +65867,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ecryptfs_dirs" lineno="2229">
+<interface name="fs_manage_ecryptfs_dirs" lineno="2301">
 <summary>
 Create, read, write, and delete directories
 on an eCryptfs filesystem.
@@ -83793,7 +65879,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_ecryptfs_files" lineno="2249">
+<interface name="fs_manage_ecryptfs_files" lineno="2321">
 <summary>
 Create, read, write, and delete files
 on an eCryptfs filesystem.
@@ -83805,7 +65891,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268">
+<interface name="fs_manage_ecryptfs_named_sockets" lineno="2340">
 <summary>
 Create, read, write, and delete named sockets
 on an eCryptfs filesystem.
@@ -83816,7 +65902,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_efivarfs" lineno="2286">
+<interface name="fs_getattr_efivarfs" lineno="2358">
 <summary>
 Get the attributes of efivarfs filesystems.
 </summary>
@@ -83826,7 +65912,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_efivars" lineno="2304">
+<interface name="fs_list_efivars" lineno="2376">
 <summary>
 List dirs in efivarfs filesystem.
 </summary>
@@ -83836,7 +65922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_efivarfs_files" lineno="2324">
+<interface name="fs_read_efivarfs_files" lineno="2396">
 <summary>
 Read files in efivarfs
 - contains Linux Kernel configuration options for UEFI systems
@@ -83848,7 +65934,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_efivarfs_files" lineno="2344">
+<interface name="fs_manage_efivarfs_files" lineno="2416">
 <summary>
 Create, read, write, and delete files
 on a efivarfs filesystem.
@@ -83860,7 +65946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_fusefs" lineno="2362">
+<interface name="fs_getattr_fusefs" lineno="2434">
 <summary>
 stat a FUSE filesystem
 </summary>
@@ -83870,7 +65956,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_fusefs" lineno="2380">
+<interface name="fs_mount_fusefs" lineno="2452">
 <summary>
 Mount a FUSE filesystem.
 </summary>
@@ -83880,7 +65966,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_fusefs" lineno="2398">
+<interface name="fs_unmount_fusefs" lineno="2470">
 <summary>
 Unmount a FUSE filesystem.
 </summary>
@@ -83890,7 +65976,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_fusefs" lineno="2416">
+<interface name="fs_remount_fusefs" lineno="2488">
 <summary>
 Remount a FUSE filesystem.
 </summary>
@@ -83900,7 +65986,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_fusefs" lineno="2434">
+<interface name="fs_mounton_fusefs" lineno="2506">
 <summary>
 Mounton a FUSEFS filesystem.
 </summary>
@@ -83910,7 +65996,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_fusefs_entry_type" lineno="2453">
+<interface name="fs_fusefs_entry_type" lineno="2525">
 <summary>
 Make FUSEFS files an entrypoint for the
 specified domain.
@@ -83921,7 +66007,7 @@ The domain for which fusefs_t is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="fs_fusefs_domtrans" lineno="2486">
+<interface name="fs_fusefs_domtrans" lineno="2558">
 <summary>
 Execute FUSEFS files in a specified domain.
 </summary>
@@ -83946,7 +66032,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_fusefs" lineno="2506">
+<interface name="fs_search_fusefs" lineno="2578">
 <summary>
 Search directories
 on a FUSEFS filesystem.
@@ -83958,7 +66044,19 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2525">
+<interface name="fs_list_fusefs" lineno="2598">
+<summary>
+List the contents of directories
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_dontaudit_list_fusefs" lineno="2617">
 <summary>
 Do not audit attempts to list the contents
 of directories on a FUSEFS filesystem.
@@ -83969,7 +66067,19 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2545">
+<interface name="fs_setattr_fusefs_dirs" lineno="2637">
+<summary>
+Set the attributes of directories
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_dirs" lineno="2657">
 <summary>
 Create, read, write, and delete directories
 on a FUSEFS filesystem.
@@ -83981,7 +66091,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2677">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -83993,7 +66103,19 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_files" lineno="2584">
+<interface name="fs_getattr_fusefs_files" lineno="2697">
+<summary>
+Get the attributes of files on a
+FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_fusefs_files" lineno="2716">
 <summary>
 Read, a FUSEFS filesystem.
 </summary>
@@ -84004,7 +66126,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_exec_fusefs_files" lineno="2603">
+<interface name="fs_exec_fusefs_files" lineno="2735">
 <summary>
 Execute files on a FUSEFS filesystem.
 </summary>
@@ -84015,7 +66137,19 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_fusefs_files" lineno="2623">
+<interface name="fs_setattr_fusefs_files" lineno="2755">
+<summary>
+Set the attributes of files on a
+FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_files" lineno="2775">
 <summary>
 Create, read, write, and delete files
 on a FUSEFS filesystem.
@@ -84027,7 +66161,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2795">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -84039,7 +66173,19 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2661">
+<interface name="fs_getattr_fusefs_symlinks" lineno="2815">
+<summary>
+Get the attributes of symlinks
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_fusefs_symlinks" lineno="2833">
 <summary>
 Read symbolic links on a FUSEFS filesystem.
 </summary>
@@ -84049,7 +66195,19 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_fusefs_symlinks" lineno="2681">
+<interface name="fs_setattr_fusefs_symlinks" lineno="2854">
+<summary>
+Set the attributes of symlinks
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_symlinks" lineno="2873">
 <summary>
 Manage symlinks on a FUSEFS filesystem.
 </summary>
@@ -84060,7 +66218,115 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2700">
+<interface name="fs_getattr_fusefs_fifo_files" lineno="2893">
+<summary>
+Get the attributes of named pipes
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_fifo_files" lineno="2913">
+<summary>
+Set the attributes of named pipes
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_fifo_files" lineno="2933">
+<summary>
+Manage named pipes on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_fusefs_sock_files" lineno="2953">
+<summary>
+Get the attributes of named sockets
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_sock_files" lineno="2973">
+<summary>
+Set the attributes of named sockets
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_sock_files" lineno="2993">
+<summary>
+Manage named sockets on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_fusefs_chr_files" lineno="3013">
+<summary>
+Get the attributes of character files
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_chr_files" lineno="3033">
+<summary>
+Set the attributes of character files
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_chr_files" lineno="3053">
+<summary>
+Manage character files on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_hugetlbfs" lineno="3072">
 <summary>
 Get the attributes of an hugetlbfs
 filesystem.
@@ -84071,7 +66337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_hugetlbfs" lineno="2718">
+<interface name="fs_list_hugetlbfs" lineno="3090">
 <summary>
 List hugetlbfs.
 </summary>
@@ -84081,7 +66347,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2736">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="3108">
 <summary>
 Manage hugetlbfs dirs.
 </summary>
@@ -84091,7 +66357,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3126">
 <summary>
 Read and write inherited hugetlbfs files.
 </summary>
@@ -84101,7 +66367,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2772">
+<interface name="fs_rw_hugetlbfs_files" lineno="3144">
 <summary>
 Read and write hugetlbfs files.
 </summary>
@@ -84111,7 +66377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3162">
 <summary>
 Read, map and write hugetlbfs files.
 </summary>
@@ -84121,7 +66387,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_hugetlbfs" lineno="2809">
+<interface name="fs_associate_hugetlbfs" lineno="3181">
 <summary>
 Allow the type to associate to hugetlbfs filesystems.
 </summary>
@@ -84131,7 +66397,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_inotifyfs" lineno="2827">
+<interface name="fs_search_inotifyfs" lineno="3199">
 <summary>
 Search inotifyfs filesystem.
 </summary>
@@ -84141,7 +66407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_inotifyfs" lineno="2845">
+<interface name="fs_list_inotifyfs" lineno="3217">
 <summary>
 List inotifyfs filesystem.
 </summary>
@@ -84151,7 +66417,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2863">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="3235">
 <summary>
 Dontaudit List inotifyfs filesystem.
 </summary>
@@ -84161,7 +66427,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2897">
+<interface name="fs_hugetlbfs_filetrans" lineno="3269">
 <summary>
 Create an object in a hugetlbfs filesystem, with a private
 type using a type transition.
@@ -84187,7 +66453,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_iso9660_fs" lineno="2917">
+<interface name="fs_mount_iso9660_fs" lineno="3289">
 <summary>
 Mount an iso9660 filesystem, which
 is usually used on CDs.
@@ -84198,7 +66464,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_iso9660_fs" lineno="2937">
+<interface name="fs_remount_iso9660_fs" lineno="3309">
 <summary>
 Remount an iso9660 filesystem, which
 is usually used on CDs.  This allows
@@ -84210,7 +66476,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2956">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="3328">
 <summary>
 Allow changing of the label of a
 filesystem with iso9660 type
@@ -84221,7 +66487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2975">
+<interface name="fs_unmount_iso9660_fs" lineno="3347">
 <summary>
 Unmount an iso9660 filesystem, which
 is usually used on CDs.
@@ -84232,7 +66498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2995">
+<interface name="fs_getattr_iso9660_fs" lineno="3367">
 <summary>
 Get the attributes of an iso9660
 filesystem, which is usually used on CDs.
@@ -84244,7 +66510,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_iso9660_files" lineno="3014">
+<interface name="fs_getattr_iso9660_files" lineno="3386">
 <summary>
 Get the attributes of files on an iso9660
 filesystem, which is usually used on CDs.
@@ -84255,7 +66521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_iso9660_files" lineno="3034">
+<interface name="fs_read_iso9660_files" lineno="3406">
 <summary>
 Read files on an iso9660 filesystem, which
 is usually used on CDs.
@@ -84266,7 +66532,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfs" lineno="3054">
+<interface name="fs_mount_nfs" lineno="3426">
 <summary>
 Mount a NFS filesystem.
 </summary>
@@ -84276,7 +66542,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfs" lineno="3073">
+<interface name="fs_remount_nfs" lineno="3445">
 <summary>
 Remount a NFS filesystem.  This allows
 some mount options to be changed.
@@ -84287,7 +66553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfs" lineno="3091">
+<interface name="fs_unmount_nfs" lineno="3463">
 <summary>
 Unmount a NFS filesystem.
 </summary>
@@ -84297,7 +66563,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfs" lineno="3110">
+<interface name="fs_getattr_nfs" lineno="3482">
 <summary>
 Get the attributes of a NFS filesystem.
 </summary>
@@ -84308,7 +66574,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_search_nfs" lineno="3128">
+<interface name="fs_search_nfs" lineno="3500">
 <summary>
 Search directories on a NFS filesystem.
 </summary>
@@ -84318,7 +66584,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfs" lineno="3146">
+<interface name="fs_list_nfs" lineno="3518">
 <summary>
 List NFS filesystem.
 </summary>
@@ -84328,7 +66594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_nfs" lineno="3165">
+<interface name="fs_dontaudit_list_nfs" lineno="3537">
 <summary>
 Do not audit attempts to list the contents
 of directories on a NFS filesystem.
@@ -84339,7 +66605,18 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_nfs" lineno="3183">
+<interface name="fs_watch_nfs_dirs" lineno="3556">
+<summary>
+Add a watch on directories on an NFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mounton_nfs" lineno="3574">
 <summary>
 Mounton a NFS filesystem.
 </summary>
@@ -84349,7 +66626,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_files" lineno="3202">
+<interface name="fs_read_nfs_files" lineno="3593">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -84360,7 +66637,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="3222">
+<interface name="fs_dontaudit_read_nfs_files" lineno="3613">
 <summary>
 Do not audit attempts to read
 files on a NFS filesystem.
@@ -84371,7 +66648,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_nfs_files" lineno="3240">
+<interface name="fs_write_nfs_files" lineno="3631">
 <summary>
 Read files on a NFS filesystem.
 </summary>
@@ -84381,7 +66658,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_exec_nfs_files" lineno="3260">
+<interface name="fs_exec_nfs_files" lineno="3651">
 <summary>
 Execute files on a NFS filesystem.
 </summary>
@@ -84392,7 +66669,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_append_nfs_files" lineno="3281">
+<interface name="fs_append_nfs_files" lineno="3672">
 <summary>
 Append files
 on a NFS filesystem.
@@ -84404,7 +66681,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="3301">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3692">
 <summary>
 dontaudit Append files
 on a NFS filesystem.
@@ -84416,7 +66693,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="3320">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3711">
 <summary>
 Do not audit attempts to read or
 write files on a NFS filesystem.
@@ -84427,7 +66704,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_symlinks" lineno="3338">
+<interface name="fs_watch_nfs_files" lineno="3729">
+<summary>
+Add a watch on files on an NFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_nfs_symlinks" lineno="3747">
 <summary>
 Read symbolic links on a NFS filesystem.
 </summary>
@@ -84437,7 +66724,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3766">
 <summary>
 Dontaudit read symbolic links on a NFS filesystem.
 </summary>
@@ -84447,7 +66734,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_sockets" lineno="3375">
+<interface name="fs_read_nfs_named_sockets" lineno="3784">
 <summary>
 Read named sockets on a NFS filesystem.
 </summary>
@@ -84457,7 +66744,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nfs_named_pipes" lineno="3394">
+<interface name="fs_read_nfs_named_pipes" lineno="3803">
 <summary>
 Read named pipes on a NFS network filesystem.
 </summary>
@@ -84468,7 +66755,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3413">
+<interface name="fs_getattr_rpc_dirs" lineno="3822">
 <summary>
 Get the attributes of directories of RPC
 file system pipes.
@@ -84479,7 +66766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_rpc" lineno="3432">
+<interface name="fs_search_rpc" lineno="3841">
 <summary>
 Search directories of RPC file system pipes.
 </summary>
@@ -84489,7 +66776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_removable" lineno="3450">
+<interface name="fs_search_removable" lineno="3859">
 <summary>
 Search removable storage directories.
 </summary>
@@ -84499,7 +66786,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_removable" lineno="3468">
+<interface name="fs_dontaudit_list_removable" lineno="3877">
 <summary>
 Do not audit attempts to list removable storage directories.
 </summary>
@@ -84509,7 +66796,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_files" lineno="3486">
+<interface name="fs_read_removable_files" lineno="3895">
 <summary>
 Read removable storage files.
 </summary>
@@ -84519,7 +66806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3504">
+<interface name="fs_dontaudit_read_removable_files" lineno="3913">
 <summary>
 Do not audit attempts to read removable storage files.
 </summary>
@@ -84529,7 +66816,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3522">
+<interface name="fs_dontaudit_write_removable_files" lineno="3931">
 <summary>
 Do not audit attempts to write removable storage files.
 </summary>
@@ -84539,7 +66826,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_symlinks" lineno="3540">
+<interface name="fs_read_removable_symlinks" lineno="3949">
 <summary>
 Read removable storage symbolic links.
 </summary>
@@ -84549,7 +66836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_removable_blk_files" lineno="3558">
+<interface name="fs_read_removable_blk_files" lineno="3967">
 <summary>
 Read block nodes on removable filesystems.
 </summary>
@@ -84559,7 +66846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_removable_blk_files" lineno="3577">
+<interface name="fs_rw_removable_blk_files" lineno="3986">
 <summary>
 Read and write block nodes on removable filesystems.
 </summary>
@@ -84569,7 +66856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_rpc" lineno="3596">
+<interface name="fs_list_rpc" lineno="4005">
 <summary>
 Read directories of RPC file system pipes.
 </summary>
@@ -84579,7 +66866,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_files" lineno="3614">
+<interface name="fs_read_rpc_files" lineno="4023">
 <summary>
 Read files of RPC file system pipes.
 </summary>
@@ -84589,7 +66876,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_symlinks" lineno="3632">
+<interface name="fs_read_rpc_symlinks" lineno="4041">
 <summary>
 Read symbolic links of RPC file system pipes.
 </summary>
@@ -84599,7 +66886,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_rpc_sockets" lineno="3650">
+<interface name="fs_read_rpc_sockets" lineno="4059">
 <summary>
 Read sockets of RPC file system pipes.
 </summary>
@@ -84609,7 +66896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_sockets" lineno="3668">
+<interface name="fs_rw_rpc_sockets" lineno="4077">
 <summary>
 Read and write sockets of RPC file system pipes.
 </summary>
@@ -84619,7 +66906,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_dirs" lineno="3688">
+<interface name="fs_manage_nfs_dirs" lineno="4097">
 <summary>
 Create, read, write, and delete directories
 on a NFS filesystem.
@@ -84631,7 +66918,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4117">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -84643,7 +66930,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_files" lineno="3728">
+<interface name="fs_manage_nfs_files" lineno="4137">
 <summary>
 Create, read, write, and delete files
 on a NFS filesystem.
@@ -84655,7 +66942,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3748">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="4157">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -84667,7 +66954,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3768">
+<interface name="fs_manage_nfs_symlinks" lineno="4177">
 <summary>
 Create, read, write, and delete symbolic links
 on a NFS network filesystem.
@@ -84679,7 +66966,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3787">
+<interface name="fs_manage_nfs_named_pipes" lineno="4196">
 <summary>
 Create, read, write, and delete named pipes
 on a NFS filesystem.
@@ -84690,7 +66977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3806">
+<interface name="fs_manage_nfs_named_sockets" lineno="4215">
 <summary>
 Create, read, write, and delete named sockets
 on a NFS filesystem.
@@ -84701,7 +66988,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_nfs_domtrans" lineno="3849">
+<interface name="fs_nfs_domtrans" lineno="4258">
 <summary>
 Execute a file on a NFS filesystem
 in the specified domain.
@@ -84736,7 +67023,7 @@ The type of the new process.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_nfsd_fs" lineno="3868">
+<interface name="fs_mount_nfsd_fs" lineno="4277">
 <summary>
 Mount a NFS server pseudo filesystem.
 </summary>
@@ -84746,7 +67033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_nfsd_fs" lineno="3887">
+<interface name="fs_remount_nfsd_fs" lineno="4296">
 <summary>
 Mount a NFS server pseudo filesystem.
 This allows some mount options to be changed.
@@ -84757,7 +67044,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3905">
+<interface name="fs_unmount_nfsd_fs" lineno="4314">
 <summary>
 Unmount a NFS server pseudo filesystem.
 </summary>
@@ -84767,7 +67054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3924">
+<interface name="fs_getattr_nfsd_fs" lineno="4333">
 <summary>
 Get the attributes of a NFS server
 pseudo filesystem.
@@ -84778,7 +67065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_nfsd_fs" lineno="3942">
+<interface name="fs_search_nfsd_fs" lineno="4351">
 <summary>
 Search NFS server directories.
 </summary>
@@ -84788,7 +67075,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_nfsd_fs" lineno="3960">
+<interface name="fs_list_nfsd_fs" lineno="4369">
 <summary>
 List NFS server directories.
 </summary>
@@ -84798,7 +67085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_watch_nfsd_dirs" lineno="3978">
+<interface name="fs_watch_nfsd_dirs" lineno="4387">
 <summary>
 Watch NFS server directories.
 </summary>
@@ -84808,7 +67095,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nfsd_files" lineno="3996">
+<interface name="fs_getattr_nfsd_files" lineno="4405">
 <summary>
 Getattr files on an nfsd filesystem
 </summary>
@@ -84818,7 +67105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_nfsd_fs" lineno="4014">
+<interface name="fs_rw_nfsd_fs" lineno="4423">
 <summary>
 Read and write NFS server files.
 </summary>
@@ -84828,7 +67115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nsfs_files" lineno="4032">
+<interface name="fs_getattr_nsfs_files" lineno="4441">
 <summary>
 Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
 </summary>
@@ -84838,7 +67125,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_nsfs_files" lineno="4050">
+<interface name="fs_read_nsfs_files" lineno="4459">
 <summary>
 Read nsfs inodes (e.g. /proc/pid/ns/uts)
 </summary>
@@ -84848,7 +67135,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_nsfs" lineno="4068">
+<interface name="fs_watch_nfsd_files" lineno="4477">
+<summary>
+Watch NFS server files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_nsfs" lineno="4495">
 <summary>
 Get the attributes of an nsfs filesystem.
 </summary>
@@ -84858,7 +67155,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_nsfs" lineno="4086">
+<interface name="fs_unmount_nsfs" lineno="4513">
 <summary>
 Unmount an nsfs filesystem.
 </summary>
@@ -84868,7 +67165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstorefs" lineno="4104">
+<interface name="fs_getattr_pstorefs" lineno="4531">
 <summary>
 Get the attributes of a pstore filesystem.
 </summary>
@@ -84878,7 +67175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_pstore_dirs" lineno="4123">
+<interface name="fs_getattr_pstore_dirs" lineno="4550">
 <summary>
 Get the attributes of directories
 of a pstore filesystem.
@@ -84889,7 +67186,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_create_pstore_dirs" lineno="4142">
+<interface name="fs_create_pstore_dirs" lineno="4569">
 <summary>
 Create pstore directories.
 </summary>
@@ -84899,7 +67196,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_pstore_dirs" lineno="4161">
+<interface name="fs_relabel_pstore_dirs" lineno="4588">
 <summary>
 Relabel to/from pstore_t directories.
 </summary>
@@ -84909,7 +67206,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_pstore_dirs" lineno="4180">
+<interface name="fs_list_pstore_dirs" lineno="4607">
 <summary>
 List the directories
 of a pstore filesystem.
@@ -84920,7 +67217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_pstore_files" lineno="4199">
+<interface name="fs_read_pstore_files" lineno="4626">
 <summary>
 Read pstore_t files
 </summary>
@@ -84930,7 +67227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_pstore_files" lineno="4218">
+<interface name="fs_delete_pstore_files" lineno="4645">
 <summary>
 Delete the files
 of a pstore filesystem.
@@ -84941,7 +67238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_associate_ramfs" lineno="4237">
+<interface name="fs_associate_ramfs" lineno="4664">
 <summary>
 Allow the type to associate to ramfs filesystems.
 </summary>
@@ -84951,7 +67248,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_ramfs" lineno="4255">
+<interface name="fs_mount_ramfs" lineno="4682">
 <summary>
 Mount a RAM filesystem.
 </summary>
@@ -84961,7 +67258,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_ramfs" lineno="4274">
+<interface name="fs_remount_ramfs" lineno="4701">
 <summary>
 Remount a RAM filesystem.  This allows
 some mount options to be changed.
@@ -84972,7 +67269,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_ramfs" lineno="4292">
+<interface name="fs_unmount_ramfs" lineno="4719">
 <summary>
 Unmount a RAM filesystem.
 </summary>
@@ -84982,7 +67279,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_ramfs" lineno="4310">
+<interface name="fs_getattr_ramfs" lineno="4737">
 <summary>
 Get the attributes of a RAM filesystem.
 </summary>
@@ -84992,7 +67289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_ramfs" lineno="4328">
+<interface name="fs_search_ramfs" lineno="4755">
 <summary>
 Search directories on a ramfs
 </summary>
@@ -85002,7 +67299,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="4346">
+<interface name="fs_dontaudit_search_ramfs" lineno="4773">
 <summary>
 Dontaudit Search directories on a ramfs
 </summary>
@@ -85012,7 +67309,18 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_dirs" lineno="4365">
+<interface name="fs_setattr_ramfs_dirs" lineno="4792">
+<summary>
+Set the attributes of directories on
+a ramfs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_ramfs_dirs" lineno="4811">
 <summary>
 Create, read, write, and delete
 directories on a ramfs.
@@ -85023,7 +67331,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="4383">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4829">
 <summary>
 Dontaudit read on a ramfs files.
 </summary>
@@ -85033,7 +67341,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4847">
 <summary>
 Dontaudit read on a ramfs fifo_files.
 </summary>
@@ -85043,7 +67351,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_files" lineno="4420">
+<interface name="fs_manage_ramfs_files" lineno="4866">
 <summary>
 Create, read, write, and delete
 files on a ramfs filesystem.
@@ -85054,7 +67362,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_pipes" lineno="4438">
+<interface name="fs_write_ramfs_pipes" lineno="4884">
 <summary>
 Write to named pipe on a ramfs filesystem.
 </summary>
@@ -85064,7 +67372,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4903">
 <summary>
 Do not audit attempts to write to named
 pipes on a ramfs filesystem.
@@ -85075,7 +67383,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_ramfs_pipes" lineno="4475">
+<interface name="fs_rw_ramfs_pipes" lineno="4921">
 <summary>
 Read and write a named pipe on a ramfs filesystem.
 </summary>
@@ -85085,7 +67393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_pipes" lineno="4494">
+<interface name="fs_manage_ramfs_pipes" lineno="4940">
 <summary>
 Create, read, write, and delete
 named pipes on a ramfs filesystem.
@@ -85096,7 +67404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_write_ramfs_sockets" lineno="4512">
+<interface name="fs_write_ramfs_sockets" lineno="4958">
 <summary>
 Write to named socket on a ramfs filesystem.
 </summary>
@@ -85106,7 +67414,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_ramfs_sockets" lineno="4531">
+<interface name="fs_manage_ramfs_sockets" lineno="4977">
 <summary>
 Create, read, write, and delete
 named sockets on a ramfs filesystem.
@@ -85117,7 +67425,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_romfs" lineno="4549">
+<interface name="fs_mount_romfs" lineno="4995">
 <summary>
 Mount a ROM filesystem.
 </summary>
@@ -85127,7 +67435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_romfs" lineno="4568">
+<interface name="fs_remount_romfs" lineno="5014">
 <summary>
 Remount a ROM filesystem.  This allows
 some mount options to be changed.
@@ -85138,7 +67446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_romfs" lineno="4586">
+<interface name="fs_unmount_romfs" lineno="5032">
 <summary>
 Unmount a ROM filesystem.
 </summary>
@@ -85148,7 +67456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_romfs" lineno="4605">
+<interface name="fs_getattr_romfs" lineno="5051">
 <summary>
 Get the attributes of a ROM
 filesystem.
@@ -85159,7 +67467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4623">
+<interface name="fs_mount_rpc_pipefs" lineno="5069">
 <summary>
 Mount a RPC pipe filesystem.
 </summary>
@@ -85169,7 +67477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4642">
+<interface name="fs_remount_rpc_pipefs" lineno="5088">
 <summary>
 Remount a RPC pipe filesystem.  This
 allows some mount option to be changed.
@@ -85180,7 +67488,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4660">
+<interface name="fs_unmount_rpc_pipefs" lineno="5106">
 <summary>
 Unmount a RPC pipe filesystem.
 </summary>
@@ -85190,7 +67498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4679">
+<interface name="fs_getattr_rpc_pipefs" lineno="5125">
 <summary>
 Get the attributes of a RPC pipe
 filesystem.
@@ -85201,7 +67509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4697">
+<interface name="fs_rw_rpc_named_pipes" lineno="5143">
 <summary>
 Read and write RPC pipe filesystem named pipes.
 </summary>
@@ -85211,7 +67519,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_tmpfs" lineno="4715">
+<interface name="fs_watch_rpc_pipefs_dirs" lineno="5161">
+<summary>
+Watch RPC pipe filesystem directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mount_tmpfs" lineno="5179">
 <summary>
 Mount a tmpfs filesystem.
 </summary>
@@ -85221,7 +67539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_tmpfs" lineno="4733">
+<interface name="fs_remount_tmpfs" lineno="5197">
 <summary>
 Remount a tmpfs filesystem.
 </summary>
@@ -85231,7 +67549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_tmpfs" lineno="4751">
+<interface name="fs_unmount_tmpfs" lineno="5215">
 <summary>
 Unmount a tmpfs filesystem.
 </summary>
@@ -85241,7 +67559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="5233">
 <summary>
 Do not audit getting the attributes of a tmpfs filesystem
 </summary>
@@ -85251,7 +67569,7 @@ Domain to not audit
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs" lineno="4789">
+<interface name="fs_getattr_tmpfs" lineno="5253">
 <summary>
 Get the attributes of a tmpfs
 filesystem.
@@ -85263,7 +67581,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_associate_tmpfs" lineno="4807">
+<interface name="fs_associate_tmpfs" lineno="5271">
 <summary>
 Allow the type to associate to tmpfs filesystems.
 </summary>
@@ -85273,7 +67591,7 @@ The type of the object to be associated.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4825">
+<interface name="fs_relabelfrom_tmpfs" lineno="5289">
 <summary>
 Relabel from tmpfs filesystem.
 </summary>
@@ -85283,7 +67601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4843">
+<interface name="fs_getattr_tmpfs_dirs" lineno="5307">
 <summary>
 Get the attributes of tmpfs directories.
 </summary>
@@ -85293,7 +67611,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5326">
 <summary>
 Do not audit attempts to get the attributes
 of tmpfs directories.
@@ -85304,7 +67622,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs" lineno="4880">
+<interface name="fs_mounton_tmpfs" lineno="5344">
 <summary>
 Mount on tmpfs directories.
 </summary>
@@ -85314,7 +67632,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4898">
+<interface name="fs_mounton_tmpfs_files" lineno="5362">
 <summary>
 Mount on tmpfs files.
 </summary>
@@ -85324,7 +67642,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4916">
+<interface name="fs_setattr_tmpfs_dirs" lineno="5380">
 <summary>
 Set the attributes of tmpfs directories.
 </summary>
@@ -85334,7 +67652,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tmpfs" lineno="4934">
+<interface name="fs_search_tmpfs" lineno="5398">
 <summary>
 Search tmpfs directories.
 </summary>
@@ -85344,7 +67662,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_tmpfs" lineno="4952">
+<interface name="fs_list_tmpfs" lineno="5416">
 <summary>
 List the contents of generic tmpfs directories.
 </summary>
@@ -85354,7 +67672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4971">
+<interface name="fs_dontaudit_list_tmpfs" lineno="5435">
 <summary>
 Do not audit attempts to list the
 contents of generic tmpfs directories.
@@ -85365,7 +67683,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4990">
+<interface name="fs_manage_tmpfs_dirs" lineno="5454">
 <summary>
 Create, read, write, and delete
 tmpfs directories
@@ -85376,7 +67694,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5473">
 <summary>
 Do not audit attempts to write
 tmpfs directories
@@ -85387,7 +67705,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5491">
 <summary>
 Relabel from tmpfs_t dir
 </summary>
@@ -85397,7 +67715,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="5045">
+<interface name="fs_relabel_tmpfs_dirs" lineno="5509">
 <summary>
 Relabel directory on tmpfs filesystems.
 </summary>
@@ -85407,7 +67725,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_tmpfs_filetrans" lineno="5078">
+<interface name="fs_watch_tmpfs_dirs" lineno="5526">
+<summary>
+Watch directories on tmpfs filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_tmpfs_filetrans" lineno="5560">
 <summary>
 Create an object in a tmpfs filesystem, with a private
 type using a type transition.
@@ -85433,7 +67761,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5580">
 <summary>
 Do not audit attempts to getattr
 generic tmpfs files.
@@ -85444,7 +67772,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5599">
 <summary>
 Do not audit attempts to read or write
 generic tmpfs files.
@@ -85455,7 +67783,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="5135">
+<interface name="fs_delete_tmpfs_symlinks" lineno="5617">
 <summary>
 Delete tmpfs symbolic links.
 </summary>
@@ -85465,7 +67793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_auto_mountpoints" lineno="5154">
+<interface name="fs_manage_auto_mountpoints" lineno="5636">
 <summary>
 Create, read, write, and delete
 auto moutpoints.
@@ -85476,7 +67804,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_files" lineno="5172">
+<interface name="fs_read_tmpfs_files" lineno="5654">
 <summary>
 Read generic tmpfs files.
 </summary>
@@ -85486,7 +67814,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_files" lineno="5190">
+<interface name="fs_rw_tmpfs_files" lineno="5672">
 <summary>
 Read and write generic tmpfs files.
 </summary>
@@ -85496,7 +67824,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_files" lineno="5208">
+<interface name="fs_relabel_tmpfs_files" lineno="5690">
 <summary>
 Relabel files on tmpfs filesystems.
 </summary>
@@ -85506,7 +67834,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="5226">
+<interface name="fs_read_tmpfs_symlinks" lineno="5708">
 <summary>
 Read tmpfs link files.
 </summary>
@@ -85516,7 +67844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5726">
 <summary>
 Relabelfrom socket files on tmpfs filesystems.
 </summary>
@@ -85526,7 +67854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5744">
 <summary>
 Relabelfrom tmpfs link files.
 </summary>
@@ -85536,7 +67864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="5280">
+<interface name="fs_rw_tmpfs_chr_files" lineno="5762">
 <summary>
 Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -85546,7 +67874,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5781">
 <summary>
 dontaudit Read and write character nodes on tmpfs filesystems.
 </summary>
@@ -85556,17 +67884,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_chr_files" lineno="5318">
-<summary>
-Relabel character nodes on tmpfs filesystems.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="5337">
+<interface name="fs_relabel_tmpfs_chr_files" lineno="5800">
 <summary>
 Relabel character nodes on tmpfs filesystems.
 </summary>
@@ -85576,7 +67894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="5352">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5819">
 <summary>
 Read and write block nodes on tmpfs filesystems.
 </summary>
@@ -85586,7 +67904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_blk_files" lineno="5371">
+<interface name="fs_relabel_tmpfs_blk_files" lineno="5838">
 <summary>
 Relabel block nodes on tmpfs filesystems.
 </summary>
@@ -85596,17 +67914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="5390">
-<summary>
-Relabel block nodes on tmpfs filesystems.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405">
+<interface name="fs_relabel_tmpfs_fifo_files" lineno="5857">
 <summary>
 Relabel named pipes on tmpfs filesystems.
 </summary>
@@ -85616,7 +67924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_files" lineno="5425">
+<interface name="fs_manage_tmpfs_files" lineno="5877">
 <summary>
 Read and write, create and delete generic
 files on tmpfs filesystems.
@@ -85627,7 +67935,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="5444">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5896">
 <summary>
 Read and write, create and delete symbolic
 links on tmpfs filesystems.
@@ -85638,7 +67946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="5463">
+<interface name="fs_manage_tmpfs_sockets" lineno="5915">
 <summary>
 Read and write, create and delete socket
 files on tmpfs filesystems.
@@ -85649,7 +67957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="5482">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5934">
 <summary>
 Read and write, create and delete character
 nodes on tmpfs filesystems.
@@ -85660,7 +67968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="5501">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5953">
 <summary>
 Read and write, create and delete block nodes
 on tmpfs filesystems.
@@ -85671,7 +67979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs" lineno="5519">
+<interface name="fs_getattr_tracefs" lineno="5971">
 <summary>
 Get the attributes of a trace filesystem.
 </summary>
@@ -85681,7 +67989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="5537">
+<interface name="fs_getattr_tracefs_dirs" lineno="5989">
 <summary>
 Get attributes of dirs on tracefs filesystem.
 </summary>
@@ -85691,7 +67999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_tracefs" lineno="5555">
+<interface name="fs_search_tracefs" lineno="6007">
 <summary>
 search directories on a tracefs filesystem
 </summary>
@@ -85701,7 +68009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_tracefs_files" lineno="5574">
+<interface name="fs_getattr_tracefs_files" lineno="6026">
 <summary>
 Get the attributes of files
 on a trace filesystem.
@@ -85712,7 +68020,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_xenfs" lineno="5592">
+<interface name="fs_mount_xenfs" lineno="6044">
 <summary>
 Mount a XENFS filesystem.
 </summary>
@@ -85722,7 +68030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_xenfs" lineno="5610">
+<interface name="fs_search_xenfs" lineno="6062">
 <summary>
 Search the XENFS filesystem.
 </summary>
@@ -85732,7 +68040,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5630">
+<interface name="fs_manage_xenfs_dirs" lineno="6082">
 <summary>
 Create, read, write, and delete directories
 on a XENFS filesystem.
@@ -85744,7 +68052,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6102">
 <summary>
 Do not audit attempts to create, read,
 write, and delete directories
@@ -85756,7 +68064,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_manage_xenfs_files" lineno="5670">
+<interface name="fs_manage_xenfs_files" lineno="6122">
 <summary>
 Create, read, write, and delete files
 on a XENFS filesystem.
@@ -85768,7 +68076,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_mmap_xenfs_files" lineno="5688">
+<interface name="fs_mmap_xenfs_files" lineno="6140">
 <summary>
 Map files a XENFS filesystem.
 </summary>
@@ -85778,7 +68086,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="6160">
 <summary>
 Do not audit attempts to create,
 read, write, and delete files
@@ -85790,7 +68098,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_mount_all_fs" lineno="5726">
+<interface name="fs_mount_all_fs" lineno="6178">
 <summary>
 Mount all filesystems.
 </summary>
@@ -85800,7 +68108,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_remount_all_fs" lineno="5745">
+<interface name="fs_remount_all_fs" lineno="6197">
 <summary>
 Remount all filesystems.  This
 allows some mount options to be changed.
@@ -85811,7 +68119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unmount_all_fs" lineno="5763">
+<interface name="fs_unmount_all_fs" lineno="6215">
 <summary>
 Unmount all filesystems.
 </summary>
@@ -85821,7 +68129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_fs" lineno="5795">
+<interface name="fs_getattr_all_fs" lineno="6247">
 <summary>
 Get the attributes of all filesystems.
 </summary>
@@ -85845,7 +68153,7 @@ Domain allowed access.
 <infoflow type="read" weight="5"/>
 <rolecap/>
 </interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5815">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="6267">
 <summary>
 Do not audit attempts to get the attributes
 all filesystems.
@@ -85856,7 +68164,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_get_all_fs_quotas" lineno="5834">
+<interface name="fs_get_all_fs_quotas" lineno="6286">
 <summary>
 Get the quotas of all filesystems.
 </summary>
@@ -85867,7 +68175,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_set_all_quotas" lineno="5853">
+<interface name="fs_set_all_quotas" lineno="6305">
 <summary>
 Set the quotas of all filesystems.
 </summary>
@@ -85878,7 +68186,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5871">
+<interface name="fs_relabelfrom_all_fs" lineno="6323">
 <summary>
 Relabelfrom all filesystems.
 </summary>
@@ -85888,7 +68196,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_dirs" lineno="5890">
+<interface name="fs_getattr_all_dirs" lineno="6342">
 <summary>
 Get the attributes of all directories
 with a filesystem type.
@@ -85899,7 +68207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_search_all" lineno="5908">
+<interface name="fs_search_all" lineno="6360">
 <summary>
 Search all directories with a filesystem type.
 </summary>
@@ -85909,7 +68217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_list_all" lineno="5926">
+<interface name="fs_list_all" lineno="6378">
 <summary>
 List all directories with a filesystem type.
 </summary>
@@ -85919,7 +68227,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_files" lineno="5945">
+<interface name="fs_getattr_all_files" lineno="6397">
 <summary>
 Get the attributes of all files with
 a filesystem type.
@@ -85930,7 +68238,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5964">
+<interface name="fs_dontaudit_getattr_all_files" lineno="6416">
 <summary>
 Do not audit attempts to get the attributes
 of all files with a filesystem type.
@@ -85941,7 +68249,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_symlinks" lineno="5983">
+<interface name="fs_getattr_all_symlinks" lineno="6435">
 <summary>
 Get the attributes of all symbolic links with
 a filesystem type.
@@ -85952,7 +68260,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6454">
 <summary>
 Do not audit attempts to get the attributes
 of all symbolic links with a filesystem type.
@@ -85963,7 +68271,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_pipes" lineno="6021">
+<interface name="fs_getattr_all_pipes" lineno="6473">
 <summary>
 Get the attributes of all named pipes with
 a filesystem type.
@@ -85974,7 +68282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="6492">
 <summary>
 Do not audit attempts to get the attributes
 of all named pipes with a filesystem type.
@@ -85985,7 +68293,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_sockets" lineno="6059">
+<interface name="fs_getattr_all_sockets" lineno="6511">
 <summary>
 Get the attributes of all named sockets with
 a filesystem type.
@@ -85996,7 +68304,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="6530">
 <summary>
 Do not audit attempts to get the attributes
 of all named sockets with a filesystem type.
@@ -86007,7 +68315,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_blk_files" lineno="6097">
+<interface name="fs_getattr_all_blk_files" lineno="6549">
 <summary>
 Get the attributes of all block device nodes with
 a filesystem type.
@@ -86018,7 +68326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_getattr_all_chr_files" lineno="6116">
+<interface name="fs_getattr_all_chr_files" lineno="6568">
 <summary>
 Get the attributes of all character device nodes with
 a filesystem type.
@@ -86029,7 +68337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fs_unconfined" lineno="6134">
+<interface name="fs_unconfined" lineno="6586">
 <summary>
 Unconfined access to filesystems
 </summary>
@@ -86108,7 +68416,18 @@ The type of the directory to use as a mountpoint.
 </summary>
 </param>
 </interface>
-<interface name="kernel_setpgid" lineno="122">
+<interface name="kernel_read_state" lineno="123">
+<summary>
+Read the process state (/proc/pid)
+of kernel threads.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_setpgid" lineno="141">
 <summary>
 Set the process group of kernel threads.
 </summary>
@@ -86118,7 +68437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_setsched" lineno="140">
+<interface name="kernel_setsched" lineno="159">
 <summary>
 Set the priority of kernel threads.
 </summary>
@@ -86128,7 +68447,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sigchld" lineno="158">
+<interface name="kernel_sigchld" lineno="177">
 <summary>
 Send a SIGCHLD signal to kernel threads.
 </summary>
@@ -86138,7 +68457,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_kill" lineno="176">
+<interface name="kernel_kill" lineno="195">
 <summary>
 Send a kill signal to kernel threads.
 </summary>
@@ -86148,7 +68467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_signal" lineno="194">
+<interface name="kernel_signal" lineno="213">
 <summary>
 Send a generic signal to kernel threads.
 </summary>
@@ -86158,7 +68477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_share_state" lineno="213">
+<interface name="kernel_share_state" lineno="232">
 <summary>
 Allows the kernel to share state information with
 the caller.
@@ -86169,7 +68488,7 @@ The type of the process with which to share state information.
 </summary>
 </param>
 </interface>
-<interface name="kernel_use_fds" lineno="231">
+<interface name="kernel_use_fds" lineno="250">
 <summary>
 Permits caller to use kernel file descriptors.
 </summary>
@@ -86179,7 +68498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_use_fds" lineno="250">
+<interface name="kernel_dontaudit_use_fds" lineno="269">
 <summary>
 Do not audit attempts to use
 kernel file descriptors.
@@ -86190,7 +68509,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_pipes" lineno="268">
+<interface name="kernel_rw_pipes" lineno="287">
 <summary>
 Read and write kernel unnamed pipes.
 </summary>
@@ -86200,7 +68519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_stream_sockets" lineno="287">
+<interface name="kernel_rw_stream_sockets" lineno="306">
 <summary>
 Read/write to kernel using a unix
 domain stream socket.
@@ -86211,7 +68530,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_stream_connect" lineno="306">
+<interface name="kernel_stream_connect" lineno="325">
 <summary>
 Connect to kernel using a unix
 domain stream socket.
@@ -86222,7 +68541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_dgram_sockets" lineno="324">
+<interface name="kernel_getattr_dgram_sockets" lineno="343">
 <summary>
 Getattr on kernel unix datagram sockets.
 </summary>
@@ -86232,7 +68551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unix_dgram_sockets" lineno="342">
+<interface name="kernel_rw_unix_dgram_sockets" lineno="361">
 <summary>
 Read and write kernel unix datagram sockets.
 </summary>
@@ -86242,7 +68561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dgram_send" lineno="360">
+<interface name="kernel_dgram_send" lineno="379">
 <summary>
 Send messages to kernel unix datagram sockets.
 </summary>
@@ -86252,7 +68571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_netlink_audit_sockets" lineno="378">
+<interface name="kernel_rw_netlink_audit_sockets" lineno="397">
 <summary>
 Send messages to kernel netlink audit sockets.
 </summary>
@@ -86262,7 +68581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_load_module" lineno="396">
+<interface name="kernel_load_module" lineno="415">
 <summary>
 Allows caller to load kernel modules
 </summary>
@@ -86272,7 +68591,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_key" lineno="414">
+<interface name="kernel_search_key" lineno="433">
 <summary>
 Allow search the kernel key ring.
 </summary>
@@ -86282,7 +68601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_key" lineno="432">
+<interface name="kernel_dontaudit_search_key" lineno="451">
 <summary>
 dontaudit search the kernel key ring.
 </summary>
@@ -86292,7 +68611,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_link_key" lineno="450">
+<interface name="kernel_link_key" lineno="469">
 <summary>
 Allow link to the kernel key ring.
 </summary>
@@ -86302,7 +68621,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_link_key" lineno="468">
+<interface name="kernel_dontaudit_link_key" lineno="487">
 <summary>
 dontaudit link to the kernel key ring.
 </summary>
@@ -86312,7 +68631,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_view_key" lineno="486">
+<interface name="kernel_view_key" lineno="505">
 <summary>
 Allow view the kernel key ring.
 </summary>
@@ -86322,7 +68641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_view_key" lineno="504">
+<interface name="kernel_dontaudit_view_key" lineno="523">
 <summary>
 dontaudit view the kernel key ring.
 </summary>
@@ -86332,7 +68651,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_write_key" lineno="522">
+<interface name="kernel_write_key" lineno="541">
 <summary>
 allow write access to the kernel key ring.
 </summary>
@@ -86342,7 +68661,7 @@ Domain to allow.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_ring_buffer" lineno="541">
+<interface name="kernel_read_ring_buffer" lineno="560">
 <summary>
 Allows caller to read the ring buffer.
 </summary>
@@ -86353,7 +68672,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_read_ring_buffer" lineno="560">
+<interface name="kernel_dontaudit_read_ring_buffer" lineno="579">
 <summary>
 Do not audit attempts to read the ring buffer.
 </summary>
@@ -86363,7 +68682,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_change_ring_buffer_level" lineno="579">
+<interface name="kernel_change_ring_buffer_level" lineno="598">
 <summary>
 Change the level of kernel messages logged to the console.
 </summary>
@@ -86374,7 +68693,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_clear_ring_buffer" lineno="599">
+<interface name="kernel_clear_ring_buffer" lineno="618">
 <summary>
 Allows the caller to clear the ring buffer.
 </summary>
@@ -86385,7 +68704,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_request_load_module" lineno="631">
+<interface name="kernel_request_load_module" lineno="650">
 <summary>
 Allows caller to request the kernel to load a module
 </summary>
@@ -86408,7 +68727,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_request_load_module" lineno="649">
+<interface name="kernel_dontaudit_request_load_module" lineno="668">
 <summary>
 Do not audit requests to the kernel to load a module.
 </summary>
@@ -86418,7 +68737,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_get_sysvipc_info" lineno="667">
+<interface name="kernel_get_sysvipc_info" lineno="686">
 <summary>
 Get information on all System V IPC objects.
 </summary>
@@ -86428,7 +68747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_debugfs" lineno="685">
+<interface name="kernel_getattr_debugfs" lineno="704">
 <summary>
 Get the attributes of a kernel debugging filesystem.
 </summary>
@@ -86438,7 +68757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_debugfs" lineno="703">
+<interface name="kernel_mount_debugfs" lineno="722">
 <summary>
 Mount a kernel debugging filesystem.
 </summary>
@@ -86448,7 +68767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_debugfs" lineno="721">
+<interface name="kernel_unmount_debugfs" lineno="740">
 <summary>
 Unmount a kernel debugging filesystem.
 </summary>
@@ -86458,7 +68777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_remount_debugfs" lineno="739">
+<interface name="kernel_remount_debugfs" lineno="758">
 <summary>
 Remount a kernel debugging filesystem.
 </summary>
@@ -86468,7 +68787,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_debugfs" lineno="757">
+<interface name="kernel_search_debugfs" lineno="776">
 <summary>
 Search the contents of a kernel debugging filesystem.
 </summary>
@@ -86478,7 +68797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_debugfs" lineno="775">
+<interface name="kernel_dontaudit_search_debugfs" lineno="794">
 <summary>
 Do not audit attempts to search the kernel debugging filesystem.
 </summary>
@@ -86488,7 +68807,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_debugfs" lineno="793">
+<interface name="kernel_read_debugfs" lineno="812">
 <summary>
 Read information from the debugging filesystem.
 </summary>
@@ -86498,7 +68817,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="813">
+<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="832">
 <summary>
 Do not audit attempts to write kernel debugging filesystem dirs.
 </summary>
@@ -86508,7 +68827,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_debugfs" lineno="831">
+<interface name="kernel_manage_debugfs" lineno="850">
 <summary>
 Manage information from the debugging filesystem.
 </summary>
@@ -86518,7 +68837,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_kvmfs" lineno="851">
+<interface name="kernel_mount_kvmfs" lineno="870">
 <summary>
 Mount a kernel VM filesystem.
 </summary>
@@ -86528,7 +68847,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_proc" lineno="869">
+<interface name="kernel_mount_proc" lineno="888">
 <summary>
 mount the proc filesystem.
 </summary>
@@ -86538,7 +68857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_remount_proc" lineno="887">
+<interface name="kernel_remount_proc" lineno="906">
 <summary>
 remount the proc filesystem.
 </summary>
@@ -86548,7 +68867,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_proc" lineno="905">
+<interface name="kernel_unmount_proc" lineno="924">
 <summary>
 Unmount the proc filesystem.
 </summary>
@@ -86558,7 +68877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_proc" lineno="923">
+<interface name="kernel_getattr_proc" lineno="942">
 <summary>
 Get the attributes of the proc filesystem.
 </summary>
@@ -86568,7 +68887,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_proc" lineno="941">
+<interface name="kernel_dontaudit_getattr_proc" lineno="960">
 <summary>
 Do not audit attempts to get the attributes of the proc filesystem.
 </summary>
@@ -86578,7 +68897,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_proc" lineno="960">
+<interface name="kernel_mounton_proc" lineno="979">
 <summary>
 Mount on proc directories.  (Deprecated)
 </summary>
@@ -86589,7 +68908,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="976">
+<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="995">
 <summary>
 Do not audit attempts to set the
 attributes of directories in /proc.
@@ -86600,7 +68919,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_proc" lineno="994">
+<interface name="kernel_search_proc" lineno="1013">
 <summary>
 Search directories in /proc.
 </summary>
@@ -86610,7 +68929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_list_proc" lineno="1012">
+<interface name="kernel_list_proc" lineno="1031">
 <summary>
 List the contents of directories in /proc.
 </summary>
@@ -86620,7 +68939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_proc" lineno="1031">
+<interface name="kernel_dontaudit_list_proc" lineno="1050">
 <summary>
 Do not audit attempts to list the
 contents of directories in /proc.
@@ -86631,7 +68950,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_proc_dirs" lineno="1050">
+<interface name="kernel_dontaudit_write_proc_dirs" lineno="1069">
 <summary>
 Do not audit attempts to write the
 directories in /proc.
@@ -86642,7 +68961,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_proc_dirs" lineno="1068">
+<interface name="kernel_mounton_proc_dirs" lineno="1087">
 <summary>
 Mount on the directories in /proc.
 </summary>
@@ -86652,7 +68971,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_proc_files" lineno="1086">
+<interface name="kernel_getattr_proc_files" lineno="1105">
 <summary>
 Get the attributes of files in /proc.
 </summary>
@@ -86662,7 +68981,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_proc_symlinks" lineno="1113">
+<interface name="kernel_read_proc_symlinks" lineno="1132">
 <summary>
 Read generic symbolic links in /proc.
 </summary>
@@ -86681,7 +69000,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="kernel_read_system_state" lineno="1152">
+<interface name="kernel_read_system_state" lineno="1171">
 <summary>
 Allows caller to read system state information in /proc.
 </summary>
@@ -86712,7 +69031,7 @@ Domain allowed access.
 <infoflow type="read" weight="10"/>
 <rolecap/>
 </interface>
-<interface name="kernel_write_proc_files" lineno="1178">
+<interface name="kernel_write_proc_files" lineno="1197">
 <summary>
 Write to generic proc entries.
 </summary>
@@ -86723,7 +69042,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_read_system_state" lineno="1197">
+<interface name="kernel_dontaudit_read_system_state" lineno="1216">
 <summary>
 Do not audit attempts by caller to
 read system state information in proc.
@@ -86734,7 +69053,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1216">
+<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1235">
 <summary>
 Do not audit attempts by caller to
 read symbolic links in proc.
@@ -86745,7 +69064,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_afs_state" lineno="1235">
+<interface name="kernel_rw_afs_state" lineno="1254">
 <summary>
 Allow caller to read and write state information for AFS.
 </summary>
@@ -86756,7 +69075,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_software_raid_state" lineno="1255">
+<interface name="kernel_read_software_raid_state" lineno="1274">
 <summary>
 Allow caller to read the state information for software raid.
 </summary>
@@ -86767,7 +69086,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_software_raid_state" lineno="1275">
+<interface name="kernel_rw_software_raid_state" lineno="1294">
 <summary>
 Allow caller to read and set the state information for software raid.
 </summary>
@@ -86777,7 +69096,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_core_if" lineno="1295">
+<interface name="kernel_getattr_core_if" lineno="1314">
 <summary>
 Allows caller to get attributes of core kernel interface.
 </summary>
@@ -86787,7 +69106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_core_if" lineno="1316">
+<interface name="kernel_dontaudit_getattr_core_if" lineno="1335">
 <summary>
 Do not audit attempts to get the attributes of
 core kernel interfaces.
@@ -86798,7 +69117,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_core_if" lineno="1334">
+<interface name="kernel_read_core_if" lineno="1353">
 <summary>
 Allows caller to read the core kernel interface.
 </summary>
@@ -86808,7 +69127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_messages" lineno="1358">
+<interface name="kernel_read_messages" lineno="1377">
 <summary>
 Allow caller to read kernel messages
 using the /proc/kmsg interface.
@@ -86819,7 +69138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_message_if" lineno="1380">
+<interface name="kernel_getattr_message_if" lineno="1399">
 <summary>
 Allow caller to get the attributes of kernel message
 interface (/proc/kmsg).
@@ -86830,7 +69149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_message_if" lineno="1399">
+<interface name="kernel_dontaudit_getattr_message_if" lineno="1418">
 <summary>
 Do not audit attempts by caller to get the attributes of kernel
 message interfaces.
@@ -86841,7 +69160,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_message_if" lineno="1418">
+<interface name="kernel_mounton_message_if" lineno="1437">
 <summary>
 Mount on kernel message interfaces files.
 </summary>
@@ -86852,7 +69171,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_search_network_state" lineno="1439">
+<interface name="kernel_dontaudit_search_network_state" lineno="1458">
 <summary>
 Do not audit attempts to search the network
 state directory.
@@ -86864,7 +69183,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_search_network_state" lineno="1458">
+<interface name="kernel_search_network_state" lineno="1477">
 <summary>
 Allow searching of network state directory.
 </summary>
@@ -86875,7 +69194,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_read_network_state" lineno="1488">
+<interface name="kernel_read_network_state" lineno="1507">
 <summary>
 Read the network state information.
 </summary>
@@ -86897,7 +69216,7 @@ Domain allowed access.
 <infoflow type="read" weight="10"/>
 <rolecap/>
 </interface>
-<interface name="kernel_read_network_state_symlinks" lineno="1509">
+<interface name="kernel_read_network_state_symlinks" lineno="1528">
 <summary>
 Allow caller to read the network state symbolic links.
 </summary>
@@ -86907,7 +69226,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_search_xen_state" lineno="1530">
+<interface name="kernel_search_xen_state" lineno="1549">
 <summary>
 Allow searching of xen state directory.
 </summary>
@@ -86918,7 +69237,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_dontaudit_search_xen_state" lineno="1550">
+<interface name="kernel_dontaudit_search_xen_state" lineno="1569">
 <summary>
 Do not audit attempts to search the xen
 state directory.
@@ -86930,7 +69249,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_read_xen_state" lineno="1569">
+<interface name="kernel_read_xen_state" lineno="1588">
 <summary>
 Allow caller to read the xen state information.
 </summary>
@@ -86941,7 +69260,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_read_xen_state_symlinks" lineno="1591">
+<interface name="kernel_read_xen_state_symlinks" lineno="1610">
 <summary>
 Allow caller to read the xen state symbolic links.
 </summary>
@@ -86952,7 +69271,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_write_xen_state" lineno="1612">
+<interface name="kernel_write_xen_state" lineno="1631">
 <summary>
 Allow caller to write xen state information.
 </summary>
@@ -86963,7 +69282,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_list_all_proc" lineno="1630">
+<interface name="kernel_list_all_proc" lineno="1649">
 <summary>
 Allow attempts to list all proc directories.
 </summary>
@@ -86973,7 +69292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_all_proc" lineno="1649">
+<interface name="kernel_dontaudit_list_all_proc" lineno="1668">
 <summary>
 Do not audit attempts to list all proc directories.
 </summary>
@@ -86983,7 +69302,27 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_sysctl" lineno="1670">
+<interface name="kernel_write_non_proc_init_mountpoint_files" lineno="1687">
+<summary>
+Write systemd mountpoint files except proc entries.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_create_non_proc_init_mountpoint_files" lineno="1705">
+<summary>
+Create systemd mountpoint files except proc entries.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_dontaudit_search_sysctl" lineno="1725">
 <summary>
 Do not audit attempts by caller to search
 the base directory of sysctls.
@@ -86995,7 +69334,7 @@ Domain to not audit.
 </param>
 
 </interface>
-<interface name="kernel_mounton_sysctl_dirs" lineno="1689">
+<interface name="kernel_mounton_sysctl_dirs" lineno="1744">
 <summary>
 Mount on sysctl_t dirs.
 </summary>
@@ -87006,7 +69345,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_sysctl" lineno="1709">
+<interface name="kernel_read_sysctl" lineno="1764">
 <summary>
 Allow access to read sysctl directories.
 </summary>
@@ -87017,7 +69356,7 @@ Domain allowed access.
 </param>
 
 </interface>
-<interface name="kernel_mounton_sysctl_files" lineno="1729">
+<interface name="kernel_mounton_sysctl_files" lineno="1784">
 <summary>
 Mount on sysctl files.
 </summary>
@@ -87028,7 +69367,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_device_sysctls" lineno="1749">
+<interface name="kernel_read_device_sysctls" lineno="1804">
 <summary>
 Allow caller to read the device sysctls.
 </summary>
@@ -87039,7 +69378,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_device_sysctls" lineno="1770">
+<interface name="kernel_rw_device_sysctls" lineno="1825">
 <summary>
 Read and write device sysctls.
 </summary>
@@ -87050,7 +69389,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_vm_sysctl" lineno="1790">
+<interface name="kernel_search_vm_sysctl" lineno="1845">
 <summary>
 Allow caller to search virtual memory sysctls.
 </summary>
@@ -87060,7 +69399,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_vm_sysctls" lineno="1809">
+<interface name="kernel_read_vm_sysctls" lineno="1864">
 <summary>
 Allow caller to read virtual memory sysctls.
 </summary>
@@ -87071,7 +69410,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_vm_sysctls" lineno="1830">
+<interface name="kernel_rw_vm_sysctls" lineno="1885">
 <summary>
 Read and write virtual memory sysctls.
 </summary>
@@ -87082,7 +69421,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_network_sysctl" lineno="1852">
+<interface name="kernel_search_network_sysctl" lineno="1907">
 <summary>
 Search network sysctl directories.
 </summary>
@@ -87092,7 +69431,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_network_sysctl" lineno="1870">
+<interface name="kernel_dontaudit_search_network_sysctl" lineno="1925">
 <summary>
 Do not audit attempts by caller to search network sysctl directories.
 </summary>
@@ -87102,7 +69441,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_net_sysctls" lineno="1889">
+<interface name="kernel_read_net_sysctls" lineno="1944">
 <summary>
 Allow caller to read network sysctls.
 </summary>
@@ -87113,7 +69452,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_net_sysctls" lineno="1910">
+<interface name="kernel_rw_net_sysctls" lineno="1965">
 <summary>
 Allow caller to modiry contents of sysctl network files.
 </summary>
@@ -87124,7 +69463,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_unix_sysctls" lineno="1932">
+<interface name="kernel_read_unix_sysctls" lineno="1987">
 <summary>
 Allow caller to read unix domain
 socket sysctls.
@@ -87136,7 +69475,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_unix_sysctls" lineno="1954">
+<interface name="kernel_rw_unix_sysctls" lineno="2009">
 <summary>
 Read and write unix domain
 socket sysctls.
@@ -87148,7 +69487,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_hotplug_sysctls" lineno="1975">
+<interface name="kernel_read_hotplug_sysctls" lineno="2030">
 <summary>
 Read the hotplug sysctl.
 </summary>
@@ -87159,7 +69498,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_hotplug_sysctls" lineno="1996">
+<interface name="kernel_rw_hotplug_sysctls" lineno="2051">
 <summary>
 Read and write the hotplug sysctl.
 </summary>
@@ -87170,7 +69509,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_modprobe_sysctls" lineno="2017">
+<interface name="kernel_read_modprobe_sysctls" lineno="2072">
 <summary>
 Read the modprobe sysctl.
 </summary>
@@ -87181,7 +69520,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_modprobe_sysctls" lineno="2038">
+<interface name="kernel_rw_modprobe_sysctls" lineno="2093">
 <summary>
 Read and write the modprobe sysctl.
 </summary>
@@ -87192,7 +69531,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2058">
+<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2113">
 <summary>
 Do not audit attempts to search generic kernel sysctls.
 </summary>
@@ -87202,7 +69541,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2076">
+<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2131">
 <summary>
 Do not audit attempted reading of kernel sysctls
 </summary>
@@ -87212,7 +69551,7 @@ Domain to not audit accesses from
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_crypto_sysctls" lineno="2094">
+<interface name="kernel_read_crypto_sysctls" lineno="2149">
 <summary>
 Read generic crypto sysctls.
 </summary>
@@ -87222,7 +69561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_kernel_sysctls" lineno="2135">
+<interface name="kernel_read_kernel_sysctls" lineno="2190">
 <summary>
 Read general kernel sysctls.
 </summary>
@@ -87254,7 +69593,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2155">
+<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2210">
 <summary>
 Do not audit attempts to write generic kernel sysctls.
 </summary>
@@ -87264,7 +69603,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_kernel_sysctl" lineno="2174">
+<interface name="kernel_rw_kernel_sysctl" lineno="2229">
 <summary>
 Read and write generic kernel sysctls.
 </summary>
@@ -87275,7 +69614,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_mounton_kernel_sysctl_files" lineno="2195">
+<interface name="kernel_mounton_kernel_sysctl_files" lineno="2250">
 <summary>
 Mount on kernel sysctl files.
 </summary>
@@ -87286,7 +69625,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2215">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2270">
 <summary>
 Read kernel ns lastpid sysctls.
 </summary>
@@ -87297,7 +69636,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2235">
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2290">
 <summary>
 Do not audit attempts to write kernel ns lastpid sysctls.
 </summary>
@@ -87307,7 +69646,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2254">
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2309">
 <summary>
 Read and write kernel ns lastpid sysctls.
 </summary>
@@ -87318,7 +69657,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_search_fs_sysctls" lineno="2275">
+<interface name="kernel_search_fs_sysctls" lineno="2330">
 <summary>
 Search filesystem sysctl directories.
 </summary>
@@ -87329,7 +69668,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_fs_sysctls" lineno="2294">
+<interface name="kernel_read_fs_sysctls" lineno="2349">
 <summary>
 Read filesystem sysctls.
 </summary>
@@ -87340,7 +69679,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2315">
+<interface name="kernel_rw_fs_sysctls" lineno="2370">
 <summary>
 Read and write filesystem sysctls.
 </summary>
@@ -87351,7 +69690,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_irq_sysctls" lineno="2336">
+<interface name="kernel_read_irq_sysctls" lineno="2391">
 <summary>
 Read IRQ sysctls.
 </summary>
@@ -87362,7 +69701,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2358">
+<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2413">
 <summary>
 Do not audit attempts to search
 filesystem sysctl directories.
@@ -87374,7 +69713,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2377">
+<interface name="kernel_rw_irq_sysctls" lineno="2432">
 <summary>
 Read and write IRQ sysctls.
 </summary>
@@ -87385,7 +69724,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2398">
+<interface name="kernel_read_rpc_sysctls" lineno="2453">
 <summary>
 Read RPC sysctls.
 </summary>
@@ -87396,7 +69735,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2419">
+<interface name="kernel_rw_rpc_sysctls" lineno="2474">
 <summary>
 Read and write RPC sysctls.
 </summary>
@@ -87407,7 +69746,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2439">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2494">
 <summary>
 Do not audit attempts to list all sysctl directories.
 </summary>
@@ -87417,7 +69756,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_all_sysctls" lineno="2459">
+<interface name="kernel_read_all_sysctls" lineno="2514">
 <summary>
 Allow caller to read all sysctls.
 </summary>
@@ -87428,7 +69767,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_all_sysctls" lineno="2482">
+<interface name="kernel_rw_all_sysctls" lineno="2537">
 <summary>
 Read and write all sysctls.
 </summary>
@@ -87439,7 +69778,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_associate_proc" lineno="2507">
+<interface name="kernel_associate_proc" lineno="2562">
 <summary>
 Associate a file to proc_t (/proc)
 </summary>
@@ -87450,7 +69789,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_kill_unlabeled" lineno="2524">
+<interface name="kernel_kill_unlabeled" lineno="2579">
 <summary>
 Send a kill signal to unlabeled processes.
 </summary>
@@ -87460,7 +69799,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mount_unlabeled" lineno="2542">
+<interface name="kernel_mount_unlabeled" lineno="2597">
 <summary>
 Mount a kernel unlabeled filesystem.
 </summary>
@@ -87470,7 +69809,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unmount_unlabeled" lineno="2560">
+<interface name="kernel_unmount_unlabeled" lineno="2615">
 <summary>
 Unmount a kernel unlabeled filesystem.
 </summary>
@@ -87480,7 +69819,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_signal_unlabeled" lineno="2578">
+<interface name="kernel_signal_unlabeled" lineno="2633">
 <summary>
 Send general signals to unlabeled processes.
 </summary>
@@ -87490,7 +69829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_signull_unlabeled" lineno="2596">
+<interface name="kernel_signull_unlabeled" lineno="2651">
 <summary>
 Send a null signal to unlabeled processes.
 </summary>
@@ -87500,7 +69839,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2614">
+<interface name="kernel_sigstop_unlabeled" lineno="2669">
 <summary>
 Send a stop signal to unlabeled processes.
 </summary>
@@ -87510,7 +69849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2632">
+<interface name="kernel_sigchld_unlabeled" lineno="2687">
 <summary>
 Send a child terminated signal to unlabeled processes.
 </summary>
@@ -87520,7 +69859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2650">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2705">
 <summary>
 Get the attributes of unlabeled directories.
 </summary>
@@ -87530,7 +69869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2668">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2723">
 <summary>
 Do not audit attempts to search unlabeled directories.
 </summary>
@@ -87540,7 +69879,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_list_unlabeled" lineno="2686">
+<interface name="kernel_list_unlabeled" lineno="2741">
 <summary>
 List unlabeled directories.
 </summary>
@@ -87550,7 +69889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_unlabeled_state" lineno="2704">
+<interface name="kernel_read_unlabeled_state" lineno="2759">
 <summary>
 Read the process state (/proc/pid) of all unlabeled_t.
 </summary>
@@ -87560,7 +69899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2724">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2779">
 <summary>
 Do not audit attempts to list unlabeled directories.
 </summary>
@@ -87570,7 +69909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2742">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2797">
 <summary>
 Read and write unlabeled directories.
 </summary>
@@ -87580,7 +69919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2760">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2815">
 <summary>
 Delete unlabeled directories.
 </summary>
@@ -87590,7 +69929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2778">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2833">
 <summary>
 Create, read, write, and delete unlabeled directories.
 </summary>
@@ -87600,7 +69939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2796">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2851">
 <summary>
 Mount a filesystem on an unlabeled directory.
 </summary>
@@ -87610,7 +69949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_unlabeled_files" lineno="2814">
+<interface name="kernel_read_unlabeled_files" lineno="2869">
 <summary>
 Read unlabeled files.
 </summary>
@@ -87620,7 +69959,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2832">
+<interface name="kernel_rw_unlabeled_files" lineno="2887">
 <summary>
 Read and write unlabeled files.
 </summary>
@@ -87630,7 +69969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2850">
+<interface name="kernel_delete_unlabeled_files" lineno="2905">
 <summary>
 Delete unlabeled files.
 </summary>
@@ -87640,7 +69979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2868">
+<interface name="kernel_manage_unlabeled_files" lineno="2923">
 <summary>
 Create, read, write, and delete unlabeled files.
 </summary>
@@ -87650,7 +69989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2887">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2942">
 <summary>
 Do not audit attempts by caller to get the
 attributes of an unlabeled file.
@@ -87661,7 +70000,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2906">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2961">
 <summary>
 Do not audit attempts by caller to
 read an unlabeled file.
@@ -87672,7 +70011,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unlabeled_filetrans" lineno="2940">
+<interface name="kernel_unlabeled_filetrans" lineno="2995">
 <summary>
 Create an object in unlabeled directories
 with a private type.
@@ -87698,7 +70037,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="2958">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="3013">
 <summary>
 Delete unlabeled symbolic links.
 </summary>
@@ -87708,7 +70047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="2976">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="3031">
 <summary>
 Create, read, write, and delete unlabeled symbolic links.
 </summary>
@@ -87718,7 +70057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2995">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="3050">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled symbolic links.
@@ -87729,7 +70068,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3014">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3069">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled named pipes.
@@ -87740,7 +70079,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3033">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3088">
 <summary>
 Do not audit attempts by caller to get the
 attributes of unlabeled named sockets.
@@ -87751,7 +70090,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3052">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3107">
 <summary>
 Do not audit attempts by caller to get attributes for
 unlabeled block devices.
@@ -87762,7 +70101,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="3070">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="3125">
 <summary>
 Read and write unlabeled block device nodes.
 </summary>
@@ -87772,7 +70111,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="3088">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="3143">
 <summary>
 Delete unlabeled block device nodes.
 </summary>
@@ -87782,7 +70121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="3106">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="3161">
 <summary>
 Create, read, write, and delete unlabeled block device nodes.
 </summary>
@@ -87792,7 +70131,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3125">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3180">
 <summary>
 Do not audit attempts by caller to get attributes for
 unlabeled character devices.
@@ -87803,7 +70142,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3144">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3199">
 <summary>
 Do not audit attempts to
 write unlabeled character devices.
@@ -87814,7 +70153,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="3162">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3217">
 <summary>
 Delete unlabeled character device nodes.
 </summary>
@@ -87824,7 +70163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="3181">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3236">
 <summary>
 Create, read, write, and delete unlabeled character device nodes.
 </summary>
@@ -87834,7 +70173,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3199">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3254">
 <summary>
 Allow caller to relabel unlabeled directories.
 </summary>
@@ -87844,7 +70183,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3217">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3272">
 <summary>
 Allow caller to relabel unlabeled files.
 </summary>
@@ -87854,7 +70193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3236">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3291">
 <summary>
 Allow caller to relabel unlabeled symbolic links.
 </summary>
@@ -87864,7 +70203,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3255">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3310">
 <summary>
 Allow caller to relabel unlabeled named pipes.
 </summary>
@@ -87874,7 +70213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3274">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3329">
 <summary>
 Delete unlabeled named pipes
 </summary>
@@ -87884,7 +70223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3292">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3347">
 <summary>
 Allow caller to relabel unlabeled named sockets.
 </summary>
@@ -87894,7 +70233,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3311">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3366">
 <summary>
 Delete unlabeled named sockets.
 </summary>
@@ -87904,7 +70243,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3329">
+<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3384">
 <summary>
 Allow caller to relabel from unlabeled block devices.
 </summary>
@@ -87914,7 +70253,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3347">
+<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3402">
 <summary>
 Allow caller to relabel from unlabeled character devices.
 </summary>
@@ -87924,7 +70263,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3380">
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3435">
 <summary>
 Send and receive messages from an
 unlabeled IPSEC association.
@@ -87949,7 +70288,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3413">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3468">
 <summary>
 Do not audit attempts to send and receive messages
 from an	unlabeled IPSEC association.
@@ -87974,7 +70313,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3440">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3495">
 <summary>
 Receive TCP packets from an unlabeled connection.
 </summary>
@@ -87993,7 +70332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3469">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3524">
 <summary>
 Do not audit attempts to receive TCP packets from an unlabeled
 connection.
@@ -88014,7 +70353,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3496">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3551">
 <summary>
 Receive UDP packets from an unlabeled connection.
 </summary>
@@ -88033,7 +70372,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3525">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3580">
 <summary>
 Do not audit attempts to receive UDP packets from an unlabeled
 connection.
@@ -88054,7 +70393,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3552">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3607">
 <summary>
 Receive Raw IP packets from an unlabeled connection.
 </summary>
@@ -88073,7 +70412,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3581">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3636">
 <summary>
 Do not audit attempts to receive Raw IP packets from an unlabeled
 connection.
@@ -88094,7 +70433,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3611">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3666">
 <summary>
 Send and receive unlabeled packets.
 </summary>
@@ -88116,7 +70455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3639">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3694">
 <summary>
 Receive packets from an unlabeled peer.
 </summary>
@@ -88136,7 +70475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3667">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3722">
 <summary>
 Do not audit attempts to receive packets from an unlabeled peer.
 </summary>
@@ -88156,7 +70495,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3685">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3740">
 <summary>
 Relabel from unlabeled database objects.
 </summary>
@@ -88166,7 +70505,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_unconfined" lineno="3722">
+<interface name="kernel_unconfined" lineno="3777">
 <summary>
 Unconfined access to kernel module resources.
 </summary>
@@ -88176,7 +70515,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3742">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3797">
 <summary>
 Read virtual memory overcommit sysctl.
 </summary>
@@ -88187,7 +70526,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3762">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3817">
 <summary>
 Read and write virtual memory overcommit sysctl.
 </summary>
@@ -88198,7 +70537,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3781">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3836">
 <summary>
 Access unlabeled infiniband pkeys.
 </summary>
@@ -88208,7 +70547,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3799">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3854">
 <summary>
 Manage subnet on unlabeled Infiniband endports.
 </summary>
@@ -89290,17 +71629,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_map_security_files" lineno="711">
-<summary>
-Allows caller to map secuirty_t files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="selinux_unconfined" lineno="732">
+<interface name="selinux_unconfined" lineno="710">
 <summary>
 Unconfined access to the SELinux kernel security server.
 </summary>
@@ -89339,7 +71668,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="34">
+<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="35">
 <summary>
 Do not audit attempts made by the caller to get
 the attributes of fixed disk device nodes.
@@ -89350,7 +71679,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_fixed_disk_dev" lineno="54">
+<interface name="storage_setattr_fixed_disk_dev" lineno="55">
 <summary>
 Allow the caller to set the attributes of fixed disk
 device nodes.
@@ -89361,7 +71690,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="74">
+<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="76">
 <summary>
 Do not audit attempts made by the caller to set
 the attributes of fixed disk device nodes.
@@ -89372,7 +71701,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_read_fixed_disk" lineno="95">
+<interface name="storage_raw_read_fixed_disk" lineno="98">
 <summary>
 Allow the caller to directly read from a fixed disk.
 This is extremely dangerous as it can bypass the
@@ -89385,7 +71714,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_read_fixed_disk_cond" lineno="126">
+<interface name="storage_raw_read_fixed_disk_cond" lineno="129">
 <summary>
 Allow the caller to directly read from a fixed disk
 if a tunable is set.
@@ -89404,7 +71733,7 @@ Tunable to depend on
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_read_fixed_disk" lineno="151">
+<interface name="storage_dontaudit_read_fixed_disk" lineno="154">
 <summary>
 Do not audit attempts made by the caller to read
 fixed disk device nodes.
@@ -89415,7 +71744,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_write_fixed_disk" lineno="174">
+<interface name="storage_raw_write_fixed_disk" lineno="177">
 <summary>
 Allow the caller to directly write to a fixed disk.
 This is extremely dangerous as it can bypass the
@@ -89428,7 +71757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_write_fixed_disk" lineno="197">
+<interface name="storage_dontaudit_write_fixed_disk" lineno="200">
 <summary>
 Do not audit attempts made by the caller to write
 fixed disk device nodes.
@@ -89439,7 +71768,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_rw_fixed_disk" lineno="219">
+<interface name="storage_raw_rw_fixed_disk" lineno="222">
 <summary>
 Allow the caller to directly read and write to a fixed disk.
 This is extremely dangerous as it can bypass the
@@ -89452,7 +71781,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_create_fixed_disk_dev" lineno="234">
+<interface name="storage_create_fixed_disk_dev" lineno="237">
 <summary>
 Allow the caller to create fixed disk device nodes.
 </summary>
@@ -89462,7 +71791,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_delete_fixed_disk_dev" lineno="254">
+<interface name="storage_delete_fixed_disk_dev" lineno="257">
 <summary>
 Allow the caller to delete fixed disk device nodes.
 </summary>
@@ -89472,7 +71801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_manage_fixed_disk" lineno="273">
+<interface name="storage_manage_fixed_disk" lineno="276">
 <summary>
 Create, read, write, and delete fixed disk device nodes.
 </summary>
@@ -89482,7 +71811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dev_filetrans_fixed_disk" lineno="302">
+<interface name="storage_dev_filetrans_fixed_disk" lineno="305">
 <summary>
 Create block devices in /dev with the fixed disk type
 via an automatic type transition.
@@ -89498,7 +71827,7 @@ Optional filename of the block device to be created
 </summary>
 </param>
 </interface>
-<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="321">
+<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="324">
 <summary>
 Create block devices in on a tmpfs filesystem with the
 fixed disk type via an automatic type transition.
@@ -89509,7 +71838,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_relabel_fixed_disk" lineno="339">
+<interface name="storage_relabel_fixed_disk" lineno="342">
 <summary>
 Relabel fixed disk device nodes.
 </summary>
@@ -89519,7 +71848,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_swapon_fixed_disk" lineno="358">
+<interface name="storage_swapon_fixed_disk" lineno="361">
 <summary>
 Enable a fixed disk device as swap space
 </summary>
@@ -89529,7 +71858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_watch_fixed_disk" lineno="377">
+<interface name="storage_watch_fixed_disk" lineno="380">
 <summary>
 Watch fixed disk device nodes.
 </summary>
@@ -89539,7 +71868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_fuse_dev" lineno="398">
+<interface name="storage_getattr_fuse_dev" lineno="401">
 <summary>
 Allow the caller to get the attributes
 of device nodes of fuse devices.
@@ -89550,7 +71879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_rw_fuse" lineno="417">
+<interface name="storage_rw_fuse" lineno="420">
 <summary>
 read or write fuse device interfaces.
 </summary>
@@ -89560,7 +71889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="436">
+<interface name="storage_dontaudit_rw_fuse" lineno="439">
 <summary>
 Do not audit attempts to read or write
 fuse device interfaces.
@@ -89571,7 +71900,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="455">
+<interface name="storage_getattr_scsi_generic_dev" lineno="458">
 <summary>
 Allow the caller to get the attributes of
 the generic SCSI interface device nodes.
@@ -89582,7 +71911,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="475">
+<interface name="storage_setattr_scsi_generic_dev" lineno="478">
 <summary>
 Allow the caller to set the attributes of
 the generic SCSI interface device nodes.
@@ -89593,7 +71922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_read_scsi_generic" lineno="498">
+<interface name="storage_read_scsi_generic" lineno="501">
 <summary>
 Allow the caller to directly read, in a
 generic fashion, from any SCSI device.
@@ -89607,7 +71936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_write_scsi_generic" lineno="523">
+<interface name="storage_write_scsi_generic" lineno="526">
 <summary>
 Allow the caller to directly write, in a
 generic fashion, from any SCSI device.
@@ -89621,7 +71950,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="548">
 <summary>
 Set attributes of the device nodes
 for the SCSI generic interface.
@@ -89632,7 +71961,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="565">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="568">
 <summary>
 Do not audit attempts to read or write
 SCSI generic device interfaces.
@@ -89643,7 +71972,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_removable_dev" lineno="584">
+<interface name="storage_getattr_removable_dev" lineno="587">
 <summary>
 Allow the caller to get the attributes of removable
 devices device nodes.
@@ -89654,7 +71983,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="604">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="607">
 <summary>
 Do not audit attempts made by the caller to get
 the attributes of removable devices device nodes.
@@ -89665,7 +71994,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="623">
+<interface name="storage_dontaudit_read_removable_device" lineno="626">
 <summary>
 Do not audit attempts made by the caller to read
 removable devices device nodes.
@@ -89676,7 +72005,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="643">
+<interface name="storage_dontaudit_write_removable_device" lineno="646">
 <summary>
 Do not audit attempts made by the caller to write
 removable devices device nodes.
@@ -89687,7 +72016,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_removable_dev" lineno="662">
+<interface name="storage_setattr_removable_dev" lineno="665">
 <summary>
 Allow the caller to set the attributes of removable
 devices device nodes.
@@ -89698,7 +72027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="682">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="685">
 <summary>
 Do not audit attempts made by the caller to set
 the attributes of removable devices device nodes.
@@ -89709,7 +72038,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_read_removable_device" lineno="704">
+<interface name="storage_raw_read_removable_device" lineno="707">
 <summary>
 Allow the caller to directly read from
 a removable device.
@@ -89723,7 +72052,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="723">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="726">
 <summary>
 Do not audit attempts to directly read removable devices.
 </summary>
@@ -89733,7 +72062,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_raw_write_removable_device" lineno="745">
+<interface name="storage_raw_write_removable_device" lineno="748">
 <summary>
 Allow the caller to directly write to
 a removable device.
@@ -89747,7 +72076,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="764">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="767">
 <summary>
 Do not audit attempts to directly write removable devices.
 </summary>
@@ -89757,7 +72086,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="storage_read_tape" lineno="783">
+<interface name="storage_read_tape" lineno="786">
 <summary>
 Allow the caller to directly read
 a tape device.
@@ -89768,7 +72097,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_write_tape" lineno="803">
+<interface name="storage_write_tape" lineno="806">
 <summary>
 Allow the caller to directly write
 a tape device.
@@ -89779,7 +72108,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_getattr_tape_dev" lineno="823">
+<interface name="storage_getattr_tape_dev" lineno="826">
 <summary>
 Allow the caller to get the attributes
 of device nodes of tape devices.
@@ -89790,7 +72119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_setattr_tape_dev" lineno="843">
+<interface name="storage_setattr_tape_dev" lineno="846">
 <summary>
 Allow the caller to set the attributes
 of device nodes of tape devices.
@@ -89801,7 +72130,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="storage_unconfined" lineno="862">
+<interface name="storage_unconfined" lineno="865">
 <summary>
 Unconfined access to storage devices.
 </summary>
@@ -90863,6 +73192,14 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
+<tunable name="guest_connect_network" dftval="false">
+<desc>
+<p>
+Determine whether guest can
+configure network manager.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="logadm" filename="policy/modules/roles/logadm.if">
 <summary>Log administrator role</summary>
@@ -91399,28 +73736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="abrt_read_pid_files" lineno="234">
-<summary>
-Read abrt PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="abrt_manage_pid_files" lineno="249">
-<summary>
-Create, read, write, and delete
-abrt PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="abrt_manage_runtime_files" lineno="265">
+<interface name="abrt_manage_runtime_files" lineno="235">
 <summary>
 Create, read, write, and delete
 abrt runtime files.
@@ -91431,7 +73747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="abrt_admin" lineno="291">
+<interface name="abrt_admin" lineno="261">
 <summary>
 All of the rules required to
 administrate an abrt environment,
@@ -91871,27 +74187,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="amavis_setattr_pid_files" lineno="184">
-<summary>
-Set attributes of amavis pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="amavis_create_pid_files" lineno="199">
-<summary>
-Create amavis pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="amavis_setattr_runtime_files" lineno="214">
+<interface name="amavis_setattr_runtime_files" lineno="184">
 <summary>
 Set attributes of amavis runtime files.
 </summary>
@@ -91901,7 +74197,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="amavis_create_runtime_files" lineno="233">
+<interface name="amavis_create_runtime_files" lineno="203">
 <summary>
 Create amavis runtime files.
 </summary>
@@ -91911,7 +74207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="amavis_admin" lineno="259">
+<interface name="amavis_admin" lineno="229">
 <summary>
 All of the rules required to
 administrate an amavis environment.
@@ -92665,6 +74961,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
+<interface name="apache_map_sys_content" lineno="1481">
+<summary>
+Map httpd sys content files.
+This interface is Gentoo-specific.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
 <tunable name="allow_httpd_anon_write" dftval="false">
 <desc>
 <p>
@@ -92973,17 +75280,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_read_pid_files" lineno="52">
-<summary>
-Read apcupsd PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="apcupsd_read_log" lineno="67">
+<interface name="apcupsd_read_log" lineno="53">
 <summary>
 Read apcupsd log files.
 </summary>
@@ -92994,7 +75291,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="apcupsd_append_log" lineno="87">
+<interface name="apcupsd_append_log" lineno="73">
 <summary>
 Append apcupsd log files.
 </summary>
@@ -93004,7 +75301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_cgi_script_domtrans" lineno="108">
+<interface name="apcupsd_cgi_script_domtrans" lineno="94">
 <summary>
 Execute a domain transition to
 run httpd_apcupsd_cgi_script.
@@ -93015,7 +75312,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="apcupsd_admin" lineno="138">
+<interface name="apcupsd_admin" lineno="124">
 <summary>
 All of the rules required to
 administrate an apcupsd environment.
@@ -93242,18 +75539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="asterisk_setattr_pid_files" lineno="93">
-<summary>
-Set attributes of the asterisk
-PID content.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="asterisk_admin" lineno="114">
+<interface name="asterisk_admin" lineno="99">
 <summary>
 All of the rules required to
 administrate an asterisk environment.
@@ -93430,27 +75716,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_create_pid_dirs" lineno="146">
-<summary>
-Create avahi pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_setattr_pid_dirs" lineno="161">
-<summary>
-Set attributes of avahi pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_setattr_runtime_dirs" lineno="176">
+<interface name="avahi_setattr_runtime_dirs" lineno="146">
 <summary>
 Set attributes of avahi runtime directories.
 </summary>
@@ -93460,7 +75726,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_create_runtime_dirs" lineno="195">
+<interface name="avahi_create_runtime_dirs" lineno="165">
 <summary>
 Create avahi runtime directories.
 </summary>
@@ -93470,49 +75736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_manage_pid_files" lineno="214">
-<summary>
-Create, read, and write avahi pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_dontaudit_search_pid" lineno="230">
-<summary>
-Do not audit attempts to search
-avahi pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="avahi_filetrans_pid" lineno="256">
-<summary>
-Create specified objects in generic
-pid directories with the avahi pid file type.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="avahi_manage_runtime_files" lineno="271">
+<interface name="avahi_manage_runtime_files" lineno="184">
 <summary>
 Create, read, and write avahi runtime files.
 </summary>
@@ -93522,7 +75746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="avahi_dontaudit_search_runtime" lineno="291">
+<interface name="avahi_dontaudit_search_runtime" lineno="204">
 <summary>
 Do not audit attempts to search
 avahi runtime directories.
@@ -93533,7 +75757,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="avahi_filetrans_runtime" lineno="320">
+<interface name="avahi_filetrans_runtime" lineno="233">
 <summary>
 Create specified objects in generic
 runtime directories with the avahi runtime file type.
@@ -93554,7 +75778,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="avahi_admin" lineno="345">
+<interface name="avahi_admin" lineno="258">
 <summary>
 All of the rules required to
 administrate an avahi environment.
@@ -93714,17 +75938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_setattr_pid_dirs" lineno="267">
-<summary>
-Set attributes of bind pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="bind_setattr_zone_dirs" lineno="281">
+<interface name="bind_setattr_zone_dirs" lineno="267">
 <summary>
 Set attributes of bind zone directories.
 </summary>
@@ -93734,7 +75948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_read_zone" lineno="299">
+<interface name="bind_read_zone" lineno="285">
 <summary>
 Read bind zone files.
 </summary>
@@ -93744,7 +75958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_manage_zone" lineno="319">
+<interface name="bind_manage_zone" lineno="305">
 <summary>
 Create, read, write, and delete
 bind zone files.
@@ -93755,7 +75969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="bind_admin" lineno="345">
+<interface name="bind_admin" lineno="331">
 <summary>
 All of the rules required to
 administrate an bind environment.
@@ -94222,17 +76436,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_read_pid_files" lineno="72">
-<summary>
-Read certmonger PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="certmonger_search_lib" lineno="86">
+<interface name="certmonger_search_lib" lineno="72">
 <summary>
 Search certmonger lib directories.
 </summary>
@@ -94242,7 +76446,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_read_lib_files" lineno="105">
+<interface name="certmonger_read_lib_files" lineno="91">
 <summary>
 Read certmonger lib files.
 </summary>
@@ -94252,7 +76456,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_manage_lib_files" lineno="125">
+<interface name="certmonger_manage_lib_files" lineno="111">
 <summary>
 Create, read, write, and delete
 certmonger lib files.
@@ -94263,7 +76467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="certmonger_admin" lineno="151">
+<interface name="certmonger_admin" lineno="137">
 <summary>
 All of the rules required to
 administrate an certmonger environment.
@@ -94651,18 +76855,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_manage_pid_content" lineno="101">
-<summary>
-Create, read, write, and delete
-clamav pid content.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="clamav_read_config" lineno="115">
+<interface name="clamav_read_config" lineno="100">
 <summary>
 Read clamav configuration files.
 </summary>
@@ -94672,7 +76865,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_search_lib" lineno="134">
+<interface name="clamav_search_lib" lineno="119">
 <summary>
 Search clamav library directories.
 </summary>
@@ -94682,7 +76875,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_domtrans_clamscan" lineno="153">
+<interface name="clamav_domtrans_clamscan" lineno="138">
 <summary>
 Execute a domain transition to run clamscan.
 </summary>
@@ -94692,7 +76885,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="clamav_exec_clamscan" lineno="172">
+<interface name="clamav_exec_clamscan" lineno="157">
 <summary>
 Execute clamscan in the caller domain.
 </summary>
@@ -94702,7 +76895,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_read_state_clamd" lineno="191">
+<interface name="clamav_read_state_clamd" lineno="176">
 <summary>
 Read clamd process state files.
 </summary>
@@ -94712,7 +76905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_read_signatures" lineno="219">
+<interface name="clamav_read_signatures" lineno="204">
 <summary>
 Read clam virus signature files
 </summary>
@@ -94729,7 +76922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_scannable_files" lineno="240">
+<interface name="clamav_scannable_files" lineno="225">
 <summary>
 Denote a particular type to be scanned by ClamAV
 </summary>
@@ -94739,7 +76932,7 @@ Type that clamd_t and clamscan_t can read.
 </summary>
 </param>
 </interface>
-<interface name="clamav_domtrans_freshclam" lineno="258">
+<interface name="clamav_domtrans_freshclam" lineno="243">
 <summary>
 Execute a domain transition to run freshclam.
 </summary>
@@ -94749,7 +76942,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="clamav_run_freshclam" lineno="284">
+<interface name="clamav_run_freshclam" lineno="269">
 <summary>
 Execute freshclam in the freshclam domain, and
 allow the specified role the freshclam domain.
@@ -94766,7 +76959,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="clamav_exec_freshclam" lineno="303">
+<interface name="clamav_exec_freshclam" lineno="288">
 <summary>
 Execute freshclam in the caller domain.
 </summary>
@@ -94776,7 +76969,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_enabledisable_clamd" lineno="322">
+<interface name="clamav_enabledisable_clamd" lineno="307">
 <summary>
 Allow specified domain to enable clamd units
 </summary>
@@ -94786,7 +76979,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_startstop_clamd" lineno="341">
+<interface name="clamav_startstop_clamd" lineno="326">
 <summary>
 Allow specified domain to start clamd units
 </summary>
@@ -94796,7 +76989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_status_clamd" lineno="360">
+<interface name="clamav_status_clamd" lineno="345">
 <summary>
 Allow specified domain to get status of clamd
 </summary>
@@ -94806,7 +76999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_reload_clamd" lineno="379">
+<interface name="clamav_reload_clamd" lineno="364">
 <summary>
 Allow specified domain reload of clamd
 </summary>
@@ -94816,7 +77009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_admin" lineno="405">
+<interface name="clamav_admin" lineno="390">
 <summary>
 All of the rules required to
 administrate an clamav environment.
@@ -94833,7 +77026,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="clamav_filetrans_log" lineno="444">
+<interface name="clamav_filetrans_log" lineno="429">
 <summary>
 specified domain creates /var/log/clamav/freshclam.log with correct type
 </summary>
@@ -94843,7 +77036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="clamav_filetrans_runtime_dir" lineno="462">
+<interface name="clamav_filetrans_runtime_dir" lineno="447">
 <summary>
 specified domain creates /run/clamav with correct type
 </summary>
@@ -95162,19 +77355,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="consolesetup_pid_filetrans_runtime" lineno="98">
-<summary>
-Create a console-setup directory in
-the runtime directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115">
+<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="98">
 <summary>
 Create a console-setup directory in
 the runtime directory.
@@ -95432,7 +77613,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_engine_tmp_files" lineno="474">
+<interface name="container_search_engine_tmp" lineno="474">
+<summary>
+Allow the specified domain to search
+container engine temporary directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_engine_tmp_files" lineno="494">
 <summary>
 Allow the specified domain to manage
 container engine temporary files.
@@ -95443,7 +77635,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_engine_tmp_sock_files" lineno="494">
+<interface name="container_manage_engine_tmp_sock_files" lineno="514">
 <summary>
 Allow the specified domain to manage
 container engine temporary named sockets.
@@ -95454,7 +77646,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_engine_tmp_filetrans" lineno="526">
+<interface name="container_engine_tmp_filetrans" lineno="546">
 <summary>
 Allow the specified domain to create
 objects in generic temporary directories
@@ -95477,7 +77669,18 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_read_system_container_state" lineno="545">
+<interface name="container_read_all_container_state" lineno="565">
+<summary>
+Read the process state (/proc/pid)
+of all containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_read_system_container_state" lineno="584">
 <summary>
 Read the process state (/proc/pid)
 of all system containers.
@@ -95488,7 +77691,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_read_user_container_state" lineno="564">
+<interface name="container_read_user_container_state" lineno="603">
 <summary>
 Read the process state (/proc/pid)
 of all user containers.
@@ -95499,7 +77702,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_all_containers" lineno="584">
+<interface name="container_read_all_container_engine_state" lineno="622">
+<summary>
+Read the process state (/proc/pid)
+of all container engines.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_all_containers" lineno="642">
 <summary>
 All of the permissions necessary
 for a container engine to manage
@@ -95511,7 +77725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_domtrans" lineno="604">
+<interface name="container_domtrans" lineno="662">
 <summary>
 Allow the specified domain to
 perform a type transition to
@@ -95523,7 +77737,18 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_system_containers" lineno="623">
+<interface name="container_stream_connect_system_engine" lineno="681">
+<summary>
+Connect to a system container engine
+domain over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_stream_connect_system_containers" lineno="703">
 <summary>
 Connect to a system container domain
 over a unix stream socket.
@@ -95534,7 +77759,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_user_containers" lineno="645">
+<interface name="container_stream_connect_user_containers" lineno="725">
 <summary>
 Connect to a user container domain
 over a unix stream socket.
@@ -95545,7 +77770,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_stream_connect_all_containers" lineno="667">
+<interface name="container_stream_connect_spc" lineno="747">
+<summary>
+Connect to super privileged containers
+over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_spc_tcp_sockets" lineno="769">
+<summary>
+Read and write super privileged
+container TCP sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_stream_connect_all_containers" lineno="788">
 <summary>
 Connect to a container domain
 over a unix stream socket.
@@ -95556,7 +77803,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_signal_all_containers" lineno="690">
+<interface name="container_stream_connect_spec_container" lineno="810">
+<summary>
+Connect to the specified container
+domain over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_kill_all_containers" lineno="831">
+<summary>
+Allow the specified domain to
+send a kill signal to all containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="container_signal_all_containers" lineno="851">
 <summary>
 Allow the specified domain to
 send all signals to a container
@@ -95568,7 +77837,58 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="container_setattr_container_ptys" lineno="708">
+<interface name="container_dev_filetrans" lineno="880">
+<summary>
+Create objects in /dev with an automatic
+transition to the container device type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_device_files" lineno="898">
+<summary>
+Read and write container device files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_device_files" lineno="916">
+<summary>
+Manage container device files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_mounton_all_devices" lineno="934">
+<summary>
+Mount on all container devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_setattr_container_ptys" lineno="952">
 <summary>
 Set the attributes of container ptys.
 </summary>
@@ -95578,7 +77898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_use_container_ptys" lineno="726">
+<interface name="container_use_container_ptys" lineno="970">
 <summary>
 Read and write container ptys.
 </summary>
@@ -95588,7 +77908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_mountpoint" lineno="745">
+<interface name="container_mountpoint" lineno="989">
 <summary>
 Make the specified type usable as a mountpoint
 for containers.
@@ -95599,10 +77919,56 @@ Type to be used as a mountpoint.
 </summary>
 </param>
 </interface>
-<interface name="container_create_config_files" lineno="764">
+<interface name="container_list_plugin_dirs" lineno="1009">
 <summary>
 Allow the specified domain to
-create container config files.
+list the contents of container
+plugin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_plugin_dirs" lineno="1029">
+<summary>
+Allow the specified domain to
+add a watch on container plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_plugin_files" lineno="1048">
+<summary>
+Allow the specified domain to
+manage container plugin files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_exec_plugins" lineno="1067">
+<summary>
+Allow the specified domain to
+execute container plugins.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_read_config" lineno="1087">
+<summary>
+Allow the specified domain to
+read container config files.
 </summary>
 <param name="domain">
 <summary>
@@ -95610,10 +77976,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_write_config_files" lineno="783">
+<interface name="container_watch_config_dirs" lineno="1107">
 <summary>
 Allow the specified domain to
-write container config files.
+watch container config directories.
 </summary>
 <param name="domain">
 <summary>
@@ -95621,7 +77987,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_config_files" lineno="802">
+<interface name="container_create_config_files" lineno="1126">
+<summary>
+Allow the specified domain to
+create container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_config_files" lineno="1145">
+<summary>
+Allow the specified domain to read
+and write container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_config_files" lineno="1164">
 <summary>
 Allow the specified domain to
 manage container config files.
@@ -95632,7 +78020,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_file_root_filetrans" lineno="823">
+<interface name="container_file_root_filetrans" lineno="1185">
 <summary>
 Allow the specified domain to
 create container files in the
@@ -95645,7 +78033,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_dirs" lineno="842">
+<interface name="container_manage_dirs" lineno="1204">
 <summary>
 Allow the specified domain to
 manage container file directories.
@@ -95656,7 +78044,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_files" lineno="861">
+<interface name="container_watch_dirs" lineno="1223">
+<summary>
+Allow the specified domain to
+watch container file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_files" lineno="1242">
 <summary>
 Allow the specified domain to
 manage container files.
@@ -95667,7 +78066,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_lnk_files" lineno="880">
+<interface name="container_dontaudit_relabel_dirs" lineno="1261">
+<summary>
+Do not audit attempts to relabel
+container file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="container_dontaudit_relabel_files" lineno="1280">
+<summary>
+Do not audit attempts to relabel
+container files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_lnk_files" lineno="1299">
 <summary>
 Allow the specified domain to
 manage container lnk files.
@@ -95678,7 +78099,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_fifo_files" lineno="899">
+<interface name="container_rw_fifo_files" lineno="1318">
+<summary>
+Allow the specified domain to
+read and write container fifo files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_fifo_files" lineno="1337">
 <summary>
 Allow the specified domain to
 manage container fifo files.
@@ -95689,7 +78121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_sock_files" lineno="918">
+<interface name="container_manage_sock_files" lineno="1356">
 <summary>
 Allow the specified domain to
 manage container sock files.
@@ -95700,7 +78132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_rw_chr_files" lineno="937">
+<interface name="container_rw_chr_files" lineno="1375">
 <summary>
 Allow the specified domain to read
 and write container chr files.
@@ -95711,7 +78143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_dontaudit_rw_chr_files" lineno="956">
+<interface name="container_dontaudit_rw_chr_files" lineno="1394">
 <summary>
 Do not audit attempts to read
 and write container chr files.
@@ -95722,7 +78154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_chr_files" lineno="975">
+<interface name="container_manage_chr_files" lineno="1413">
 <summary>
 Allow the specified domain to
 manage container chr files.
@@ -95733,7 +78165,47 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_config" lineno="994">
+<interface name="container_spec_filetrans_file" lineno="1449">
+<summary>
+Allow the specified domain to create
+objects in specified directories with
+an automatic type transition to the
+container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="domain">
+<summary>
+Directory to transition on.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_list_ro_dirs" lineno="1469">
+<summary>
+Allow the specified domain to list
+the contents of read-only container
+file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_home_config" lineno="1488">
 <summary>
 Allow the specified domain to
 manage container config home content.
@@ -95744,7 +78216,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_config_home_filetrans" lineno="1026">
+<interface name="container_config_home_filetrans" lineno="1520">
 <summary>
 Allow the specified domain to create
 objects in an xdg_config directory
@@ -95767,7 +78239,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_files" lineno="1046">
+<interface name="container_manage_home_data_files" lineno="1540">
 <summary>
 Allow the specified domain to
 manage container data home files.
@@ -95778,7 +78250,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_fifo_files" lineno="1066">
+<interface name="container_manage_home_data_fifo_files" lineno="1560">
 <summary>
 Allow the specified domain to
 manage container data home named
@@ -95790,7 +78262,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_home_data_sock_files" lineno="1086">
+<interface name="container_manage_home_data_sock_files" lineno="1580">
 <summary>
 Allow the specified domain to
 manage container data home named
@@ -95802,7 +78274,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_admin_all_files" lineno="1104">
+<interface name="container_admin_all_files" lineno="1598">
 <summary>
 Administrate all container files.
 </summary>
@@ -95812,7 +78284,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_admin_all_ro_files" lineno="1124">
+<interface name="container_admin_all_ro_files" lineno="1618">
 <summary>
 Administrate all container read-only files.
 </summary>
@@ -95822,7 +78294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_admin_all_user_runtime_content" lineno="1146">
+<interface name="container_admin_all_user_runtime_content" lineno="1640">
 <summary>
 All of the rules necessary for a user
 to manage user container runtime data
@@ -95834,7 +78306,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_all_home_content" lineno="1166">
+<interface name="container_manage_all_home_content" lineno="1660">
 <summary>
 All of the rules necessary for a user
 to manage container data in their home
@@ -95846,7 +78318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_relabel_all_content" lineno="1210">
+<interface name="container_relabel_all_content" lineno="1704">
 <summary>
 Allow the specified domain to
 relabel container files and
@@ -95858,7 +78330,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_remount_fs" lineno="1229">
+<interface name="container_remount_fs" lineno="1723">
 <summary>
 Allow the specified domain to
 remount container filesystems.
@@ -95869,7 +78341,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_relabel_fs" lineno="1248">
+<interface name="container_relabel_fs" lineno="1742">
 <summary>
 Allow the specified domain to
 relabel container filesystems.
@@ -95880,7 +78352,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_getattr_fs" lineno="1268">
+<interface name="container_getattr_fs" lineno="1762">
 <summary>
 Allow the specified domain to
 get the attributes of container
@@ -95892,7 +78364,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_search_runtime" lineno="1287">
+<interface name="container_search_runtime" lineno="1781">
 <summary>
 Allow the specified domain to search
 runtime container directories.
@@ -95903,7 +78375,30 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_files" lineno="1307">
+<interface name="container_read_runtime_files" lineno="1801">
+<summary>
+Allow the specified domain to read
+runtime container files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_getattr_runtime_sock_files" lineno="1822">
+<summary>
+Allow the specified domain to get
+the attributes runtime container of
+container runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_runtime_files" lineno="1841">
 <summary>
 Allow the specified domain to manage
 runtime container files.
@@ -95914,7 +78409,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_fifo_files" lineno="1326">
+<interface name="container_manage_runtime_fifo_files" lineno="1860">
 <summary>
 Allow the specified domain to manage
 runtime container named pipes.
@@ -95925,7 +78420,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_runtime_sock_files" lineno="1345">
+<interface name="container_manage_runtime_lnk_files" lineno="1879">
+<summary>
+Allow the specified domain to manage
+runtime container symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_runtime_sock_files" lineno="1898">
 <summary>
 Allow the specified domain to manage
 runtime container named sockets.
@@ -95936,7 +78442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_user_runtime_files" lineno="1364">
+<interface name="container_manage_user_runtime_files" lineno="1917">
 <summary>
 Allow the specified domain to manage
 user runtime container files.
@@ -95947,7 +78453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_rw_user_runtime_sock_files" lineno="1383">
+<interface name="container_rw_user_runtime_sock_files" lineno="1936">
 <summary>
 Allow the specified domain to read and
 write user runtime container named sockets.
@@ -95958,7 +78464,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_search_var_lib" lineno="1402">
+<interface name="container_search_var_lib" lineno="1955">
 <summary>
 Allow the specified domain to search
 container directories in /var/lib.
@@ -95969,9 +78475,32 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_files" lineno="1422">
+<interface name="container_list_var_lib" lineno="1976">
+<summary>
+Allow the specified domain to list
+the contents of container directories
+in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_dirs" lineno="1996">
 <summary>
 Allow the specified domain to manage
+container file directories in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_read_var_lib_files" lineno="2015">
+<summary>
+Allow the specified domain to read
 container files in /var/lib.
 </summary>
 <param name="domain">
@@ -95980,7 +78509,29 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_fifo_files" lineno="1441">
+<interface name="container_manage_var_lib_files" lineno="2034">
+<summary>
+Allow the specified domain to manage
+container files in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_map_var_lib_files" lineno="2053">
+<summary>
+Allow the specified domain to memory
+map container files in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_fifo_files" lineno="2072">
 <summary>
 Allow the specified domain to manage
 container named pipes in /var/lib.
@@ -95991,7 +78542,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_manage_var_lib_sock_files" lineno="1460">
+<interface name="container_manage_var_lib_lnk_files" lineno="2091">
+<summary>
+Allow the specified domain to manage
+container symlinks in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_sock_files" lineno="2110">
 <summary>
 Allow the specified domain to manage
 container named sockets in /var/lib.
@@ -96002,7 +78564,74 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_unlabeled_var_lib_filetrans" lineno="1491">
+<interface name="container_var_lib_filetrans" lineno="2140">
+<summary>
+Allow the specified domain to create
+objects in /var/lib with an automatic
+transition to the container var lib type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_var_lib_filetrans_file" lineno="2170">
+<summary>
+Allow the specified domain to create
+objects in /var/lib with an automatic
+transition to the container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_filetrans_var_lib_file" lineno="2201">
+<summary>
+Allow the specified domain to create
+objects in container /var/lib directories
+with an automatic transition to the
+container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_unlabeled_var_lib_filetrans" lineno="2233">
 <summary>
 Allow the specified domain to create
 objects in unlabeled directories with
@@ -96025,7 +78654,140 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="container_start_units" lineno="1512">
+<interface name="container_search_logs" lineno="2254">
+<summary>
+Allow the specified domain to search
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_list_log_dirs" lineno="2274">
+<summary>
+Allow the specified domain to list
+the contents of container log directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_create_log_dirs" lineno="2293">
+<summary>
+Allow the specified domain to create
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_dirs" lineno="2312">
+<summary>
+Allow the specified domain to manage
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_log_dirs" lineno="2331">
+<summary>
+Allow the specified domain to watch
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_create_log_files" lineno="2350">
+<summary>
+Allow the specified domain to create
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_append_log_files" lineno="2369">
+<summary>
+Allow the specified domain to append
+data to container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_files" lineno="2388">
+<summary>
+Allow the specified domain to manage
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_log_files" lineno="2407">
+<summary>
+Allow the specified domain to watch
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_log_filetrans" lineno="2438">
+<summary>
+Allow the specified domain to create
+objects in log directories with an
+automatic transition to the container
+log type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_symlinks" lineno="2458">
+<summary>
+Allow the specified domain to manage
+container log symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_start_units" lineno="2477">
 <summary>
 Allow the specified domain to start
 systemd units for containers.
@@ -96036,7 +78798,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="container_admin" lineno="1539">
+<interface name="container_admin" lineno="2504">
 <summary>
 All of the rules required to
 administrate a container
@@ -96084,6 +78846,27 @@ Allow containers to read all public content.
 </p>
 </desc>
 </tunable>
+<tunable name="container_spc_create_nfs_servers" dftval="false">
+<desc>
+<p>
+Allow super privileged containers to create NFS servers.
+</p>
+</desc>
+</tunable>
+<tunable name="container_spc_use_tun_tap_dev" dftval="false">
+<desc>
+<p>
+Allow super privileged containers to use tun-tap devices.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_dri" dftval="false">
+<desc>
+<p>
+Allow containers to use direct rendering devices.
+</p>
+</desc>
+</tunable>
 <tunable name="container_use_ecryptfs" dftval="false">
 <desc>
 <p>
@@ -96091,6 +78874,13 @@ Allow containers to use eCryptfs filesystems.
 </p>
 </desc>
 </tunable>
+<tunable name="container_use_hugetlbfs" dftval="false">
+<desc>
+<p>
+Allow containers to use huge pages.
+</p>
+</desc>
+</tunable>
 <tunable name="container_use_nfs" dftval="false">
 <desc>
 <p>
@@ -96240,17 +79030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="couchdb_read_pid_files" lineno="70">
-<summary>
-Read couchdb pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="couchdb_read_runtime_files" lineno="85">
+<interface name="couchdb_read_runtime_files" lineno="70">
 <summary>
 Read couchdb runtime files.
 </summary>
@@ -96260,7 +79040,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="couchdb_admin" lineno="111">
+<interface name="couchdb_admin" lineno="96">
 <summary>
 All of the rules required to
 administrate an couchdb environment.
@@ -96389,6 +79169,64 @@ Domain allowed access.
 </param>
 </interface>
 </module>
+<module name="crio" filename="policy/modules/services/crio.if">
+<summary>policy for cri-o</summary>
+<interface name="crio_domtrans" lineno="13">
+<summary>
+Execute CRI-O in the crio domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="crio_run" lineno="39">
+<summary>
+Execute CRI-O in the crio domain,
+and allow the specified role the
+kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the crio domain.
+</summary>
+</param>
+</interface>
+<interface name="crio_read_conmon_state" lineno="60">
+<summary>
+Read the process state (/proc/pid)
+of CRI-O conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="crio_admin" lineno="85">
+<summary>
+All of the rules required to administrate
+a CRI-O environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
 <module name="cron" filename="policy/modules/services/cron.if">
 <summary>Periodic execution of scheduled commands.</summary>
 <template name="cron_common_crontab_template" lineno="13">
@@ -96670,18 +79508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_manage_pid_files" lineno="674">
-<summary>
-Create, read, write, and delete
-crond pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="cron_anacron_domtrans_system_job" lineno="689">
+<interface name="cron_anacron_domtrans_system_job" lineno="674">
 <summary>
 Execute anacron in the cron
 system domain.
@@ -96692,7 +79519,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cron_use_system_job_fds" lineno="708">
+<interface name="cron_use_system_job_fds" lineno="693">
 <summary>
 Use system cron job file descriptors.
 </summary>
@@ -96702,7 +79529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_manage_system_spool" lineno="726">
+<interface name="cron_manage_system_spool" lineno="711">
 <summary>
 Create, read, write, and delete the system spool.
 </summary>
@@ -96712,7 +79539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_spool" lineno="745">
+<interface name="cron_read_system_spool" lineno="730">
 <summary>
 Read the system spool.
 </summary>
@@ -96722,7 +79549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_tmp_files" lineno="765">
+<interface name="cron_rw_tmp_files" lineno="750">
 <summary>
 Read and write crond temporary files.
 </summary>
@@ -96732,7 +79559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_job_lib_files" lineno="783">
+<interface name="cron_read_system_job_lib_files" lineno="768">
 <summary>
 Read system cron job lib files.
 </summary>
@@ -96742,7 +79569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_manage_system_job_lib_files" lineno="803">
+<interface name="cron_manage_system_job_lib_files" lineno="788">
 <summary>
 Create, read, write, and delete
 system cron job lib files.
@@ -96753,7 +79580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_write_system_job_pipes" lineno="822">
+<interface name="cron_write_system_job_pipes" lineno="807">
 <summary>
 Write system cron job unnamed pipes.
 </summary>
@@ -96763,7 +79590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_system_job_pipes" lineno="841">
+<interface name="cron_rw_system_job_pipes" lineno="826">
 <summary>
 Read and write system cron job
 unnamed pipes.
@@ -96774,7 +79601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_system_job_stream_sockets" lineno="860">
+<interface name="cron_rw_system_job_stream_sockets" lineno="845">
 <summary>
 Read and write inherited system cron
 job unix domain stream sockets.
@@ -96785,7 +79612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_read_system_job_tmp_files" lineno="878">
+<interface name="cron_read_system_job_tmp_files" lineno="863">
 <summary>
 Read system cron job temporary files.
 </summary>
@@ -96795,7 +79622,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="898">
+<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="883">
 <summary>
 Do not audit attempts to append temporary
 system cron job files.
@@ -96806,7 +79633,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="cron_rw_inherited_system_job_tmp_files" lineno="916">
+<interface name="cron_rw_inherited_system_job_tmp_files" lineno="901">
 <summary>
 Read and write to inherited system cron job temporary files.
 </summary>
@@ -96816,7 +79643,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="935">
+<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="920">
 <summary>
 Do not audit attempts to write temporary
 system cron job files.
@@ -96827,7 +79654,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="cron_exec_crontab" lineno="954">
+<interface name="cron_exec_crontab" lineno="939">
 <summary>
 Execute crontab in the caller domain.
 </summary>
@@ -96838,7 +79665,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cron_admin" lineno="980">
+<interface name="cron_admin" lineno="965">
 <summary>
 All of the rules required to
 administrate a cron environment.
@@ -97002,17 +79829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_read_pid_files" lineno="107">
-<summary>
-Read cups PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="cups_read_runtime_files" lineno="122">
+<interface name="cups_read_runtime_files" lineno="107">
 <summary>
 Read cups runtime files.
 </summary>
@@ -97022,7 +79839,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_domtrans_config" lineno="142">
+<interface name="cups_domtrans_config" lineno="127">
 <summary>
 Execute cups_config in the
 cups config domain.
@@ -97033,7 +79850,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cups_signal_config" lineno="162">
+<interface name="cups_signal_config" lineno="147">
 <summary>
 Send generic signals to the cups
 configuration daemon.
@@ -97044,7 +79861,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_dbus_chat_config" lineno="181">
+<interface name="cups_dbus_chat_config" lineno="166">
 <summary>
 Send and receive messages from
 cupsd_config over dbus.
@@ -97055,7 +79872,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_read_config" lineno="202">
+<interface name="cups_read_config" lineno="187">
 <summary>
 Read cups configuration files.
 </summary>
@@ -97066,7 +79883,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_read_rw_config" lineno="222">
+<interface name="cups_read_rw_config" lineno="207">
 <summary>
 Read cups-writable configuration files.
 </summary>
@@ -97077,7 +79894,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_read_log" lineno="242">
+<interface name="cups_read_log" lineno="227">
 <summary>
 Read cups log files.
 </summary>
@@ -97088,7 +79905,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="cups_append_log" lineno="261">
+<interface name="cups_append_log" lineno="246">
 <summary>
 Append cups log files.
 </summary>
@@ -97098,7 +79915,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_write_log" lineno="280">
+<interface name="cups_write_log" lineno="265">
 <summary>
 Write cups log files.
 </summary>
@@ -97108,7 +79925,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_stream_connect_ptal" lineno="300">
+<interface name="cups_stream_connect_ptal" lineno="285">
 <summary>
 Connect to ptal over an unix
 domain stream socket.
@@ -97119,7 +79936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_read_state" lineno="319">
+<interface name="cups_read_state" lineno="304">
 <summary>
 Read the process state (/proc/pid) of cupsd.
 </summary>
@@ -97129,7 +79946,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="cups_domtrans_hplip" lineno="341">
+<interface name="cups_domtrans_hplip" lineno="326">
 <summary>
 Execute HP Linux Imaging and
 Printing applications in their
@@ -97141,7 +79958,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="cups_admin" lineno="367">
+<interface name="cups_admin" lineno="352">
 <summary>
 All of the rules required to
 administrate an cups environment.
@@ -97671,7 +80488,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_unconfined" lineno="733">
+<interface name="dbus_dontaudit_write_system_bus_runtime_named_sockets" lineno="734">
+<summary>
+Do not audit attempts to write to
+system bus runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="752">
 <summary>
 Unconfined access to DBUS.
 </summary>
@@ -97681,7 +80509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="782">
 <summary>
 Create resources in /run or /var/run with the system_dbusd_runtime_t
 label. This method is deprecated in favor of the init_daemon_run_dir
@@ -97703,7 +80531,7 @@ Optional file name used for the resource
 </summary>
 </param>
 </interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="796">
 <summary>
 Create directories with the system_dbusd_runtime_t label
 </summary>
@@ -97896,28 +80724,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="devicekit_read_pid_files" lineno="212">
-<summary>
-Read devicekit PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="devicekit_manage_pid_files" lineno="228">
-<summary>
-Create, read, write, and delete
-devicekit PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="devicekit_read_runtime_files" lineno="243">
+<interface name="devicekit_read_runtime_files" lineno="212">
 <summary>
 Read devicekit runtime files.
 </summary>
@@ -97927,7 +80734,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="devicekit_manage_runtime_files" lineno="263">
+<interface name="devicekit_manage_runtime_files" lineno="232">
 <summary>
 Create, read, write, and delete
 devicekit runtime files.
@@ -97938,7 +80745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="devicekit_admin" lineno="289">
+<interface name="devicekit_admin" lineno="258">
 <summary>
 All of the rules required to
 administrate an devicekit environment.
@@ -98267,75 +81074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_delete_pid_files" lineno="149">
-<summary>
-Delete dnsmasq pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_manage_pid_files" lineno="165">
-<summary>
-Create, read, write, and delete
-dnsmasq pid files  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_read_pid_files" lineno="181">
-<summary>
-Read dnsmasq pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_create_pid_dirs" lineno="196">
-<summary>
-Create dnsmasq pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_spec_filetrans_pid" lineno="228">
-<summary>
-Create specified objects in specified
-directories with a type transition to
-the dnsmasq pid file type.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="file_type">
-<summary>
-Directory to transition on.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_create_runtime_dirs" lineno="243">
+<interface name="dnsmasq_create_runtime_dirs" lineno="148">
 <summary>
 Create dnsmasq runtime directories.
 </summary>
@@ -98345,7 +81084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274">
+<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="179">
 <summary>
 Create specified objects in specified
 directories with a type transition to
@@ -98367,7 +81106,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_read_runtime_files" lineno="293">
+<interface name="dnsmasq_read_runtime_files" lineno="198">
 <summary>
 Read dnsmasq runtime files.
 </summary>
@@ -98377,7 +81116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_delete_runtime_files" lineno="312">
+<interface name="dnsmasq_delete_runtime_files" lineno="217">
 <summary>
 Delete dnsmasq runtime files.
 </summary>
@@ -98387,7 +81126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_manage_runtime_files" lineno="331">
+<interface name="dnsmasq_manage_runtime_files" lineno="236">
 <summary>
 Create, read, write, and delete
 dnsmasq runtime files
@@ -98398,7 +81137,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dnsmasq_admin" lineno="357">
+<interface name="dnsmasq_admin" lineno="262">
 <summary>
 All of the rules required to
 administrate an dnsmasq environment.
@@ -98783,17 +81522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_pid_files" lineno="116">
-<summary>
-Read exim pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="exim_read_log" lineno="131">
+<interface name="exim_read_log" lineno="117">
 <summary>
 Read exim log files.
 </summary>
@@ -98804,7 +81533,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="exim_append_log" lineno="150">
+<interface name="exim_append_log" lineno="136">
 <summary>
 Append exim log files.
 </summary>
@@ -98814,7 +81543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_log" lineno="171">
+<interface name="exim_manage_log" lineno="157">
 <summary>
 Create, read, write, and delete
 exim log files.
@@ -98826,7 +81555,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="exim_manage_spool_dirs" lineno="191">
+<interface name="exim_manage_spool_dirs" lineno="177">
 <summary>
 Create, read, write, and delete
 exim spool directories.
@@ -98837,7 +81566,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_spool_files" lineno="210">
+<interface name="exim_read_spool_files" lineno="196">
 <summary>
 Read exim spool files.
 </summary>
@@ -98847,7 +81576,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_spool_files" lineno="231">
+<interface name="exim_manage_spool_files" lineno="217">
 <summary>
 Create, read, write, and delete
 exim spool files.
@@ -98858,7 +81587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_read_var_lib_files" lineno="250">
+<interface name="exim_read_var_lib_files" lineno="236">
 <summary>
 Read exim var lib files.
 </summary>
@@ -98868,7 +81597,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_manage_var_lib_files" lineno="269">
+<interface name="exim_manage_var_lib_files" lineno="255">
 <summary>
 Create, read, and write exim var lib files.
 </summary>
@@ -98878,7 +81607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="exim_admin" lineno="295">
+<interface name="exim_admin" lineno="281">
 <summary>
 All of the rules required to
 administrate an exim environment.
@@ -99047,17 +81776,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="fail2ban_read_pid_files" lineno="233">
-<summary>
-Read fail2ban pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fail2ban_admin" lineno="254">
+<interface name="fail2ban_admin" lineno="240">
 <summary>
 All of the rules required to
 administrate an fail2ban environment.
@@ -99743,35 +82462,44 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="glance_read_pid_files" lineno="192">
+<interface name="glance_admin" lineno="199">
 <summary>
-Read glance pid files.  (Deprecated)
+All of the rules required to
+administrate an glance environment.
 </summary>
 <param name="domain">
 <summary>
 Domain allowed access.
 </summary>
 </param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
 </interface>
-<interface name="glance_manage_pid_files" lineno="207">
+</module>
+<module name="glusterfs" filename="policy/modules/services/glusterfs.if">
+<summary>Cluster File System binary, daemon and command line.</summary>
+<interface name="glusterfs_domtrans_daemon" lineno="13">
 <summary>
-Create, read, write, and delete
-glance pid files.  (Deprecated)
+Execute glusterd in the glusterd domain.
 </summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="glance_admin" lineno="228">
+<interface name="glusterfs_run_daemon" lineno="39">
 <summary>
-All of the rules required to
-administrate an glance environment.
+Execute glusterd in the glusterd domain, and
+allow the specified role the glusterd domain.
 </summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain allowed to transition.
 </summary>
 </param>
 <param name="role">
@@ -99781,10 +82509,38 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-</module>
-<module name="glusterfs" filename="policy/modules/services/glusterfs.if">
-<summary>Cluster File System binary, daemon and command line.</summary>
-<interface name="glusterfs_admin" lineno="20">
+<interface name="glusterfs_stream_connect_daemon" lineno="58">
+<summary>
+Connect to glusterd over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_use_daemon_fds" lineno="79">
+<summary>
+Inherit and use glusterd file descriptors.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_search_bricks" lineno="98">
+<summary>
+Search through the contents of gluster brick
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_admin" lineno="123">
 <summary>
 All of the rules required to
 administrate an glusterfs environment.
@@ -99801,6 +82557,16 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
+<tunable name="glusterfs_modify_policy" dftval="false">
+<desc>
+<p>
+Allow the gluster daemon to automatically
+add and remove file contexts from the local
+SELinux policy when adding and removing
+bricks.
+</p>
+</desc>
+</tunable>
 </module>
 <module name="gnomeclock" filename="policy/modules/services/gnomeclock.if">
 <summary>Gnome clock handler for setting the time.</summary>
@@ -100029,17 +82795,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="gssproxy_read_pid_files" lineno="108">
-<summary>
-Read gssproxy PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="gssproxy_stream_connect" lineno="123">
+<interface name="gssproxy_stream_connect" lineno="109">
 <summary>
 Connect to gssproxy over an unix
 domain stream socket.
@@ -100050,7 +82806,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="gssproxy_admin" lineno="145">
+<interface name="gssproxy_admin" lineno="131">
 <summary>
 All of the rules required to administrate
 an gssproxy environment
@@ -100286,7 +83042,24 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="hddtemp_exec" lineno="32">
+<interface name="hddtemp_run" lineno="39">
+<summary>
+Execute hddtemp in the hddtemp domain, and
+allow the specified role the hdd domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="hddtemp_exec" lineno="59">
 <summary>
 Execute hddtemp in the caller domain.
 </summary>
@@ -100296,7 +83069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="hddtemp_admin" lineno="58">
+<interface name="hddtemp_admin" lineno="85">
 <summary>
 All of the rules required to
 administrate an hddtemp environment.
@@ -100396,17 +83169,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="icecast_read_pid_files" lineno="68">
-<summary>
-Read icecast pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="icecast_manage_pid_files" lineno="83">
+<interface name="icecast_manage_pid_files" lineno="69">
 <summary>
 Create, read, write, and delete
 icecast pid files.
@@ -100417,7 +83180,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_read_log" lineno="103">
+<interface name="icecast_read_log" lineno="89">
 <summary>
 Read icecast log files.
 </summary>
@@ -100428,7 +83191,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="icecast_append_log" lineno="122">
+<interface name="icecast_append_log" lineno="108">
 <summary>
 Append icecast log files.
 </summary>
@@ -100438,7 +83201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_manage_log" lineno="142">
+<interface name="icecast_manage_log" lineno="128">
 <summary>
 Create, read, write, and delete
 icecast log files.
@@ -100449,7 +83212,7 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="icecast_admin" lineno="168">
+<interface name="icecast_admin" lineno="154">
 <summary>
 All of the rules required to
 administrate an icecast environment.
@@ -100518,17 +83281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ifplugd_read_pid_files" lineno="90">
-<summary>
-Read ifplugd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ifplugd_admin" lineno="111">
+<interface name="ifplugd_admin" lineno="97">
 <summary>
 All of the rules required to
 administrate an ifplugd environment.
@@ -100703,18 +83456,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="inn_manage_pid" lineno="100">
-<summary>
-Create, read, write, and delete
-innd pid content.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="inn_manage_runtime_dirs" lineno="118">
+<interface name="inn_manage_runtime_dirs" lineno="100">
 <summary>
 Create, read, write, and delete
 innd runtime dirs.
@@ -100725,7 +83467,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_manage_runtime_files" lineno="138">
+<interface name="inn_manage_runtime_files" lineno="120">
 <summary>
 Create, read, write, and delete
 innd runtime files.
@@ -100736,7 +83478,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_manage_runtime_sockets" lineno="158">
+<interface name="inn_manage_runtime_sockets" lineno="140">
 <summary>
 Create, read, write, and delete
 innd runtime named sockets.
@@ -100747,7 +83489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_config" lineno="178">
+<interface name="inn_read_config" lineno="160">
 <summary>
 Read innd configuration content.
 </summary>
@@ -100757,7 +83499,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_news_lib" lineno="198">
+<interface name="inn_read_news_lib" lineno="180">
 <summary>
 Read innd news library content.
 </summary>
@@ -100767,7 +83509,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_read_news_spool" lineno="217">
+<interface name="inn_read_news_spool" lineno="199">
 <summary>
 Read innd news spool content.
 </summary>
@@ -100777,7 +83519,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_dgram_send" lineno="237">
+<interface name="inn_dgram_send" lineno="219">
 <summary>
 Send to a innd unix dgram socket.
 </summary>
@@ -100787,7 +83529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="inn_domtrans" lineno="256">
+<interface name="inn_domtrans" lineno="238">
 <summary>
 Execute innd in the innd domain.
 </summary>
@@ -100797,7 +83539,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="inn_admin" lineno="282">
+<interface name="inn_admin" lineno="264">
 <summary>
 All of the rules required to
 administrate an inn environment.
@@ -101360,6 +84102,480 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="kubernetes" filename="policy/modules/services/kubernetes.if">
+<summary>policy for kubernetes</summary>
+<template name="kubernetes_kubectl_role" lineno="29">
+<summary>
+Role access for kubectl.
+</summary>
+<param name="role_prefix">
+<summary>
+The prefix of the user role (e.g., user
+is the prefix for user_r).
+</summary>
+</param>
+<param name="user_domain">
+<summary>
+User domain for the role.
+</summary>
+</param>
+<param name="user_exec_domain">
+<summary>
+User exec domain for execute and transition access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access
+</summary>
+</param>
+</template>
+<interface name="kubernetes_domtrans_kubelet" lineno="81">
+<summary>
+Execute kubelet in the kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_kubelet" lineno="107">
+<summary>
+Execute kubelet in the kubelet domain,
+and allow the specified role the
+kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the kubelet domain.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_stream_connect_kubelet" lineno="127">
+<summary>
+Connect to kubelet over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_kubelet_state" lineno="149">
+<summary>
+Read the process state (/proc/pid)
+of kubelet.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_use_kubelet_fds" lineno="168">
+<summary>
+Inherit and use file descriptors from
+kubelet.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_kubelet_kill" lineno="187">
+<summary>
+Allow kubelet to send a kill signal
+to the specified domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_domtrans_kubeadm" lineno="205">
+<summary>
+Execute kubeadm in the kubeadm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_kubeadm" lineno="231">
+<summary>
+Execute kubeadm in the kubeadm domain,
+and allow the specified role the
+kubeadm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the kubeadm domain.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_container_engine" lineno="254">
+<summary>
+Associated the specified domain to
+be a domain which is capable of
+operating as a kubernetes container
+engine.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_container" lineno="276">
+<summary>
+Associated the specified domain to
+be a domain which is capable of
+operating as a container domain
+which can be spawned by kubernetes.
+engine.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mountpoint" lineno="295">
+<summary>
+Allow the specified file type to be
+mounted on by kubernetes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_getpgid_containers" lineno="315">
+<summary>
+Allow the specified domain to
+get the process group ID of all
+kubernetes containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_engine_bpf" lineno="334">
+<summary>
+Run kubernetes container engine bpf
+programs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_search_config" lineno="352">
+<summary>
+Search kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_config" lineno="371">
+<summary>
+Read kubernetes config files and symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mounton_config_dirs" lineno="391">
+<summary>
+Mount on kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_config_dirs" lineno="410">
+<summary>
+Allow the specified domain to watch
+kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_config_files" lineno="428">
+<summary>
+Manage kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mounton_config_files" lineno="446">
+<summary>
+Mount on kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_config_files" lineno="465">
+<summary>
+Allow the specified domain to watch
+kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_search_plugin_dirs" lineno="485">
+<summary>
+Allow the specified domain to search
+through the contents of kubernetes plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_list_plugins" lineno="506">
+<summary>
+Allow the specified domain to list
+the contents of kubernetes plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_plugin_dirs" lineno="525">
+<summary>
+Allow the specified domain to watch
+kubernetes plugin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_plugin_files" lineno="544">
+<summary>
+Allow the specified domain to manage
+kubernetes plugin files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_list_tmpfs" lineno="563">
+<summary>
+List the contents of kubernetes tmpfs
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_dirs" lineno="581">
+<summary>
+Manage kubernetes tmpfs directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_tmpfs_dirs" lineno="599">
+<summary>
+Watch kubernetes tmpfs directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_tmpfs_files" lineno="617">
+<summary>
+Read kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_files" lineno="635">
+<summary>
+Manage kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_tmpfs_files" lineno="653">
+<summary>
+Watch kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_tmpfs_symlinks" lineno="671">
+<summary>
+Read kubernetes tmpfs symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_symlinks" lineno="689">
+<summary>
+Manage kubernetes tmpfs symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_dirs" lineno="708">
+<summary>
+Relabel directories from the kubernetes
+tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_files" lineno="726">
+<summary>
+Relabel files from the kubernetes tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_symlinks" lineno="744">
+<summary>
+Relabel symlinks from the kubernetes tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_get_unit_status" lineno="762">
+<summary>
+Get the status of kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_start_unit" lineno="781">
+<summary>
+Start kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_stop_unit" lineno="800">
+<summary>
+Stop kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_reload_unit" lineno="819">
+<summary>
+Reload kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_admin" lineno="845">
+<summary>
+All of the rules required to administrate
+a kubernetes environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
 <module name="l2tp" filename="policy/modules/services/l2tp.if">
 <summary>Layer 2 Tunneling Protocol.</summary>
 <interface name="l2tpd_dgram_send" lineno="14">
@@ -102043,28 +85259,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="memcached_manage_pid_files" lineno="33">
-<summary>
-Create, read, write, and delete
-memcached pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="memcached_read_pid_files" lineno="48">
-<summary>
-Read memcached pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="memcached_manage_runtime_files" lineno="63">
+<interface name="memcached_manage_runtime_files" lineno="33">
 <summary>
 Create, read, write, and delete
 memcached runtime files.
@@ -102075,7 +85270,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_stream_connect" lineno="83">
+<interface name="memcached_stream_connect" lineno="53">
 <summary>
 Connect to memcached using a unix
 domain stream socket.
@@ -102086,7 +85281,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_tcp_connect" lineno="102">
+<interface name="memcached_tcp_connect" lineno="72">
 <summary>
 Connect to memcache over the network.
 </summary>
@@ -102096,7 +85291,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="memcached_admin" lineno="129">
+<interface name="memcached_admin" lineno="99">
 <summary>
 All of the rules required to
 administrate an memcached environment.
@@ -103088,7 +86283,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="855">
+<interface name="mta_rw_inherited_delivery_pipes" lineno="854">
+<summary>
+read and write fifo files inherited from delivery domains
+</summary>
+<param name="domain">
+<summary>
+Domain to use fifo files
+</summary>
+</param>
+</interface>
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="875">
 <summary>
 Do not audit attempts to read
 mail spool symlinks.
@@ -103099,7 +86304,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_getattr_spool" lineno="873">
+<interface name="mta_getattr_spool" lineno="893">
 <summary>
 Get attributes of mail spool content.
 </summary>
@@ -103109,7 +86314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="895">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="915">
 <summary>
 Do not audit attempts to get
 attributes of mail spool files.
@@ -103120,7 +86325,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_spool_filetrans" lineno="933">
+<interface name="mta_spool_filetrans" lineno="953">
 <summary>
 Create specified objects in the
 mail spool directory with a
@@ -103147,7 +86352,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_spool_files" lineno="952">
+<interface name="mta_read_spool_files" lineno="972">
 <summary>
 Read mail spool files.
 </summary>
@@ -103157,7 +86362,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_spool" lineno="972">
+<interface name="mta_rw_spool" lineno="992">
 <summary>
 Read and write mail spool files.
 </summary>
@@ -103167,7 +86372,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_append_spool" lineno="993">
+<interface name="mta_append_spool" lineno="1013">
 <summary>
 Create, read, and write mail spool files.
 </summary>
@@ -103177,7 +86382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_delete_spool" lineno="1014">
+<interface name="mta_delete_spool" lineno="1034">
 <summary>
 Delete mail spool files.
 </summary>
@@ -103187,7 +86392,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_spool" lineno="1034">
+<interface name="mta_manage_spool" lineno="1054">
 <summary>
 Create, read, write, and delete
 mail spool content.
@@ -103198,7 +86403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_watch_spool" lineno="1056">
+<interface name="mta_watch_spool" lineno="1076">
 <summary>
 Watch mail spool content.
 </summary>
@@ -103208,7 +86413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_queue_filetrans" lineno="1091">
+<interface name="mta_queue_filetrans" lineno="1111">
 <summary>
 Create specified objects in the
 mail queue spool directory with a
@@ -103235,7 +86440,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="mta_search_queue" lineno="1110">
+<interface name="mta_search_queue" lineno="1130">
 <summary>
 Search mail queue directories.
 </summary>
@@ -103245,7 +86450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_list_queue" lineno="1129">
+<interface name="mta_list_queue" lineno="1149">
 <summary>
 List mail queue directories.
 </summary>
@@ -103255,7 +86460,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_queue" lineno="1148">
+<interface name="mta_read_queue" lineno="1168">
 <summary>
 Read mail queue files.
 </summary>
@@ -103265,7 +86470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1168">
+<interface name="mta_dontaudit_rw_queue" lineno="1188">
 <summary>
 Do not audit attempts to read and
 write mail queue content.
@@ -103276,7 +86481,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="mta_manage_queue" lineno="1188">
+<interface name="mta_manage_queue" lineno="1208">
 <summary>
 Create, read, write, and delete
 mail queue content.
@@ -103287,7 +86492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_read_sendmail_bin" lineno="1208">
+<interface name="mta_read_sendmail_bin" lineno="1228">
 <summary>
 Read sendmail binary.
 </summary>
@@ -103297,7 +86502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1227">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1247">
 <summary>
 Read and write unix domain stream
 sockets of all base mail domains.
@@ -103618,28 +86823,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="mysql_read_pid_files" lineno="399">
-<summary>
-Read mysqld pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="mysql_search_pid_files" lineno="414">
-<summary>
-Search mysqld pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-
-</interface>
-<interface name="mysql_admin" lineno="435">
+<interface name="mysql_admin" lineno="406">
 <summary>
 All of the rules required to
 administrate an mysqld environment.
@@ -103656,7 +86840,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mysql_setattr_run_dirs" lineno="477">
+<interface name="mysql_setattr_run_dirs" lineno="448">
 <summary>
 Set the attributes of the MySQL run directories
 </summary>
@@ -103666,7 +86850,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="mysql_create_run_dirs" lineno="495">
+<interface name="mysql_create_run_dirs" lineno="466">
 <summary>
 Create MySQL run directories
 </summary>
@@ -103676,7 +86860,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="mysql_generic_run_filetrans_run" lineno="526">
+<interface name="mysql_generic_run_filetrans_run" lineno="497">
 <summary>
 Automatically use the MySQL run label for created resources in generic
 run locations. This method is deprecated in favor of the
@@ -103988,17 +87172,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_read_pid_files" lineno="284">
-<summary>
-Read networkmanager pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="networkmanager_read_runtime_files" lineno="299">
+<interface name="networkmanager_read_runtime_files" lineno="284">
 <summary>
 Read networkmanager runtime files.
 </summary>
@@ -104008,7 +87182,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_stream_connect" lineno="319">
+<interface name="networkmanager_stream_connect" lineno="304">
 <summary>
 Connect to networkmanager over
 a unix domain stream socket.
@@ -104019,7 +87193,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_enabledisable" lineno="338">
+<interface name="networkmanager_enabledisable" lineno="323">
 <summary>
 Allow specified domain to enable/disable NetworkManager units
 </summary>
@@ -104029,7 +87203,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_startstop" lineno="357">
+<interface name="networkmanager_startstop" lineno="342">
 <summary>
 Allow specified domain to start/stop NetworkManager units
 </summary>
@@ -104039,7 +87213,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_status" lineno="376">
+<interface name="networkmanager_status" lineno="361">
 <summary>
 Allow specified domain to get status of NetworkManager
 </summary>
@@ -104049,7 +87223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_admin" lineno="402">
+<interface name="networkmanager_admin" lineno="387">
 <summary>
 All of the rules required to
 administrate an networkmanager environment.
@@ -104066,7 +87240,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441">
+<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="426">
 <summary>
 Do not audit use of wpa_cli file descriptors
 </summary>
@@ -104076,7 +87250,7 @@ Domain to dontaudit access.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_domtrans_wpa_cli" lineno="460">
+<interface name="networkmanager_domtrans_wpa_cli" lineno="445">
 <summary>
 Execute wpa_cli in the wpa_cli domain.
 </summary>
@@ -104086,7 +87260,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="networkmanager_run_wpa_cli" lineno="486">
+<interface name="networkmanager_run_wpa_cli" lineno="471">
 <summary>
 Execute wpa cli in the wpa_cli domain, and
 allow the specified role the wpa_cli domain.
@@ -104103,7 +87277,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="networkmanager_rw_rawip_sockets" lineno="507">
+<interface name="networkmanager_rw_rawip_sockets" lineno="492">
 <summary>
 Read and write networkmanager rawip sockets.
 </summary>
@@ -104230,17 +87404,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_read_ypbind_pid" lineno="223">
-<summary>
-Read ypbind pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nis_read_ypbind_runtime_files" lineno="238">
+<interface name="nis_read_ypbind_runtime_files" lineno="223">
 <summary>
 Read ypbind runtime files.
 </summary>
@@ -104250,17 +87414,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_delete_ypbind_pid" lineno="257">
-<summary>
-Delete ypbind pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nis_read_ypserv_config" lineno="271">
+<interface name="nis_read_ypserv_config" lineno="242">
 <summary>
 Read ypserv configuration files.
 </summary>
@@ -104270,7 +87424,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nis_domtrans_ypxfr" lineno="290">
+<interface name="nis_domtrans_ypxfr" lineno="261">
 <summary>
 Execute ypxfr in the ypxfr domain.
 </summary>
@@ -104280,7 +87434,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_initrc_domtrans" lineno="311">
+<interface name="nis_initrc_domtrans" lineno="282">
 <summary>
 Execute nis init scripts in
 the init script domain.
@@ -104291,7 +87445,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_initrc_domtrans_ypbind" lineno="330">
+<interface name="nis_initrc_domtrans_ypbind" lineno="301">
 <summary>
 Execute ypbind init scripts in
 the init script domain.
@@ -104302,7 +87456,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nis_admin" lineno="355">
+<interface name="nis_admin" lineno="326">
 <summary>
 All of the rules required to
 administrate an nis environment.
@@ -104408,28 +87562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_dontaudit_search_pid" lineno="186">
-<summary>
-Do not audit attempts to search
-nscd pid directories.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="nscd_read_pid" lineno="201">
-<summary>
-Read nscd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nscd_dontaudit_search_runtime" lineno="217">
+<interface name="nscd_dontaudit_search_runtime" lineno="186">
 <summary>
 Do not audit attempts to search
 nscd runtime directories.
@@ -104440,7 +87573,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="nscd_read_runtime_files" lineno="235">
+<interface name="nscd_read_runtime_files" lineno="204">
 <summary>
 Read nscd runtime files.
 </summary>
@@ -104450,7 +87583,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_unconfined" lineno="254">
+<interface name="nscd_unconfined" lineno="223">
 <summary>
 Unconfined access to nscd services.
 </summary>
@@ -104460,7 +87593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_run" lineno="279">
+<interface name="nscd_run" lineno="248">
 <summary>
 Execute nscd in the nscd domain, and
 allow the specified role the nscd domain.
@@ -104476,7 +87609,7 @@ Role allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nscd_initrc_domtrans" lineno="299">
+<interface name="nscd_initrc_domtrans" lineno="268">
 <summary>
 Execute the nscd server init
 script in the initrc domain.
@@ -104487,7 +87620,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nscd_admin" lineno="324">
+<interface name="nscd_admin" lineno="293">
 <summary>
 All of the rules required to
 administrate an nscd environment.
@@ -104555,17 +87688,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="nslcd_read_pid_files" lineno="50">
-<summary>
-Read nslcd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nslcd_stream_connect" lineno="65">
+<interface name="nslcd_stream_connect" lineno="51">
 <summary>
 Connect to nslcd over an unix
 domain stream socket.
@@ -104576,7 +87699,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="nslcd_admin" lineno="91">
+<interface name="nslcd_admin" lineno="77">
 <summary>
 All of the rules required to
 administrate an nslcd environment.
@@ -105215,17 +88338,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="openct_read_pid_files" lineno="69">
-<summary>
-Read openct pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="openct_read_runtime_files" lineno="84">
+<interface name="openct_read_runtime_files" lineno="69">
 <summary>
 Read openct runtime files.
 </summary>
@@ -105235,7 +88348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openct_stream_connect" lineno="104">
+<interface name="openct_stream_connect" lineno="89">
 <summary>
 Connect to openct over an unix
 domain stream socket.
@@ -105246,7 +88359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openct_admin" lineno="130">
+<interface name="openct_admin" lineno="115">
 <summary>
 All of the rules required to
 administrate an openct environment.
@@ -105284,6 +88397,53 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="opensm" filename="policy/modules/services/opensm.if">
+<summary>OpenSM is a software implementation of an InfiniBand subnet manager.</summary>
+<interface name="opensm_domtrans" lineno="13">
+<summary>
+Execute opensm in the opensm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="opensm_run" lineno="39">
+<summary>
+Execute opensm in the opensm domain, and
+allow the specified role the opensm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="opensm_admin" lineno="66">
+<summary>
+All of the rules required to administrate
+an opensm environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
 <module name="openvpn" filename="policy/modules/services/openvpn.if">
 <summary>full-featured SSL VPN solution.</summary>
 <interface name="openvpn_domtrans" lineno="14">
@@ -105402,17 +88562,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="openvswitch_read_pid_files" lineno="32">
-<summary>
-Read openvswitch pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="openvswitch_read_runtime_files" lineno="47">
+<interface name="openvswitch_read_runtime_files" lineno="32">
 <summary>
 Read openvswitch runtime files.
 </summary>
@@ -105422,7 +88572,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="openvswitch_admin" lineno="73">
+<interface name="openvswitch_admin" lineno="58">
 <summary>
 All of the rules required to
 administrate an openvswitch environment.
@@ -105499,17 +88649,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="pcscd_read_pid_files" lineno="32">
-<summary>
-Read pcscd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcscd_read_runtime_files" lineno="47">
+<interface name="pcscd_read_runtime_files" lineno="32">
 <summary>
 Read pcscd runtime files.
 </summary>
@@ -105519,7 +88659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="pcscd_stream_connect" lineno="67">
+<interface name="pcscd_stream_connect" lineno="52">
 <summary>
 Connect to pcscd over an unix
 domain stream socket.
@@ -105530,7 +88670,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="pcscd_admin" lineno="96">
+<interface name="pcscd_admin" lineno="81">
 <summary>
 All of the rules required to
 administrate an pcscd environment.
@@ -105784,27 +88924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="plymouthd_read_pid_files" lineno="244">
-<summary>
-Read plymouthd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="plymouthd_delete_pid_files" lineno="259">
-<summary>
-Delete the plymouthd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="plymouthd_read_runtime_files" lineno="274">
+<interface name="plymouthd_read_runtime_files" lineno="244">
 <summary>
 Read plymouthd runtime files.
 </summary>
@@ -105814,7 +88934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="plymouthd_delete_runtime_files" lineno="293">
+<interface name="plymouthd_delete_runtime_files" lineno="263">
 <summary>
 Delete the plymouthd runtime files.
 </summary>
@@ -105824,7 +88944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="plymouthd_admin" lineno="319">
+<interface name="plymouthd_admin" lineno="289">
 <summary>
 All of the rules required to
 administrate an plymouthd environment.
@@ -105989,7 +89109,7 @@ MLS range to transition to.
 </interface>
 <interface name="podman_rw_conmon_pipes" lineno="272">
 <summary>
-Read and write podman conmon unnamed pipes.
+Read and write conmon unnamed pipes.
 </summary>
 <param name="domain">
 <summary>
@@ -105997,10 +89117,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="podman_use_conmon_fds" lineno="293">
+<interface name="podman_use_conmon_fds" lineno="291">
 <summary>
 Allow the specified domain to inherit
-file descriptors from podman conmon.
+and use file descriptors from conmon.
 </summary>
 <param name="domain">
 <summary>
@@ -106008,7 +89128,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="podman_user_role" lineno="330">
+<template name="podman_user_role" lineno="326">
 <summary>
 Role access for rootless podman.
 </summary>
@@ -106035,7 +89155,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </template>
-<interface name="podman_admin" lineno="367">
+<interface name="podman_admin" lineno="363">
 <summary>
 All of the rules required to
 administrate a podman
@@ -107296,49 +90416,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ppp_read_pid_files" lineno="366">
-<summary>
-Read ppp pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ppp_manage_pid_files" lineno="382">
-<summary>
-Create, read, write, and delete
-ppp pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ppp_pid_filetrans" lineno="408">
-<summary>
-Create specified pppd pid objects
-with a type transition.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="ppp_read_runtime_files" lineno="423">
+<interface name="ppp_read_runtime_files" lineno="366">
 <summary>
 Read ppp runtime files.
 </summary>
@@ -107348,7 +90426,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ppp_manage_runtime_files" lineno="443">
+<interface name="ppp_manage_runtime_files" lineno="386">
 <summary>
 Create, read, write, and delete
 ppp runtime files.
@@ -107359,7 +90437,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ppp_runtime_filetrans" lineno="473">
+<interface name="ppp_runtime_filetrans" lineno="416">
 <summary>
 Create specified pppd runtime objects
 with a type transition.
@@ -107380,7 +90458,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="ppp_initrc_domtrans" lineno="492">
+<interface name="ppp_initrc_domtrans" lineno="435">
 <summary>
 Execute pppd init script in
 the initrc domain.
@@ -107391,7 +90469,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ppp_admin" lineno="517">
+<interface name="ppp_admin" lineno="460">
 <summary>
 All of the rules required to
 administrate an ppp environment.
@@ -107683,27 +90761,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_read_pid_files" lineno="111">
-<summary>
-Read psad pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="psad_rw_pid_files" lineno="125">
-<summary>
-Read and write psad pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="psad_read_log" lineno="140">
+<interface name="psad_read_log" lineno="112">
 <summary>
 Read psad log content.
 </summary>
@@ -107714,7 +90772,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="psad_append_log" lineno="161">
+<interface name="psad_append_log" lineno="133">
 <summary>
 Append psad log files.
 </summary>
@@ -107725,7 +90783,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="psad_rw_fifo_file" lineno="180">
+<interface name="psad_rw_fifo_file" lineno="152">
 <summary>
 Read and write psad fifo files.
 </summary>
@@ -107735,7 +90793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_rw_tmp_files" lineno="199">
+<interface name="psad_rw_tmp_files" lineno="171">
 <summary>
 Read and write psad temporary files.
 </summary>
@@ -107745,7 +90803,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="psad_admin" lineno="225">
+<interface name="psad_admin" lineno="197">
 <summary>
 All of the rules required to
 administrate an psad environment.
@@ -108015,17 +91073,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_read_pid_files" lineno="87">
-<summary>
-Read qpidd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="qpidd_search_lib" lineno="101">
+<interface name="qpidd_search_lib" lineno="87">
 <summary>
 Search qpidd lib directories.
 </summary>
@@ -108035,7 +91083,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_read_lib_files" lineno="120">
+<interface name="qpidd_read_lib_files" lineno="106">
 <summary>
 Read qpidd lib files.
 </summary>
@@ -108045,7 +91093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_manage_lib_files" lineno="140">
+<interface name="qpidd_manage_lib_files" lineno="126">
 <summary>
 Create, read, write, and delete
 qpidd lib files.
@@ -108056,7 +91104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="qpidd_admin" lineno="166">
+<interface name="qpidd_admin" lineno="152">
 <summary>
 All of the rules required to
 administrate an qpidd environment.
@@ -108463,17 +91511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_read_pid_files" lineno="190">
-<summary>
-Read rhsmcertd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhsmcertd_stream_connect" lineno="205">
+<interface name="rhsmcertd_stream_connect" lineno="191">
 <summary>
 Connect to rhsmcertd with a
 unix domain stream socket.
@@ -108484,7 +91522,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_dbus_chat" lineno="225">
+<interface name="rhsmcertd_dbus_chat" lineno="211">
 <summary>
 Send and receive messages from
 rhsmcertd over dbus.
@@ -108495,7 +91533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247">
+<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="233">
 <summary>
 Do not audit attempts to send
 and receive messages from
@@ -108507,7 +91545,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="rhsmcertd_admin" lineno="274">
+<interface name="rhsmcertd_admin" lineno="260">
 <summary>
 All of the rules required to
 administrate an rhsmcertd environment.
@@ -108793,7 +91831,29 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="rpc_read_nfs_content" lineno="195">
+<interface name="rpc_read_rpcd_state" lineno="195">
+<summary>
+Read the process state (/proc/pid) of
+rpcd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_use_nfsd_fds" lineno="214">
+<summary>
+Inherit and use file descriptors from
+nfsd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_read_nfs_content" lineno="233">
 <summary>
 Read nfs exported content.
 </summary>
@@ -108804,7 +91864,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="rpc_manage_nfs_rw_content" lineno="217">
+<interface name="rpc_manage_nfs_rw_content" lineno="255">
 <summary>
 Create, read, write, and delete
 nfs exported read write content.
@@ -108816,7 +91876,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="rpc_manage_nfs_ro_content" lineno="239">
+<interface name="rpc_manage_nfs_ro_content" lineno="277">
 <summary>
 Create, read, write, and delete
 nfs exported read only content.
@@ -108828,7 +91888,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="rpc_tcp_rw_nfs_sockets" lineno="259">
+<interface name="rpc_tcp_rw_nfs_sockets" lineno="297">
 <summary>
 Read and write to nfsd tcp sockets.
 </summary>
@@ -108838,7 +91898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpc_udp_rw_nfs_sockets" lineno="277">
+<interface name="rpc_udp_rw_nfs_sockets" lineno="315">
 <summary>
 Read and write to nfsd udp sockets.
 </summary>
@@ -108848,7 +91908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpc_search_nfs_state_data" lineno="295">
+<interface name="rpc_search_nfs_state_data" lineno="333">
 <summary>
 Search nfs lib directories.
 </summary>
@@ -108858,7 +91918,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpc_read_nfs_state_data" lineno="314">
+<interface name="rpc_create_nfs_state_data_dirs" lineno="352">
+<summary>
+Create nfs lib directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_read_nfs_state_data" lineno="371">
 <summary>
 Read nfs lib files.
 </summary>
@@ -108868,7 +91938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpc_manage_nfs_state_data" lineno="334">
+<interface name="rpc_manage_nfs_state_data" lineno="391">
 <summary>
 Create, read, write, and delete
 nfs lib files.
@@ -108879,7 +91949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpc_admin" lineno="364">
+<interface name="rpc_admin" lineno="421">
 <summary>
 All of the rules required to
 administrate an rpc environment.
@@ -108946,17 +92016,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_read_pid_files" lineno="52">
-<summary>
-Read rpcbind pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpcbind_search_lib" lineno="66">
+<interface name="rpcbind_search_lib" lineno="52">
 <summary>
 Search rpcbind lib directories.
 </summary>
@@ -108966,7 +92026,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_read_lib_files" lineno="85">
+<interface name="rpcbind_read_lib_files" lineno="71">
 <summary>
 Read rpcbind lib files.
 </summary>
@@ -108976,7 +92036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_manage_lib_files" lineno="105">
+<interface name="rpcbind_manage_lib_files" lineno="91">
 <summary>
 Create, read, write, and delete
 rpcbind lib files.
@@ -108987,7 +92047,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_signull" lineno="124">
+<interface name="rpcbind_signull" lineno="110">
 <summary>
 Send null signals to rpcbind.
 </summary>
@@ -108997,7 +92057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="rpcbind_admin" lineno="149">
+<interface name="rpcbind_admin" lineno="135">
 <summary>
 All of the rules required to
 administrate an rpcbind environment.
@@ -109774,17 +92834,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="samba_read_winbind_pid" lineno="718">
-<summary>
-Read winbind pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="samba_read_winbind_runtime_files" lineno="733">
+<interface name="samba_read_winbind_runtime_files" lineno="718">
 <summary>
 Read winbind runtime files.
 </summary>
@@ -109794,7 +92844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_stream_connect_winbind" lineno="753">
+<interface name="samba_stream_connect_winbind" lineno="738">
 <summary>
 Connect to winbind with a unix
 domain stream socket.
@@ -109805,7 +92855,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="samba_admin" lineno="779">
+<interface name="samba_admin" lineno="764">
 <summary>
 All of the rules required to
 administrate an samba environment.
@@ -109937,18 +92987,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="sanlock_manage_pid_files" lineno="52">
-<summary>
-Create, read, write, and delete
-sanlock pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sanlock_stream_connect" lineno="67">
+<interface name="sanlock_stream_connect" lineno="52">
 <summary>
 Connect to sanlock with a unix
 domain stream socket.
@@ -109959,7 +92998,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sanlock_admin" lineno="93">
+<interface name="sanlock_admin" lineno="78">
 <summary>
 All of the rules required to
 administrate an sanlock environment.
@@ -110005,7 +93044,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sasl_admin" lineno="39">
+<interface name="sasl_read_keytab" lineno="32">
+<summary>
+Read SASL keytab files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sasl_admin" lineno="58">
 <summary>
 All of the rules required to
 administrate an sasl environment.
@@ -110471,28 +93520,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_read_pid_files" lineno="51">
-<summary>
-Read smokeping pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="smokeping_manage_pid_files" lineno="66">
-<summary>
-Create, read, write, and delete
-smokeping pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="smokeping_getattr_lib_files" lineno="80">
+<interface name="smokeping_getattr_lib_files" lineno="51">
 <summary>
 Get attributes of smokeping lib files.
 </summary>
@@ -110502,7 +93530,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_read_lib_files" lineno="99">
+<interface name="smokeping_read_lib_files" lineno="70">
 <summary>
 Read smokeping lib files.
 </summary>
@@ -110512,7 +93540,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_manage_lib_files" lineno="119">
+<interface name="smokeping_manage_lib_files" lineno="90">
 <summary>
 Create, read, write, and delete
 smokeping lib files.
@@ -110523,7 +93551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="smokeping_admin" lineno="145">
+<interface name="smokeping_admin" lineno="116">
 <summary>
 All of the rules required to
 administrate a smokeping environment.
@@ -110929,17 +93957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_read_spamd_pid_files" lineno="376">
-<summary>
-Read spamd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="spamassassin_read_spamd_runtime_files" lineno="391">
+<interface name="spamassassin_read_spamd_runtime_files" lineno="376">
 <summary>
 Read spamd runtime files.
 </summary>
@@ -110949,7 +93967,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_read_spamd_tmp_files" lineno="410">
+<interface name="spamassassin_read_spamd_tmp_files" lineno="395">
 <summary>
 Read temporary spamd files.
 </summary>
@@ -110959,7 +93977,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="429">
+<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="414">
 <summary>
 Do not audit attempts to get
 attributes of temporary spamd sockets.
@@ -110970,7 +93988,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_stream_connect_spamd" lineno="448">
+<interface name="spamassassin_stream_connect_spamd" lineno="433">
 <summary>
 Connect to spamd with a unix
 domain stream socket.
@@ -110981,7 +93999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="spamassassin_admin" lineno="474">
+<interface name="spamassassin_admin" lineno="459">
 <summary>
 All of the rules required to
 administrate an spamassassin environment.
@@ -111238,7 +94256,7 @@ is the prefix for sshd_t).
 </summary>
 </param>
 </template>
-<template name="ssh_role_template" lineno="322">
+<template name="ssh_role_template" lineno="321">
 <summary>
 Role access for ssh
 </summary>
@@ -111264,7 +94282,7 @@ Role allowed access
 </summary>
 </param>
 </template>
-<interface name="ssh_sigchld" lineno="487">
+<interface name="ssh_sigchld" lineno="486">
 <summary>
 Send a SIGCHLD signal to the ssh server.
 </summary>
@@ -111274,7 +94292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signal" lineno="505">
+<interface name="ssh_signal" lineno="504">
 <summary>
 Send a generic signal to the ssh server.
 </summary>
@@ -111284,7 +94302,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_signull" lineno="523">
+<interface name="ssh_signull" lineno="522">
 <summary>
 Send a null signal to sshd processes.
 </summary>
@@ -111294,7 +94312,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_pipes" lineno="541">
+<interface name="ssh_read_pipes" lineno="540">
 <summary>
 Read a ssh server unnamed pipe.
 </summary>
@@ -111304,7 +94322,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_pipes" lineno="558">
+<interface name="ssh_rw_pipes" lineno="557">
 <summary>
 Read and write a ssh server unnamed pipe.
 </summary>
@@ -111314,7 +94332,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_stream_sockets" lineno="576">
+<interface name="ssh_rw_stream_sockets" lineno="575">
 <summary>
 Read and write ssh server unix domain stream sockets.
 </summary>
@@ -111324,7 +94342,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_rw_tcp_sockets" lineno="594">
+<interface name="ssh_rw_tcp_sockets" lineno="593">
 <summary>
 Read and write ssh server TCP sockets.
 </summary>
@@ -111334,7 +94352,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="612">
 <summary>
 Do not audit attempts to read and write
 ssh server TCP sockets.
@@ -111345,7 +94363,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec_sshd" lineno="631">
+<interface name="ssh_exec_sshd" lineno="630">
 <summary>
 Execute the ssh daemon in the caller domain.
 </summary>
@@ -111355,7 +94373,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans" lineno="650">
+<interface name="ssh_domtrans" lineno="649">
 <summary>
 Execute the ssh daemon sshd domain.
 </summary>
@@ -111365,7 +94383,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_client_domtrans" lineno="668">
+<interface name="ssh_client_domtrans" lineno="667">
 <summary>
 Execute the ssh client in the ssh client domain.
 </summary>
@@ -111375,7 +94393,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_exec" lineno="686">
+<interface name="ssh_exec" lineno="685">
 <summary>
 Execute the ssh client in the caller domain.
 </summary>
@@ -111385,7 +94403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_setattr_key_files" lineno="705">
+<interface name="ssh_setattr_key_files" lineno="704">
 <summary>
 Set the attributes of sshd key files.
 </summary>
@@ -111395,7 +94413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_agent_exec" lineno="724">
+<interface name="ssh_agent_exec" lineno="723">
 <summary>
 Execute the ssh agent client in the caller domain.
 </summary>
@@ -111405,7 +94423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_setattr_home_dirs" lineno="743">
+<interface name="ssh_setattr_home_dirs" lineno="742">
 <summary>
 Set the attributes of ssh home directory (~/.ssh)
 </summary>
@@ -111415,7 +94433,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_create_home_dirs" lineno="761">
+<interface name="ssh_create_home_dirs" lineno="760">
 <summary>
 Create ssh home directory (~/.ssh)
 </summary>
@@ -111425,7 +94443,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_user_home_files" lineno="780">
+<interface name="ssh_read_user_home_files" lineno="779">
 <summary>
 Read ssh home directory content
 </summary>
@@ -111435,7 +94453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_domtrans_keygen" lineno="801">
+<interface name="ssh_domtrans_keygen" lineno="800">
 <summary>
 Execute the ssh key generator in the ssh keygen domain.
 </summary>
@@ -111445,7 +94463,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ssh_read_server_keys" lineno="819">
+<interface name="ssh_read_server_keys" lineno="818">
 <summary>
 Read ssh server keys
 </summary>
@@ -111455,7 +94473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="837">
+<interface name="ssh_dontaudit_read_server_keys" lineno="836">
 <summary>
 Do not audit denials on reading ssh server keys
 </summary>
@@ -111465,7 +94483,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="ssh_manage_home_files" lineno="855">
+<interface name="ssh_manage_home_files" lineno="854">
 <summary>
 Manage ssh home directory content
 </summary>
@@ -111475,7 +94493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_delete_tmp" lineno="874">
+<interface name="ssh_delete_tmp" lineno="873">
 <summary>
 Delete from the ssh temp files.
 </summary>
@@ -111485,7 +94503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ssh_dontaudit_agent_tmp" lineno="893">
+<interface name="ssh_dontaudit_agent_tmp" lineno="892">
 <summary>
 dontaudit access to ssh agent tmp dirs
 </summary>
@@ -111602,28 +94620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_read_pid_files" lineno="168">
-<summary>
-Read sssd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sssd_manage_pids" lineno="184">
-<summary>
-Create, read, write, and delete
-sssd pid content.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sssd_read_runtime_files" lineno="198">
+<interface name="sssd_read_runtime_files" lineno="168">
 <summary>
 Read sssd runtime files.
 </summary>
@@ -111633,7 +94630,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_search_lib" lineno="217">
+<interface name="sssd_search_lib" lineno="187">
 <summary>
 Search sssd lib directories.
 </summary>
@@ -111643,7 +94640,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_dontaudit_search_lib" lineno="237">
+<interface name="sssd_dontaudit_search_lib" lineno="207">
 <summary>
 Do not audit attempts to search
 sssd lib directories.
@@ -111654,7 +94651,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="sssd_read_lib_files" lineno="255">
+<interface name="sssd_read_lib_files" lineno="225">
 <summary>
 Read sssd lib files.
 </summary>
@@ -111664,7 +94661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_manage_lib_files" lineno="276">
+<interface name="sssd_manage_lib_files" lineno="246">
 <summary>
 Create, read, write, and delete
 sssd lib files.
@@ -111675,7 +94672,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_dbus_chat" lineno="297">
+<interface name="sssd_dbus_chat" lineno="267">
 <summary>
 Send and receive messages from
 sssd over dbus.
@@ -111686,7 +94683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_stream_connect" lineno="318">
+<interface name="sssd_stream_connect" lineno="288">
 <summary>
 Connect to sssd with a unix
 domain stream socket.
@@ -111697,7 +94694,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sssd_admin" lineno="344">
+<interface name="sssd_admin" lineno="314">
 <summary>
 All of the rules required to
 administrate an sssd environment.
@@ -111766,6 +94763,113 @@ Role allowed access.
 <rolecap/>
 </interface>
 </module>
+<module name="sympa" filename="policy/modules/services/sympa.if">
+<summary>Sympa mailing list manager</summary>
+<desc>
+Sympa is a popular mailing list manager.
+https://www.sympa.org/
+</desc>
+<interface name="sympa_append_inherited_var_files" lineno="17">
+<summary>
+Allow appending to sympa_var_t (for error log)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_read_var_files" lineno="36">
+<summary>
+Allow reading sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_var_files" lineno="55">
+<summary>
+Allow managing sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_map_var_files" lineno="73">
+<summary>
+Allow mapping sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_domtrans" lineno="91">
+<summary>
+Transition to sympa_t when executing sympa_exec_t
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="symba_dontaudit_rw_inherited_tcp_sockets" lineno="109">
+<summary>
+Dontaudit access to inherited sympa tcp sockets
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit
+</summary>
+</param>
+</interface>
+<interface name="sympa_read_conf" lineno="127">
+<summary>
+Allow reading sympa config files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_runtime_files" lineno="146">
+<summary>
+Allow rw sympa runtime dirs and manage sympa runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_runtime_sock_files" lineno="165">
+<summary>
+Allow rw sympa runtime dirs and manage sympa runtime sock files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_connect_runtime_sock_files" lineno="184">
+<summary>
+Allow domain to connect to sympa socket
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+</module>
 <module name="sysstat" filename="policy/modules/services/sysstat.if">
 <summary>Reports on various system states.</summary>
 <interface name="sysstat_manage_log" lineno="15">
@@ -112345,28 +95449,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="tuned_read_pid_files" lineno="51">
-<summary>
-Read tuned pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="tuned_manage_pid_files" lineno="66">
-<summary>
-Create, read, write, and delete
-tuned pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="tuned_initrc_domtrans" lineno="81">
+<interface name="tuned_initrc_domtrans" lineno="52">
 <summary>
 Execute tuned init scripts in
 the initrc domain.
@@ -112377,7 +95460,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="tuned_admin" lineno="106">
+<interface name="tuned_admin" lineno="77">
 <summary>
 All of the rules required to
 administrate an tuned environment.
@@ -112656,17 +95739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="uuidd_read_pid_files" lineno="129">
-<summary>
-Read uuidd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="uuidd_stream_connect_manager" lineno="144">
+<interface name="uuidd_stream_connect_manager" lineno="130">
 <summary>
 Connect to uuidd with an unix
 domain stream socket.
@@ -112677,7 +95750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="uuidd_admin" lineno="170">
+<interface name="uuidd_admin" lineno="156">
 <summary>
 All of the rules required to
 administrate an uuidd environment.
@@ -112856,17 +95929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vdagent_read_pid_files" lineno="69">
-<summary>
-Read vdagent pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vdagent_stream_connect" lineno="84">
+<interface name="vdagent_stream_connect" lineno="70">
 <summary>
 Connect to vdagent with a unix
 domain stream socket.
@@ -112877,7 +95940,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vdagent_admin" lineno="110">
+<interface name="vdagent_admin" lineno="96">
 <summary>
 All of the rules required to
 administrate an vdagent environment.
@@ -112960,28 +96023,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_read_pid_files" lineno="128">
-<summary>
-Read vhostmd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vhostmd_manage_pid_files" lineno="143">
-<summary>
-Create, read, write, and delete
-vhostmd pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vhostmd_stream_connect" lineno="158">
+<interface name="vhostmd_stream_connect" lineno="129">
 <summary>
 Connect to vhostmd with a unix
 domain stream socket.
@@ -112992,7 +96034,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178">
+<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="149">
 <summary>
 Do not audit attempts to read and
 write vhostmd unix domain stream sockets.
@@ -113003,7 +96045,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="vhostmd_admin" lineno="203">
+<interface name="vhostmd_admin" lineno="174">
 <summary>
 All of the rules required to
 administrate an vhostmd environment.
@@ -113366,28 +96408,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="virt_read_pid_files" lineno="753">
-<summary>
-Read virt pid files.  (Depprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="virt_manage_pid_files" lineno="769">
-<summary>
-Create, read, write, and delete
-virt pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="virt_read_runtime_files" lineno="783">
+<interface name="virt_read_runtime_files" lineno="753">
 <summary>
 Read virt runtime files.
 </summary>
@@ -113397,7 +96418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_runtime_filetrans" lineno="818">
+<interface name="virt_runtime_filetrans" lineno="788">
 <summary>
 Create an object in the libvirt runtime directory, with a private type.
 </summary>
@@ -113423,7 +96444,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="virt_search_lib" lineno="836">
+<interface name="virt_search_lib" lineno="806">
 <summary>
 Search virt lib directories.
 </summary>
@@ -113433,7 +96454,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_read_lib_files" lineno="855">
+<interface name="virt_read_lib_files" lineno="825">
 <summary>
 Read virt lib files.
 </summary>
@@ -113443,7 +96464,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_lib_files" lineno="876">
+<interface name="virt_manage_lib_files" lineno="846">
 <summary>
 Create, read, write, and delete
 virt lib files.
@@ -113454,34 +96475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_pid_filetrans" lineno="912">
-<summary>
-Create objects in virt pid
-directories with a private type.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="virt_read_log" lineno="928">
+<interface name="virt_read_log" lineno="866">
 <summary>
 Read virt log files.
 </summary>
@@ -113492,7 +96486,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="virt_append_log" lineno="947">
+<interface name="virt_append_log" lineno="885">
 <summary>
 Append virt log files.
 </summary>
@@ -113502,7 +96496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_log" lineno="967">
+<interface name="virt_manage_log" lineno="905">
 <summary>
 Create, read, write, and delete
 virt log files.
@@ -113513,7 +96507,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_search_images" lineno="988">
+<interface name="virt_search_images" lineno="926">
 <summary>
 Search virt image directories.
 </summary>
@@ -113523,7 +96517,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_read_images" lineno="1007">
+<interface name="virt_read_images" lineno="945">
 <summary>
 Read virt image files.
 </summary>
@@ -113533,7 +96527,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_rw_all_image_chr_files" lineno="1043">
+<interface name="virt_rw_all_image_chr_files" lineno="981">
 <summary>
 Read and write all virt image
 character files.
@@ -113544,7 +96538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_virt_cache" lineno="1064">
+<interface name="virt_manage_virt_cache" lineno="1002">
 <summary>
 Create, read, write, and delete
 virt cache content.
@@ -113555,7 +96549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_manage_images" lineno="1086">
+<interface name="virt_manage_images" lineno="1024">
 <summary>
 Create, read, write, and delete
 virt image files.
@@ -113566,7 +96560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_use_fds" lineno="1122">
+<interface name="virt_lxc_use_fds" lineno="1060">
 <summary>
 Inherit and use virtd lxc
 file descriptors.
@@ -113577,7 +96571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_sigchld" lineno="1140">
+<interface name="virt_lxc_sigchld" lineno="1078">
 <summary>
 Send a SIGCHLD to virtd lxc.
 </summary>
@@ -113587,7 +96581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_rw_pipes" lineno="1158">
+<interface name="virt_lxc_rw_pipes" lineno="1096">
 <summary>
 Read and write virtd lxc unamed pipes.
 </summary>
@@ -113597,7 +96591,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_stream_connect" lineno="1177">
+<interface name="virt_lxc_stream_connect" lineno="1115">
 <summary>
 Connect to virtd lxc over
 a unix stream socket.
@@ -113608,7 +96602,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_list_runtime" lineno="1197">
+<interface name="virt_lxc_list_runtime" lineno="1135">
 <summary>
 List the contents of virtd lxc
 directories.
@@ -113619,7 +96613,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_lxc_read_runtime" lineno="1215">
+<interface name="virt_lxc_read_runtime" lineno="1153">
 <summary>
 Read virtd lxc runtime files.
 </summary>
@@ -113629,7 +96623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_virsh_use_fds" lineno="1234">
+<interface name="virt_virsh_use_fds" lineno="1172">
 <summary>
 Inherit and use virsh file
 descriptors.
@@ -113640,7 +96634,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_virsh_sigchld" lineno="1252">
+<interface name="virt_virsh_sigchld" lineno="1190">
 <summary>
 Send a SIGCHLD to virsh.
 </summary>
@@ -113650,7 +96644,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_virsh_rw_pipes" lineno="1270">
+<interface name="virt_virsh_rw_pipes" lineno="1208">
 <summary>
 Read and write virsh unamed pipes.
 </summary>
@@ -113660,7 +96654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="virt_admin" lineno="1295">
+<interface name="virt_admin" lineno="1233">
 <summary>
 All of the rules required to
 administrate an virt environment.
@@ -114399,17 +97393,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_pid" lineno="1007">
-<summary>
-Read XDM pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xserver_read_xdm_runtime_files" lineno="1022">
+<interface name="xserver_read_xdm_runtime_files" lineno="1007">
 <summary>
 Read XDM runtime files.
 </summary>
@@ -114419,7 +97403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1041">
+<interface name="xserver_read_xdm_lib_files" lineno="1026">
 <summary>
 Read XDM var lib files.
 </summary>
@@ -114429,7 +97413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_xsession_entry_type" lineno="1059">
+<interface name="xserver_xsession_entry_type" lineno="1044">
 <summary>
 Make an X session script an entrypoint for the specified domain.
 </summary>
@@ -114439,7 +97423,7 @@ The domain for which the shell is an entrypoint.
 </summary>
 </param>
 </interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1096">
+<interface name="xserver_xsession_spec_domtrans" lineno="1081">
 <summary>
 Execute an X session in the target domain.  This
 is an explicit transition, requiring the
@@ -114468,7 +97452,7 @@ The type of the shell process.
 </summary>
 </param>
 </interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1115">
+<interface name="xserver_write_inherited_xsession_log" lineno="1100">
 <summary>
 Write to inherited  xsession log
 files such as .xsession-errors.
@@ -114479,7 +97463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xsession_log" lineno="1135">
+<interface name="xserver_rw_xsession_log" lineno="1120">
 <summary>
 Read and write xsession log
 files such as .xsession-errors.
@@ -114490,7 +97474,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_xsession_log" lineno="1154">
+<interface name="xserver_manage_xsession_log" lineno="1139">
 <summary>
 Manage xsession log files such
 as .xsession-errors.
@@ -114501,7 +97485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_write_inherited_log" lineno="1173">
+<interface name="xserver_write_inherited_log" lineno="1158">
 <summary>
 Write to inherited X server log
 files like /var/log/lightdm/lightdm.log
@@ -114512,7 +97496,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_getattr_log" lineno="1191">
+<interface name="xserver_getattr_log" lineno="1176">
 <summary>
 Get the attributes of X server logs.
 </summary>
@@ -114522,7 +97506,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_write_log" lineno="1211">
+<interface name="xserver_dontaudit_write_log" lineno="1196">
 <summary>
 Do not audit attempts to write the X server
 log files.
@@ -114533,7 +97517,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_delete_log" lineno="1229">
+<interface name="xserver_delete_log" lineno="1214">
 <summary>
 Delete X server log files.
 </summary>
@@ -114543,7 +97527,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xkb_libs" lineno="1250">
+<interface name="xserver_read_xkb_libs" lineno="1235">
 <summary>
 Read X keyboard extension libraries.
 </summary>
@@ -114553,7 +97537,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1271">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1256">
 <summary>
 Create xdm temporary directories.
 </summary>
@@ -114563,7 +97547,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1289">
+<interface name="xserver_read_xdm_tmp_files" lineno="1274">
 <summary>
 Read xdm temporary files.
 </summary>
@@ -114573,7 +97557,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1308">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1293">
 <summary>
 Do not audit attempts to read xdm temporary files.
 </summary>
@@ -114583,7 +97567,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1327">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1312">
 <summary>
 Read write xdm temporary files.
 </summary>
@@ -114593,7 +97577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1346">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1331">
 <summary>
 Create, read, write, and delete xdm temporary files.
 </summary>
@@ -114603,7 +97587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1365">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1350">
 <summary>
 Do not audit attempts to get the attributes of
 xdm temporary named sockets.
@@ -114614,7 +97598,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_list_xdm_tmp" lineno="1383">
+<interface name="xserver_list_xdm_tmp" lineno="1368">
 <summary>
 list xdm_tmp_t directories
 </summary>
@@ -114624,7 +97608,7 @@ Domain to allow
 </summary>
 </param>
 </interface>
-<interface name="xserver_domtrans" lineno="1401">
+<interface name="xserver_domtrans" lineno="1386">
 <summary>
 Execute the X server in the X server domain.
 </summary>
@@ -114634,7 +97618,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="xserver_signal" lineno="1420">
+<interface name="xserver_signal" lineno="1405">
 <summary>
 Signal X servers
 </summary>
@@ -114644,7 +97628,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_kill" lineno="1438">
+<interface name="xserver_kill" lineno="1423">
 <summary>
 Kill X servers
 </summary>
@@ -114654,7 +97638,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_state" lineno="1456">
+<interface name="xserver_read_state" lineno="1441">
 <summary>
 Allow reading xserver_t files to get cgroup and sessionid
 </summary>
@@ -114664,7 +97648,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_shm" lineno="1476">
+<interface name="xserver_rw_shm" lineno="1461">
 <summary>
 Read and write X server Sys V Shared
 memory segments.
@@ -114675,7 +97659,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1495">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1480">
 <summary>
 Do not audit attempts to read and write to
 X server sockets.
@@ -114686,7 +97670,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1514">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1499">
 <summary>
 Do not audit attempts to read and write X server
 unix domain stream sockets.
@@ -114697,7 +97681,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xserver_stream_connect" lineno="1533">
+<interface name="xserver_stream_connect" lineno="1518">
 <summary>
 Connect to the X server over a unix domain
 stream socket.
@@ -114708,7 +97692,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_read_tmp_files" lineno="1552">
+<interface name="xserver_read_tmp_files" lineno="1537">
 <summary>
 Read X server temporary files.
 </summary>
@@ -114718,7 +97702,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_dbus_chat" lineno="1571">
+<interface name="xserver_dbus_chat" lineno="1556">
 <summary>
 talk to xserver_t by dbus
 </summary>
@@ -114728,7 +97712,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_core_devices" lineno="1593">
+<interface name="xserver_manage_core_devices" lineno="1578">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Gives the domain permission to read the
@@ -114740,7 +97724,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_unconfined" lineno="1616">
+<interface name="xserver_unconfined" lineno="1601">
 <summary>
 Interface to provide X object permissions on a given X server to
 an X client domain.  Gives the domain complete control over the
@@ -114752,7 +97736,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_xdm_keys" lineno="1636">
+<interface name="xserver_rw_xdm_keys" lineno="1621">
 <summary>
 Manage keys for xdm.
 </summary>
@@ -114762,7 +97746,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_link_xdm_keys" lineno="1654">
+<interface name="xserver_link_xdm_keys" lineno="1639">
 <summary>
 Manage keys for xdm.
 </summary>
@@ -114772,7 +97756,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1672">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1657">
 <summary>
 Read and write the mesa shader cache.
 </summary>
@@ -114782,7 +97766,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xserver_manage_mesa_shader_cache" lineno="1693">
+<interface name="xserver_manage_mesa_shader_cache" lineno="1678">
 <summary>
 Manage the mesa shader cache.
 </summary>
@@ -114873,17 +97857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="zabbix_read_pid_files" lineno="91">
-<summary>
-Read zabbix pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="zabbix_agent_tcp_connect" lineno="105">
+<interface name="zabbix_agent_tcp_connect" lineno="91">
 <summary>
 Connect to zabbix agent on the TCP network.
 </summary>
@@ -114893,7 +97867,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="zabbix_admin" lineno="132">
+<interface name="zabbix_admin" lineno="118">
 <summary>
 All of the rules required to
 administrate an zabbix environment.
@@ -115040,6 +98014,94 @@ manage its configuration files.
 </desc>
 </tunable>
 </module>
+<module name="zfs" filename="policy/modules/services/zfs.if">
+<summary>Tools for the Zettabyte File System.</summary>
+<interface name="zfs_domtrans" lineno="14">
+<summary>
+Execute ZFS tools in the
+ZFS domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="zfs_exec" lineno="33">
+<summary>
+Execute ZFS tools in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_run" lineno="59">
+<summary>
+Execute ZFS tools in the ZFS domain, and
+allow the specified role the ZFS domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="zfs_search_config" lineno="78">
+<summary>
+Search ZFS config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_read_config" lineno="97">
+<summary>
+Read ZFS config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_rw_zpool_cache" lineno="117">
+<summary>
+Read and write zpool cache files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_admin" lineno="143">
+<summary>
+All of the rules required to
+administrate a ZFS environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
 <module name="zosremote" filename="policy/modules/services/zosremote.if">
 <summary>z/OS Remote-services Audit dispatcher plugin.</summary>
 <interface name="zosremote_domtrans" lineno="13">
@@ -115763,70 +98825,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_pam_pid" lineno="1136">
-<summary>
-Read PAM PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_dontaudit_read_pam_pid" lineno="1151">
-<summary>
-Do not audit attempts to read PAM PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="auth_pid_filetrans_pam_var_run" lineno="1179">
-<summary>
-Create specified objects in
-pid directories with the pam var
-run file type using a
-file type transition.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="auth_delete_pam_pid" lineno="1194">
-<summary>
-Delete pam PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_manage_pam_pid" lineno="1209">
-<summary>
-Manage pam PID files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_manage_pam_runtime_dirs" lineno="1225">
+<interface name="auth_manage_pam_runtime_dirs" lineno="1136">
 <summary>
 Manage pam runtime dirs.
 </summary>
@@ -115836,7 +98835,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_runtime_filetrans_pam_runtime" lineno="1256">
+<interface name="auth_runtime_filetrans_pam_runtime" lineno="1167">
 <summary>
 Create specified objects in
 pid directories with the pam runtime
@@ -115858,7 +98857,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_pam_runtime_files" lineno="1274">
+<interface name="auth_read_pam_runtime_files" lineno="1185">
 <summary>
 Read PAM runtime files.
 </summary>
@@ -115868,7 +98867,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1294">
+<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1205">
 <summary>
 Do not audit attempts to read PAM runtime files.
 </summary>
@@ -115878,7 +98877,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_delete_pam_runtime_files" lineno="1312">
+<interface name="auth_delete_pam_runtime_files" lineno="1223">
 <summary>
 Delete pam runtime files.
 </summary>
@@ -115888,7 +98887,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_pam_runtime_files" lineno="1331">
+<interface name="auth_manage_pam_runtime_files" lineno="1242">
 <summary>
 Create, read, write, and delete pam runtime files.
 </summary>
@@ -115898,7 +98897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_pam_console" lineno="1350">
+<interface name="auth_domtrans_pam_console" lineno="1261">
 <summary>
 Execute pam_console with a domain transition.
 </summary>
@@ -115908,7 +98907,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_search_pam_console_data" lineno="1369">
+<interface name="auth_search_pam_console_data" lineno="1280">
 <summary>
 Search the contents of the
 pam_console data directory.
@@ -115919,7 +98918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_list_pam_console_data" lineno="1389">
+<interface name="auth_list_pam_console_data" lineno="1300">
 <summary>
 List the contents of the pam_console
 data directory.
@@ -115930,7 +98929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1408">
+<interface name="auth_create_pam_console_data_dirs" lineno="1319">
 <summary>
 Create pam var console pid directories.
 </summary>
@@ -115940,7 +98939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1427">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1338">
 <summary>
 Relabel pam_console data directories.
 </summary>
@@ -115950,7 +98949,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_pam_console_data" lineno="1445">
+<interface name="auth_read_pam_console_data" lineno="1356">
 <summary>
 Read pam_console data files.
 </summary>
@@ -115960,7 +98959,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_pam_console_data" lineno="1466">
+<interface name="auth_manage_pam_console_data" lineno="1377">
 <summary>
 Create, read, write, and delete
 pam_console data files.
@@ -115971,7 +98970,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_delete_pam_console_data" lineno="1486">
+<interface name="auth_delete_pam_console_data" lineno="1397">
 <summary>
 Delete pam_console data.
 </summary>
@@ -115981,30 +98980,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_pid_filetrans_pam_var_console" lineno="1519">
-<summary>
-Create specified objects in
-pid directories with the pam var
-console pid file type using a
-file type transition.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="auth_runtime_filetrans_pam_var_console" lineno="1547">
+<interface name="auth_runtime_filetrans_pam_var_console" lineno="1430">
 <summary>
 Create specified objects in generic
 runtime directories with the pam var
@@ -116027,7 +99003,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="auth_domtrans_utempter" lineno="1565">
+<interface name="auth_domtrans_utempter" lineno="1448">
 <summary>
 Execute utempter programs in the utempter domain.
 </summary>
@@ -116037,7 +99013,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="auth_run_utempter" lineno="1588">
+<interface name="auth_run_utempter" lineno="1471">
 <summary>
 Execute utempter programs in the utempter domain.
 </summary>
@@ -116052,7 +99028,7 @@ The role to allow the utempter domain.
 </summary>
 </param>
 </interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1607">
+<interface name="auth_dontaudit_exec_utempter" lineno="1490">
 <summary>
 Do not audit attempts to execute utempter executable.
 </summary>
@@ -116062,7 +99038,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_setattr_login_records" lineno="1625">
+<interface name="auth_setattr_login_records" lineno="1508">
 <summary>
 Set the attributes of login record files.
 </summary>
@@ -116072,7 +99048,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_read_login_records" lineno="1645">
+<interface name="auth_read_login_records" lineno="1528">
 <summary>
 Read login records files (/var/log/wtmp).
 </summary>
@@ -116083,7 +99059,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1666">
+<interface name="auth_dontaudit_read_login_records" lineno="1549">
 <summary>
 Do not audit attempts to read login records
 files (/var/log/wtmp).
@@ -116095,7 +99071,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1685">
+<interface name="auth_dontaudit_write_login_records" lineno="1568">
 <summary>
 Do not audit attempts to write to
 login records files.
@@ -116106,7 +99082,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="auth_append_login_records" lineno="1703">
+<interface name="auth_append_login_records" lineno="1586">
 <summary>
 Append to login records (wtmp).
 </summary>
@@ -116116,7 +99092,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_write_login_records" lineno="1722">
+<interface name="auth_write_login_records" lineno="1605">
 <summary>
 Write to login records (wtmp).
 </summary>
@@ -116126,7 +99102,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_rw_login_records" lineno="1740">
+<interface name="auth_rw_login_records" lineno="1623">
 <summary>
 Read and write login records.
 </summary>
@@ -116136,7 +99112,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_log_filetrans_login_records" lineno="1760">
+<interface name="auth_log_filetrans_login_records" lineno="1643">
 <summary>
 Create a login records in the log directory
 using a type transition.
@@ -116147,7 +99123,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_manage_login_records" lineno="1779">
+<interface name="auth_manage_login_records" lineno="1662">
 <summary>
 Create, read, write, and delete login
 records files.
@@ -116158,7 +99134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_relabel_login_records" lineno="1798">
+<interface name="auth_relabel_login_records" lineno="1681">
 <summary>
 Relabel login record files.
 </summary>
@@ -116168,7 +99144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="auth_use_nsswitch" lineno="1826">
+<interface name="auth_use_nsswitch" lineno="1709">
 <summary>
 Use nsswitch to look up user, password, group, or
 host information.
@@ -116188,7 +99164,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="auth_unconfined" lineno="1854">
+<interface name="auth_unconfined" lineno="1737">
 <summary>
 Unconfined access to the authlogin module.
 </summary>
@@ -117016,28 +99992,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_pid_file" lineno="662">
-<summary>
-Mark the file type as a daemon pid file, allowing initrc_t
-to create it  (Deprecated)
-</summary>
-<param name="filetype">
-<summary>
-Type to mark as a daemon pid file
-</summary>
-</param>
-<param name="class">
-<summary>
-Class on which the type is applied
-</summary>
-</param>
-<param name="filename">
-<summary>
-Filename of the file that the init script creates
-</summary>
-</param>
-</interface>
-<interface name="init_daemon_runtime_file" lineno="689">
+<interface name="init_daemon_runtime_file" lineno="662">
 <summary>
 Mark the file type as a daemon runtime file, allowing initrc_t
 to create it
@@ -117058,7 +100013,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_daemon_lock_file" lineno="722">
+<interface name="init_daemon_lock_file" lineno="695">
 <summary>
 Mark the file type as a daemon lock file, allowing initrc_t
 to create it
@@ -117079,7 +100034,7 @@ Filename of the file that the init script creates
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans" lineno="744">
+<interface name="init_domtrans" lineno="717">
 <summary>
 Execute init (/sbin/init) with a domain transition.
 </summary>
@@ -117089,7 +100044,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="768">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="741">
 <summary>
 Execute init (/sbin/init) with a domain transition
 to the provided domain.
@@ -117105,7 +100060,7 @@ The type to be used as a systemd --user domain.
 </summary>
 </param>
 </interface>
-<interface name="init_exec" lineno="796">
+<interface name="init_exec" lineno="769">
 <summary>
 Execute the init program in the caller domain.
 </summary>
@@ -117116,7 +100071,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_pgm_entrypoint" lineno="817">
+<interface name="init_pgm_entrypoint" lineno="790">
 <summary>
 Allow the init program to be an entrypoint
 for the specified domain.
@@ -117128,7 +100083,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_exec_rc" lineno="846">
+<interface name="init_exec_rc" lineno="819">
 <summary>
 Execute the rc application in the caller domain.
 </summary>
@@ -117149,7 +100104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid" lineno="865">
+<interface name="init_getpgid" lineno="838">
 <summary>
 Get the process group of init.
 </summary>
@@ -117159,7 +100114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal" lineno="883">
+<interface name="init_signal" lineno="856">
 <summary>
 Send init a generic signal.
 </summary>
@@ -117169,7 +100124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull" lineno="901">
+<interface name="init_signull" lineno="874">
 <summary>
 Send init a null signal.
 </summary>
@@ -117179,7 +100134,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld" lineno="919">
+<interface name="init_sigchld" lineno="892">
 <summary>
 Send init a SIGCHLD signal.
 </summary>
@@ -117189,7 +100144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_setsched" lineno="937">
+<interface name="init_setsched" lineno="910">
 <summary>
 Set the nice level of init.
 </summary>
@@ -117199,7 +100154,39 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect" lineno="955">
+<interface name="init_write_mountpoint_files" lineno="934">
+<summary>
+Write systemd mountpoint files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="exception_types" optional="true">
+<summary>
+The types to be excluded.  Each type or attribute
+must be negated by the caller.
+</summary>
+</param>
+</interface>
+<interface name="init_create_mountpoint_files" lineno="958">
+<summary>
+Create systemd mountpoint files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="exception_types" optional="true">
+<summary>
+The types to be excluded.  Each type or attribute
+must be negated by the caller.
+</summary>
+</param>
+</interface>
+<interface name="init_stream_connect" lineno="976">
 <summary>
 Connect to init with a unix socket.
 </summary>
@@ -117209,7 +100196,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_unix_stream_socket_connectto" lineno="976">
+<interface name="init_unix_stream_socket_connectto" lineno="997">
 <summary>
 Connect to init with a unix socket.
 Without any additional permissions.
@@ -117220,7 +100207,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_fds" lineno="1034">
+<interface name="init_use_fds" lineno="1055">
 <summary>
 Inherit and use file descriptors from init.
 </summary>
@@ -117270,7 +100257,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="1"/>
 </interface>
-<interface name="init_dontaudit_use_fds" lineno="1053">
+<interface name="init_dontaudit_use_fds" lineno="1074">
 <summary>
 Do not audit attempts to inherit file
 descriptors from init.
@@ -117281,7 +100268,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dgram_send" lineno="1072">
+<interface name="init_dgram_send" lineno="1093">
 <summary>
 Send messages to init unix datagram sockets.
 </summary>
@@ -117292,7 +100279,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1092">
+<interface name="init_rw_inherited_stream_socket" lineno="1113">
 <summary>
 Read and write to inherited init unix streams.
 </summary>
@@ -117302,7 +100289,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_stream_sockets" lineno="1111">
+<interface name="init_rw_stream_sockets" lineno="1132">
 <summary>
 Allow the specified domain to read/write to
 init with unix domain stream sockets.
@@ -117313,7 +100300,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_search_keys" lineno="1129">
+<interface name="init_dontaudit_search_keys" lineno="1150">
 <summary>
 Do not audit attempts to search init keys.
 </summary>
@@ -117323,7 +100310,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_system" lineno="1147">
+<interface name="init_start_system" lineno="1168">
 <summary>
 start service (systemd).
 </summary>
@@ -117333,7 +100320,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_system" lineno="1165">
+<interface name="init_stop_system" lineno="1186">
 <summary>
 stop service (systemd).
 </summary>
@@ -117343,7 +100330,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_system_status" lineno="1183">
+<interface name="init_get_system_status" lineno="1204">
 <summary>
 Get all service status (systemd).
 </summary>
@@ -117353,7 +100340,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_enable" lineno="1201">
+<interface name="init_enable" lineno="1222">
 <summary>
 Enable all systemd services (systemd).
 </summary>
@@ -117363,7 +100350,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_disable" lineno="1219">
+<interface name="init_disable" lineno="1240">
 <summary>
 Disable all services (systemd).
 </summary>
@@ -117373,7 +100360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reload" lineno="1237">
+<interface name="init_reload" lineno="1258">
 <summary>
 Reload all services (systemd).
 </summary>
@@ -117383,7 +100370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_reboot_system" lineno="1255">
+<interface name="init_reboot_system" lineno="1276">
 <summary>
 Reboot the system (systemd).
 </summary>
@@ -117393,7 +100380,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_shutdown_system" lineno="1273">
+<interface name="init_shutdown_system" lineno="1294">
 <summary>
 Shutdown (halt) the system (systemd).
 </summary>
@@ -117403,7 +100390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_status" lineno="1291">
+<interface name="init_service_status" lineno="1312">
 <summary>
 Allow specified domain to get init status
 </summary>
@@ -117413,7 +100400,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_service_start" lineno="1310">
+<interface name="init_service_start" lineno="1331">
 <summary>
 Allow specified domain to get init start
 </summary>
@@ -117423,7 +100410,7 @@ Domain to allow access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat" lineno="1330">
+<interface name="init_dbus_chat" lineno="1351">
 <summary>
 Send and receive messages from
 systemd over dbus.
@@ -117434,7 +100421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_run_bpf" lineno="1350">
+<interface name="init_run_bpf" lineno="1371">
 <summary>
 Run init BPF programs.
 </summary>
@@ -117444,7 +100431,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_var_lib_links" lineno="1369">
+<interface name="init_read_var_lib_links" lineno="1390">
 <summary>
 read/follow symlinks under /var/lib/systemd/
 </summary>
@@ -117454,7 +100441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_search_var_lib_dirs" lineno="1388">
+<interface name="init_search_var_lib_dirs" lineno="1409">
 <summary>
 Search /var/lib/systemd/ dirs
 </summary>
@@ -117464,7 +100451,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_var_lib_dirs" lineno="1407">
+<interface name="init_list_var_lib_dirs" lineno="1428">
 <summary>
 List /var/lib/systemd/ dir
 </summary>
@@ -117474,7 +100461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1425">
+<interface name="init_relabel_var_lib_dirs" lineno="1446">
 <summary>
 Relabel dirs in /var/lib/systemd/.
 </summary>
@@ -117484,7 +100471,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_var_lib_files" lineno="1443">
+<interface name="init_manage_var_lib_files" lineno="1464">
 <summary>
 Manage files in /var/lib/systemd/.
 </summary>
@@ -117494,7 +100481,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_var_lib_filetrans" lineno="1478">
+<interface name="init_var_lib_filetrans" lineno="1499">
 <summary>
 Create files in /var/lib/systemd
 with an automatic type transition.
@@ -117520,93 +100507,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_search_pids" lineno="1497">
-<summary>
-Allow search  directory in the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_list_pids" lineno="1512">
-<summary>
-Allow listing of the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_manage_pid_symlinks" lineno="1527">
-<summary>
-Create symbolic links in the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_create_pid_files" lineno="1542">
-<summary>
-Create files in the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_write_pid_files" lineno="1557">
-<summary>
-Write files in the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_manage_pid_dirs" lineno="1573">
-<summary>
-Create, read, write, and delete
-directories in the /run/systemd directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_pid_filetrans" lineno="1603">
-<summary>
-Create files in an init PID directory.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="file_type">
-<summary>
-The type of the object to be created
-</summary>
-</param>
-<param name="object_class">
-<summary>
-The object class.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="init_search_runtime" lineno="1618">
+<interface name="init_search_runtime" lineno="1518">
 <summary>
 Search init runtime directories, e.g. /run/systemd.
 </summary>
@@ -117616,7 +100517,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_runtime" lineno="1636">
+<interface name="init_list_runtime" lineno="1536">
 <summary>
 List init runtime directories, e.g. /run/systemd.
 </summary>
@@ -117626,7 +100527,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_runtime_dirs" lineno="1656">
+<interface name="init_manage_runtime_dirs" lineno="1556">
 <summary>
 Create, read, write, and delete
 directories in the /run/systemd directory.
@@ -117637,7 +100538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_runtime_filetrans" lineno="1689">
+<interface name="init_runtime_filetrans" lineno="1589">
 <summary>
 Create files in an init runtime directory with a private type.
 </summary>
@@ -117662,7 +100563,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_write_runtime_files" lineno="1708">
+<interface name="init_write_runtime_files" lineno="1608">
 <summary>
 Write init runtime files, e.g. in /run/systemd.
 </summary>
@@ -117672,7 +100573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_runtime_files" lineno="1726">
+<interface name="init_create_runtime_files" lineno="1626">
 <summary>
 Create init runtime files, e.g. in /run/systemd.
 </summary>
@@ -117682,7 +100583,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_runtime_symlinks" lineno="1744">
+<interface name="init_manage_runtime_symlinks" lineno="1644">
 <summary>
 Create init runtime symbolic links, e.g. in /run/systemd.
 </summary>
@@ -117692,7 +100593,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_initctl" lineno="1762">
+<interface name="init_getattr_initctl" lineno="1662">
 <summary>
 Get the attributes of initctl.
 </summary>
@@ -117702,7 +100603,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1783">
+<interface name="init_dontaudit_getattr_initctl" lineno="1683">
 <summary>
 Do not audit attempts to get the
 attributes of initctl.
@@ -117713,7 +100614,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_initctl" lineno="1801">
+<interface name="init_write_initctl" lineno="1701">
 <summary>
 Write to initctl.
 </summary>
@@ -117723,7 +100624,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_telinit" lineno="1822">
+<interface name="init_telinit" lineno="1722">
 <summary>
 Use telinit (Read and write initctl).
 </summary>
@@ -117734,7 +100635,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_rw_initctl" lineno="1855">
+<interface name="init_rw_initctl" lineno="1755">
 <summary>
 Read and write initctl.
 </summary>
@@ -117744,7 +100645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1876">
+<interface name="init_dontaudit_rw_initctl" lineno="1776">
 <summary>
 Do not audit attempts to read and
 write initctl.
@@ -117755,7 +100656,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_entry_type" lineno="1895">
+<interface name="init_script_file_entry_type" lineno="1795">
 <summary>
 Make init scripts an entry point for
 the specified domain.
@@ -117766,7 +100667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_spec_domtrans_script" lineno="1918">
+<interface name="init_spec_domtrans_script" lineno="1818">
 <summary>
 Execute init scripts with a specified domain transition.
 </summary>
@@ -117776,7 +100677,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_script" lineno="1945">
+<interface name="init_domtrans_script" lineno="1845">
 <summary>
 Execute init scripts with an automatic domain transition.
 </summary>
@@ -117786,7 +100687,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_domtrans_labeled_script" lineno="1980">
+<interface name="init_domtrans_labeled_script" lineno="1880">
 <summary>
 Execute labelled init scripts with an automatic domain transition.
 </summary>
@@ -117796,7 +100697,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_script_file_domtrans" lineno="2026">
+<interface name="init_script_file_domtrans" lineno="1926">
 <summary>
 Execute a init script in a specified domain.
 </summary>
@@ -117821,7 +100722,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="init_kill_scripts" lineno="2045">
+<interface name="init_kill_scripts" lineno="1945">
 <summary>
 Send a kill signal to init scripts.
 </summary>
@@ -117831,7 +100732,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_script_service" lineno="2063">
+<interface name="init_manage_script_service" lineno="1963">
 <summary>
 Allow manage service for initrc_exec_t scripts
 </summary>
@@ -117841,7 +100742,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_labeled_script_domtrans" lineno="2088">
+<interface name="init_labeled_script_domtrans" lineno="1988">
 <summary>
 Transition to the init script domain
 on a specified labeled init script.
@@ -117857,7 +100758,7 @@ Labeled init script file.
 </summary>
 </param>
 </interface>
-<interface name="init_all_labeled_script_domtrans" lineno="2110">
+<interface name="init_all_labeled_script_domtrans" lineno="2010">
 <summary>
 Transition to the init script domain
 for all labeled init script types
@@ -117868,7 +100769,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="init_get_script_status" lineno="2128">
+<interface name="init_get_script_status" lineno="2028">
 <summary>
 Allow getting service status of initrc_exec_t scripts
 </summary>
@@ -117878,7 +100779,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_service" lineno="2168">
+<interface name="init_startstop_service" lineno="2068">
 <summary>
 Allow the role to start and stop
 labeled services.
@@ -117909,7 +100810,7 @@ Systemd unit file type.
 </summary>
 </param>
 </interface>
-<interface name="init_run_daemon" lineno="2224">
+<interface name="init_run_daemon" lineno="2124">
 <summary>
 Start and stop daemon programs directly.
 </summary>
@@ -117931,7 +100832,7 @@ The role to be performing this action.
 </summary>
 </param>
 </interface>
-<interface name="init_startstop_all_script_services" lineno="2246">
+<interface name="init_startstop_all_script_services" lineno="2146">
 <summary>
 Start and stop init_script_file_type services
 </summary>
@@ -117941,7 +100842,7 @@ domain that can start and stop the services
 </summary>
 </param>
 </interface>
-<interface name="init_read_state" lineno="2265">
+<interface name="init_read_state" lineno="2165">
 <summary>
 Read the process state (/proc/pid) of init.
 </summary>
@@ -117951,7 +100852,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_state" lineno="2285">
+<interface name="init_dontaudit_read_state" lineno="2185">
 <summary>
 Dontaudit read the process state (/proc/pid) of init.
 </summary>
@@ -117961,7 +100862,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_ptrace" lineno="2306">
+<interface name="init_ptrace" lineno="2206">
 <summary>
 Ptrace init
 </summary>
@@ -117972,7 +100873,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_getattr" lineno="2325">
+<interface name="init_getattr" lineno="2225">
 <summary>
 get init process stats
 </summary>
@@ -117983,7 +100884,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="init_read_script_pipes" lineno="2343">
+<interface name="init_read_script_pipes" lineno="2243">
 <summary>
 Read an init script unnamed pipe.
 </summary>
@@ -117993,7 +100894,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_write_script_pipes" lineno="2361">
+<interface name="init_write_script_pipes" lineno="2261">
 <summary>
 Write an init script unnamed pipe.
 </summary>
@@ -118003,7 +100904,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_files" lineno="2379">
+<interface name="init_getattr_script_files" lineno="2279">
 <summary>
 Get the attribute of init script entrypoint files.
 </summary>
@@ -118013,7 +100914,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_files" lineno="2398">
+<interface name="init_read_script_files" lineno="2298">
 <summary>
 Read init scripts.
 </summary>
@@ -118023,7 +100924,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_script_files" lineno="2417">
+<interface name="init_exec_script_files" lineno="2317">
 <summary>
 Execute init scripts in the caller domain.
 </summary>
@@ -118033,7 +100934,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_all_script_files" lineno="2436">
+<interface name="init_getattr_all_script_files" lineno="2336">
 <summary>
 Get the attribute of all init script entrypoint files.
 </summary>
@@ -118043,7 +100944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_all_script_files" lineno="2455">
+<interface name="init_read_all_script_files" lineno="2355">
 <summary>
 Read all init script files.
 </summary>
@@ -118053,7 +100954,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2479">
+<interface name="init_dontaudit_read_all_script_files" lineno="2379">
 <summary>
 Dontaudit read all init script files.
 </summary>
@@ -118063,7 +100964,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_exec_all_script_files" lineno="2497">
+<interface name="init_exec_all_script_files" lineno="2397">
 <summary>
 Execute all init scripts in the caller domain.
 </summary>
@@ -118073,7 +100974,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_state" lineno="2516">
+<interface name="init_read_script_state" lineno="2416">
 <summary>
 Read the process state (/proc/pid) of the init scripts.
 </summary>
@@ -118083,7 +100984,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_fds" lineno="2535">
+<interface name="init_use_script_fds" lineno="2435">
 <summary>
 Inherit and use init script file descriptors.
 </summary>
@@ -118093,7 +100994,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2554">
+<interface name="init_dontaudit_use_script_fds" lineno="2454">
 <summary>
 Do not audit attempts to inherit
 init script file descriptors.
@@ -118104,7 +101005,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_script_keys" lineno="2572">
+<interface name="init_search_script_keys" lineno="2472">
 <summary>
 Search init script keys.
 </summary>
@@ -118114,7 +101015,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getpgid_script" lineno="2590">
+<interface name="init_getpgid_script" lineno="2490">
 <summary>
 Get the process group ID of init scripts.
 </summary>
@@ -118124,7 +101025,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_sigchld_script" lineno="2608">
+<interface name="init_sigchld_script" lineno="2508">
 <summary>
 Send SIGCHLD signals to init scripts.
 </summary>
@@ -118134,7 +101035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signal_script" lineno="2626">
+<interface name="init_signal_script" lineno="2526">
 <summary>
 Send generic signals to init scripts.
 </summary>
@@ -118144,7 +101045,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_signull_script" lineno="2644">
+<interface name="init_signull_script" lineno="2544">
 <summary>
 Send null signals to init scripts.
 </summary>
@@ -118154,7 +101055,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_pipes" lineno="2662">
+<interface name="init_rw_script_pipes" lineno="2562">
 <summary>
 Read and write init script unnamed pipes.
 </summary>
@@ -118164,7 +101065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stream_connect_script" lineno="2681">
+<interface name="init_stream_connect_script" lineno="2581">
 <summary>
 Allow the specified domain to connect to
 init scripts with a unix socket.
@@ -118175,7 +101076,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_stream_sockets" lineno="2700">
+<interface name="init_rw_script_stream_sockets" lineno="2600">
 <summary>
 Allow the specified domain to read/write to
 init scripts with a unix domain stream sockets.
@@ -118186,7 +101087,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2719">
+<interface name="init_dontaudit_stream_connect_script" lineno="2619">
 <summary>
 Dont audit the specified domain connecting to
 init scripts with a unix domain stream socket.
@@ -118197,7 +101098,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_send_script" lineno="2736">
+<interface name="init_dbus_send_script" lineno="2636">
 <summary>
 Send messages to init scripts over dbus.
 </summary>
@@ -118207,7 +101108,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dbus_chat_script" lineno="2756">
+<interface name="init_dbus_chat_script" lineno="2656">
 <summary>
 Send and receive messages from
 init scripts over dbus.
@@ -118218,7 +101119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_script_ptys" lineno="2785">
+<interface name="init_use_script_ptys" lineno="2685">
 <summary>
 Read and write the init script pty.
 </summary>
@@ -118237,7 +101138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_use_inherited_script_ptys" lineno="2804">
+<interface name="init_use_inherited_script_ptys" lineno="2704">
 <summary>
 Read and write inherited init script ptys.
 </summary>
@@ -118247,7 +101148,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2826">
+<interface name="init_dontaudit_use_script_ptys" lineno="2726">
 <summary>
 Do not audit attempts to read and
 write the init script pty.
@@ -118258,7 +101159,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_script_status_files" lineno="2845">
+<interface name="init_getattr_script_status_files" lineno="2745">
 <summary>
 Get the attributes of init script
 status files.
@@ -118269,7 +101170,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2864">
+<interface name="init_dontaudit_read_script_status_files" lineno="2764">
 <summary>
 Do not audit attempts to read init script
 status files.
@@ -118280,7 +101181,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_search_run" lineno="2883">
+<interface name="init_search_run" lineno="2783">
 <summary>
 Search the /run/systemd directory.
 </summary>
@@ -118290,7 +101191,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_tmp_files" lineno="2902">
+<interface name="init_read_script_tmp_files" lineno="2802">
 <summary>
 Read init script temporary data.
 </summary>
@@ -118300,7 +101201,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2921">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2821">
 <summary>
 Read and write init script inherited temporary data.
 </summary>
@@ -118310,7 +101211,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_script_tmp_files" lineno="2939">
+<interface name="init_rw_script_tmp_files" lineno="2839">
 <summary>
 Read and write init script temporary data.
 </summary>
@@ -118320,7 +101221,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_script_tmp_filetrans" lineno="2974">
+<interface name="init_script_tmp_filetrans" lineno="2874">
 <summary>
 Create files in a init script
 temporary data directory.
@@ -118346,7 +101247,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_utmp" lineno="2993">
+<interface name="init_getattr_utmp" lineno="2893">
 <summary>
 Get the attributes of init script process id files.
 </summary>
@@ -118356,7 +101257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_utmp" lineno="3011">
+<interface name="init_read_utmp" lineno="2911">
 <summary>
 Read utmp.
 </summary>
@@ -118366,7 +101267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_write_utmp" lineno="3030">
+<interface name="init_dontaudit_write_utmp" lineno="2930">
 <summary>
 Do not audit attempts to write utmp.
 </summary>
@@ -118376,7 +101277,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_write_utmp" lineno="3048">
+<interface name="init_write_utmp" lineno="2948">
 <summary>
 Write to utmp.
 </summary>
@@ -118386,7 +101287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_lock_utmp" lineno="3068">
+<interface name="init_dontaudit_lock_utmp" lineno="2968">
 <summary>
 Do not audit attempts to lock
 init script pid files.
@@ -118397,7 +101298,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_rw_utmp" lineno="3086">
+<interface name="init_rw_utmp" lineno="2986">
 <summary>
 Read and write utmp.
 </summary>
@@ -118407,7 +101308,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_dontaudit_rw_utmp" lineno="3105">
+<interface name="init_dontaudit_rw_utmp" lineno="3005">
 <summary>
 Do not audit attempts to read and write utmp.
 </summary>
@@ -118417,7 +101318,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_utmp" lineno="3123">
+<interface name="init_manage_utmp" lineno="3023">
 <summary>
 Create, read, write, and delete utmp.
 </summary>
@@ -118427,7 +101328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_watch_utmp" lineno="3142">
+<interface name="init_watch_utmp" lineno="3042">
 <summary>
 Add a watch on utmp.
 </summary>
@@ -118437,7 +101338,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_relabel_utmp" lineno="3160">
+<interface name="init_relabel_utmp" lineno="3060">
 <summary>
 Relabel utmp.
 </summary>
@@ -118447,7 +101348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_runtime_filetrans_utmp" lineno="3179">
+<interface name="init_runtime_filetrans_utmp" lineno="3079">
 <summary>
 Create files in /var/run with the
 utmp file type.
@@ -118458,7 +101359,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_create_runtime_dirs" lineno="3197">
+<interface name="init_create_runtime_dirs" lineno="3097">
 <summary>
 Create a directory in the /run/systemd directory.
 </summary>
@@ -118468,7 +101369,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_files" lineno="3216">
+<interface name="init_read_runtime_files" lineno="3116">
 <summary>
 Read init_runtime_t files
 </summary>
@@ -118478,7 +101379,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_rename_runtime_files" lineno="3234">
+<interface name="init_rename_runtime_files" lineno="3134">
 <summary>
 Rename init_runtime_t files
 </summary>
@@ -118488,7 +101389,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_setattr_runtime_files" lineno="3252">
+<interface name="init_setattr_runtime_files" lineno="3152">
 <summary>
 Setattr init_runtime_t files
 </summary>
@@ -118498,7 +101399,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_delete_runtime_files" lineno="3270">
+<interface name="init_delete_runtime_files" lineno="3170">
 <summary>
 Delete init_runtime_t files
 </summary>
@@ -118508,7 +101409,7 @@ domain
 </summary>
 </param>
 </interface>
-<interface name="init_write_runtime_socket" lineno="3289">
+<interface name="init_write_runtime_socket" lineno="3189">
 <summary>
 Allow the specified domain to write to
 init sock file.
@@ -118519,7 +101420,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_pipes" lineno="3307">
+<interface name="init_dontaudit_write_runtime_socket" lineno="3208">
+<summary>
+Do not audit attempts to write to
+init sock files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="init_read_runtime_pipes" lineno="3226">
 <summary>
 Read init unnamed pipes.
 </summary>
@@ -118529,7 +101441,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_runtime_symlinks" lineno="3325">
+<interface name="init_read_runtime_symlinks" lineno="3244">
 <summary>
 read systemd unit symlinks (usually under /run/systemd/units/)
 </summary>
@@ -118539,7 +101451,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3343">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3262">
 <summary>
 Allow the specified domain to connect to daemon with a tcp socket
 </summary>
@@ -118549,7 +101461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3361">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3280">
 <summary>
 Allow the specified domain to connect to daemon with a udp socket
 </summary>
@@ -118559,7 +101471,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_script_status_files" lineno="3380">
+<interface name="init_read_script_status_files" lineno="3299">
 <summary>
 Allow reading the init script state files
 </summary>
@@ -118569,7 +101481,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_relabelto_script_state" lineno="3398">
+<interface name="init_relabelto_script_state" lineno="3317">
 <summary>
 Label to init script status files
 </summary>
@@ -118579,7 +101491,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="init_script_readable_type" lineno="3417">
+<interface name="init_script_readable_type" lineno="3336">
 <summary>
 Mark as a readable type for the initrc_t domain
 </summary>
@@ -118589,7 +101501,7 @@ Type that initrc_t needs read access to
 </summary>
 </param>
 </interface>
-<interface name="init_search_units" lineno="3435">
+<interface name="init_search_units" lineno="3354">
 <summary>
 Search systemd unit dirs.
 </summary>
@@ -118599,7 +101511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_list_unit_dirs" lineno="3460">
+<interface name="init_list_unit_dirs" lineno="3379">
 <summary>
 List systemd unit dirs.
 </summary>
@@ -118609,7 +101521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_getattr_generic_units_files" lineno="3480">
+<interface name="init_getattr_generic_units_files" lineno="3399">
 <summary>
 Get the attributes of systemd unit files
 </summary>
@@ -118619,7 +101531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_generic_units_files" lineno="3498">
+<interface name="init_read_generic_units_files" lineno="3417">
 <summary>
 Read systemd unit files
 </summary>
@@ -118629,7 +101541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_read_generic_units_symlinks" lineno="3516">
+<interface name="init_read_generic_units_symlinks" lineno="3435">
 <summary>
 Read systemd unit links
 </summary>
@@ -118639,7 +101551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_generic_units_status" lineno="3534">
+<interface name="init_get_generic_units_status" lineno="3453">
 <summary>
 Get status of generic systemd units.
 </summary>
@@ -118649,7 +101561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_generic_units" lineno="3553">
+<interface name="init_start_generic_units" lineno="3472">
 <summary>
 Start generic systemd units.
 </summary>
@@ -118659,7 +101571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_generic_units" lineno="3572">
+<interface name="init_stop_generic_units" lineno="3491">
 <summary>
 Stop generic systemd units.
 </summary>
@@ -118669,7 +101581,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_generic_units" lineno="3591">
+<interface name="init_reload_generic_units" lineno="3510">
 <summary>
 Reload generic systemd units.
 </summary>
@@ -118679,7 +101591,37 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_transient_units_status" lineno="3610">
+<interface name="init_get_runtime_units_status" lineno="3529">
+<summary>
+Get the status of runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_runtime_units" lineno="3548">
+<summary>
+Start runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_stop_runtime_units" lineno="3567">
+<summary>
+Stop runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_get_transient_units_status" lineno="3586">
 <summary>
 Get status of transient systemd units.
 </summary>
@@ -118689,7 +101631,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_transient_units" lineno="3629">
+<interface name="init_start_transient_units" lineno="3605">
 <summary>
 Start transient systemd units.
 </summary>
@@ -118699,7 +101641,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_transient_units" lineno="3648">
+<interface name="init_stop_transient_units" lineno="3624">
 <summary>
 Stop transient systemd units.
 </summary>
@@ -118709,7 +101651,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_transient_units" lineno="3667">
+<interface name="init_reload_transient_units" lineno="3643">
 <summary>
 Reload transient systemd units.
 </summary>
@@ -118719,7 +101661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_get_all_units_status" lineno="3687">
+<interface name="init_get_all_units_status" lineno="3663">
 <summary>
 Get status of all systemd units.
 </summary>
@@ -118729,7 +101671,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_all_units" lineno="3706">
+<interface name="init_manage_all_units" lineno="3682">
 <summary>
 All perms on all systemd units.
 </summary>
@@ -118739,7 +101681,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_start_all_units" lineno="3726">
+<interface name="init_start_all_units" lineno="3702">
 <summary>
 Start all systemd units.
 </summary>
@@ -118749,7 +101691,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_stop_all_units" lineno="3745">
+<interface name="init_stop_all_units" lineno="3721">
 <summary>
 Stop all systemd units.
 </summary>
@@ -118759,7 +101701,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="init_reload_all_units" lineno="3764">
+<interface name="init_reload_all_units" lineno="3740">
 <summary>
 Reload all systemd units.
 </summary>
@@ -118769,7 +101711,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_manage_all_unit_files" lineno="3783">
+<interface name="init_manage_all_unit_files" lineno="3759">
 <summary>
 Manage systemd unit dirs and the files in them
 </summary>
@@ -118779,7 +101721,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="init_linkable_keyring" lineno="3804">
+<interface name="init_linkable_keyring" lineno="3780">
 <summary>
 Associate the specified domain to be a domain whose
 keyring init should be allowed to link.
@@ -118790,7 +101732,7 @@ Domain whose keyring init should be allowed to link.
 </summary>
 </param>
 </interface>
-<interface name="init_admin" lineno="3822">
+<interface name="init_admin" lineno="3798">
 <summary>
 Allow unconfined access to send instructions to init
 </summary>
@@ -118800,7 +101742,7 @@ Target domain
 </summary>
 </param>
 </interface>
-<interface name="init_getrlimit" lineno="3854">
+<interface name="init_getrlimit" lineno="3830">
 <summary>
 Allow getting init_t rlimit
 </summary>
@@ -118817,6 +101759,13 @@ Enable support for upstart as the init program.
 </p>
 </desc>
 </tunable>
+<tunable name="init_create_mountpoints" dftval="false">
+<desc>
+<p>
+Enable systemd to create mountpoints.
+</p>
+</desc>
+</tunable>
 <tunable name="init_daemons_use_tty" dftval="false">
 <desc>
 <p>
@@ -118967,28 +101916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_write_pid" lineno="259">
-<summary>
-write the ipsec_runtime_t files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ipsec_manage_pid" lineno="275">
-<summary>
-Create, read, write, and delete the IPSEC pid files.
-(Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ipsec_write_runtime_files" lineno="290">
+<interface name="ipsec_write_runtime_files" lineno="259">
 <summary>
 Write ipsec runtime files.
 </summary>
@@ -118998,7 +101926,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_manage_runtime_files" lineno="309">
+<interface name="ipsec_manage_runtime_files" lineno="278">
 <summary>
 Create, read, write, and delete the IPSEC runtime files.
 </summary>
@@ -119008,7 +101936,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_domtrans_racoon" lineno="328">
+<interface name="ipsec_domtrans_racoon" lineno="297">
 <summary>
 Execute racoon in the racoon domain.
 </summary>
@@ -119018,7 +101946,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_run_racoon" lineno="352">
+<interface name="ipsec_run_racoon" lineno="321">
 <summary>
 Execute racoon and allow the specified role the domain.
 </summary>
@@ -119034,7 +101962,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="ipsec_domtrans_setkey" lineno="371">
+<interface name="ipsec_domtrans_setkey" lineno="340">
 <summary>
 Execute setkey in the setkey domain.
 </summary>
@@ -119044,7 +101972,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="ipsec_run_setkey" lineno="395">
+<interface name="ipsec_run_setkey" lineno="364">
 <summary>
 Execute setkey and allow the specified role the domains.
 </summary>
@@ -119060,7 +101988,7 @@ Role allowed access..
 </param>
 <rolecap/>
 </interface>
-<interface name="ipsec_admin" lineno="421">
+<interface name="ipsec_admin" lineno="390">
 <summary>
 All of the rules required to
 administrate an ipsec environment.
@@ -119124,7 +102052,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_initrc_domtrans" lineno="80">
+<interface name="iptables_read_state" lineno="80">
+<summary>
+Read the process state (/proc/pid)
+of iptables.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_initrc_domtrans" lineno="99">
 <summary>
 Execute iptables init scripts in
 the init script domain.
@@ -119135,7 +102074,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="iptables_setattr_config" lineno="98">
+<interface name="iptables_setattr_config" lineno="117">
 <summary>
 Set the attributes of iptables config files.
 </summary>
@@ -119145,7 +102084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_read_config" lineno="117">
+<interface name="iptables_read_config" lineno="136">
 <summary>
 Read iptables config files.
 </summary>
@@ -119155,7 +102094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_etc_filetrans_config" lineno="138">
+<interface name="iptables_etc_filetrans_config" lineno="157">
 <summary>
 Create files in /etc with the type used for
 the iptables config files.
@@ -119166,7 +102105,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_manage_config" lineno="156">
+<interface name="iptables_manage_config" lineno="175">
 <summary>
 Manage iptables config files.
 </summary>
@@ -119176,17 +102115,37 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_dontaudit_read_pids" lineno="175">
+<interface name="iptables_getattr_runtime_files" lineno="194">
 <summary>
-dontaudit reading iptables_runtime_t  (Deprecated)
+Get the attributes of iptables runtime files.
 </summary>
 <param name="domain">
 <summary>
-Domain to not audit.
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_read_runtime_files" lineno="212">
+<summary>
+Read iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_mounton_runtime_files" lineno="230">
+<summary>
+Mount on iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_dontaudit_read_runtime_files" lineno="190">
+<interface name="iptables_dontaudit_read_runtime_files" lineno="248">
 <summary>
 Do not audit reading iptables runtime files.
 </summary>
@@ -119196,7 +102155,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="iptables_startstop" lineno="208">
+<interface name="iptables_startstop" lineno="266">
 <summary>
 Allow specified domain to start and stop iptables service
 </summary>
@@ -119206,7 +102165,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_status" lineno="227">
+<interface name="iptables_status" lineno="285">
 <summary>
 Allow specified domain to get status of iptables service
 </summary>
@@ -119216,7 +102175,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="iptables_admin" lineno="254">
+<interface name="iptables_admin" lineno="312">
 <summary>
 All of the rules required to
 administrate an iptables
@@ -119455,7 +102414,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_dontaudit_setattr_lib_files" lineno="289">
+<interface name="libs_watch_lib_dirs" lineno="289">
+<summary>
+Watch /usr/lib directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="libs_dontaudit_setattr_lib_files" lineno="307">
 <summary>
 dontaudit attempts to setattr on library files
 </summary>
@@ -119465,7 +102434,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="libs_read_lib_files" lineno="308">
+<interface name="libs_read_lib_files" lineno="326">
 <summary>
 Read files in the library directories, such
 as static libraries.
@@ -119476,7 +102445,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_exec_lib_files" lineno="329">
+<interface name="libs_exec_lib_files" lineno="347">
 <summary>
 Execute library scripts in the caller domain.
 </summary>
@@ -119486,7 +102455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_lib_files" lineno="352">
+<interface name="libs_manage_lib_files" lineno="370">
 <summary>
 Create, read, write, and delete generic
 files in library directories.
@@ -119497,7 +102466,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_dontaudit_manage_lib_files" lineno="371">
+<interface name="libs_dontaudit_manage_lib_files" lineno="389">
 <summary>
 Do not audit attempts to create, read, write,
 and delete generic files in library directories.
@@ -119508,7 +102477,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabelto_lib_files" lineno="389">
+<interface name="libs_relabelto_lib_files" lineno="407">
 <summary>
 Relabel files to the type used in library directories.
 </summary>
@@ -119518,7 +102487,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_lib_files" lineno="409">
+<interface name="libs_relabel_lib_files" lineno="427">
 <summary>
 Relabel to and from the type used
 for generic lib files.
@@ -119529,7 +102498,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_delete_lib_symlinks" lineno="428">
+<interface name="libs_delete_lib_symlinks" lineno="446">
 <summary>
 Delete generic symlinks in library directories.
 </summary>
@@ -119539,7 +102508,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_lib_symlinks" lineno="446">
+<interface name="libs_manage_lib_symlinks" lineno="464">
 <summary>
 Manage generic symlinks in library directories.
 </summary>
@@ -119549,7 +102518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_manage_shared_libs" lineno="465">
+<interface name="libs_manage_shared_libs" lineno="483">
 <summary>
 Create, read, write, and delete shared libraries.
 </summary>
@@ -119559,7 +102528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_use_shared_libs" lineno="483">
+<interface name="libs_use_shared_libs" lineno="501">
 <summary>
 Load and execute functions from shared libraries.
 </summary>
@@ -119569,7 +102538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_legacy_use_shared_libs" lineno="506">
+<interface name="libs_legacy_use_shared_libs" lineno="524">
 <summary>
 Load and execute functions from shared libraries,
 with legacy support.
@@ -119580,7 +102549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_shared_libs" lineno="527">
+<interface name="libs_relabel_shared_libs" lineno="545">
 <summary>
 Relabel to and from the type used for
 shared libraries.
@@ -119591,7 +102560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560">
+<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="578">
 <summary>
 Create an object in etc with a type transition to
 the ld_so_cache_t type
@@ -119614,7 +102583,7 @@ Name of the resource created for which a type transition occurs
 </summary>
 </param>
 </interface>
-<interface name="libs_lib_filetrans" lineno="594">
+<interface name="libs_lib_filetrans" lineno="612">
 <summary>
 Create an object in the generic lib location with a type transition
 to the provided type
@@ -119640,7 +102609,7 @@ Name of the resource created for which a type transition should occur
 </summary>
 </param>
 </interface>
-<interface name="libs_relabel_lib_dirs" lineno="615">
+<interface name="libs_relabel_lib_dirs" lineno="633">
 <summary>
 Relabel to and from the type used
 for generic lib directories.
@@ -120158,7 +103127,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_use_syslogd_fd" lineno="721">
+<interface name="logging_use_syslogd_fd" lineno="722">
 <summary>
 Allow domain to use a file descriptor
 from syslogd.
@@ -120169,7 +103138,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_relabelto_devlog_sock_files" lineno="740">
+<interface name="logging_relabelto_devlog_sock_files" lineno="741">
 <summary>
 Allow domain to relabelto devlog sock_files
 </summary>
@@ -120180,7 +103149,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_create_devlog" lineno="758">
+<interface name="logging_create_devlog" lineno="759">
 <summary>
 Connect to the syslog control unix stream socket.
 </summary>
@@ -120190,7 +103159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_read_audit_config" lineno="779">
+<interface name="logging_read_audit_config" lineno="780">
 <summary>
 Read the auditd configuration files.
 </summary>
@@ -120201,7 +103170,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_dontaudit_search_audit_config" lineno="802">
+<interface name="logging_dontaudit_search_audit_config" lineno="803">
 <summary>
 dontaudit search of auditd configuration files.
 </summary>
@@ -120212,7 +103181,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_read_syslog_config" lineno="821">
+<interface name="logging_read_syslog_config" lineno="822">
 <summary>
 Read syslog configuration files.
 </summary>
@@ -120223,7 +103192,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_watch_runtime_dirs" lineno="839">
+<interface name="logging_watch_runtime_dirs" lineno="840">
 <summary>
 Watch syslog runtime dirs.
 </summary>
@@ -120233,7 +103202,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_delete_devlog_socket" lineno="858">
+<interface name="logging_delete_devlog_socket" lineno="859">
 <summary>
 Delete the syslog socket files
 </summary>
@@ -120244,17 +103213,7 @@ Domain allowed access
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_manage_pid_sockets" lineno="876">
-<summary>
-Create, read, write, and delete syslog PID sockets.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="logging_manage_runtime_sockets" lineno="891">
+<interface name="logging_manage_runtime_sockets" lineno="877">
 <summary>
 Create, read, write, and delete syslog PID sockets.
 </summary>
@@ -120264,7 +103223,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_search_logs" lineno="912">
+<interface name="logging_search_logs" lineno="898">
 <summary>
 Allows the domain to open a file in the
 log directory, but does not allow the listing
@@ -120276,7 +103235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_dontaudit_search_logs" lineno="932">
+<interface name="logging_dontaudit_search_logs" lineno="918">
 <summary>
 Do not audit attempts to search the var log directory.
 </summary>
@@ -120286,7 +103245,7 @@ Domain not to audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_list_logs" lineno="950">
+<interface name="logging_list_logs" lineno="936">
 <summary>
 List the contents of the generic log directory (/var/log).
 </summary>
@@ -120296,7 +103255,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_generic_log_dirs" lineno="970">
+<interface name="logging_rw_generic_log_dirs" lineno="956">
 <summary>
 Read and write the generic log directory (/var/log).
 </summary>
@@ -120306,7 +103265,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_search_all_logs" lineno="991">
+<interface name="logging_search_all_logs" lineno="977">
 <summary>
 Search through all log dirs.
 </summary>
@@ -120317,7 +103276,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_setattr_all_log_dirs" lineno="1010">
+<interface name="logging_setattr_all_log_dirs" lineno="996">
 <summary>
 Set attributes on all log dirs.
 </summary>
@@ -120328,7 +103287,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="1029">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="1015">
 <summary>
 Do not audit attempts to get the attributes
 of any log files.
@@ -120339,7 +103298,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_getattr_all_logs" lineno="1047">
+<interface name="logging_getattr_all_logs" lineno="1033">
 <summary>
 Read the attributes of any log file
 </summary>
@@ -120349,7 +103308,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="logging_append_all_logs" lineno="1065">
+<interface name="logging_append_all_logs" lineno="1051">
 <summary>
 Append to all log files.
 </summary>
@@ -120359,7 +103318,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_append_all_inherited_logs" lineno="1086">
+<interface name="logging_append_all_inherited_logs" lineno="1072">
 <summary>
 Append to all log files.
 </summary>
@@ -120369,7 +103328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_read_all_logs" lineno="1105">
+<interface name="logging_read_all_logs" lineno="1091">
 <summary>
 Read all log files.
 </summary>
@@ -120380,7 +103339,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_watch_all_logs" lineno="1126">
+<interface name="logging_watch_all_logs" lineno="1112">
 <summary>
 Watch all log files.
 </summary>
@@ -120391,7 +103350,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_exec_all_logs" lineno="1146">
+<interface name="logging_exec_all_logs" lineno="1132">
 <summary>
 Execute all log files in the caller domain.
 </summary>
@@ -120401,7 +103360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_all_logs" lineno="1166">
+<interface name="logging_rw_all_logs" lineno="1152">
 <summary>
 read/write to all log files.
 </summary>
@@ -120411,7 +103370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_manage_all_logs" lineno="1186">
+<interface name="logging_manage_all_logs" lineno="1172">
 <summary>
 Create, read, write, and delete all log files.
 </summary>
@@ -120422,7 +103381,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1207">
+<interface name="logging_manage_generic_log_dirs" lineno="1193">
 <summary>
 Create, read, write, and delete generic log directories.
 </summary>
@@ -120433,7 +103392,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1227">
+<interface name="logging_relabel_generic_log_dirs" lineno="1213">
 <summary>
 Relabel from and to generic log directory type.
 </summary>
@@ -120444,7 +103403,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_read_generic_logs" lineno="1247">
+<interface name="logging_read_generic_logs" lineno="1233">
 <summary>
 Read generic log files.
 </summary>
@@ -120455,7 +103414,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_mmap_generic_logs" lineno="1268">
+<interface name="logging_mmap_generic_logs" lineno="1254">
 <summary>
 Map generic log files.
 </summary>
@@ -120466,7 +103425,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_write_generic_logs" lineno="1286">
+<interface name="logging_write_generic_logs" lineno="1272">
 <summary>
 Write generic log files.
 </summary>
@@ -120476,7 +103435,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1307">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1293">
 <summary>
 Dontaudit Write generic log files.
 </summary>
@@ -120486,7 +103445,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="logging_rw_generic_logs" lineno="1325">
+<interface name="logging_rw_generic_logs" lineno="1311">
 <summary>
 Read and write generic log files.
 </summary>
@@ -120496,7 +103455,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_manage_generic_logs" lineno="1348">
+<interface name="logging_manage_generic_logs" lineno="1334">
 <summary>
 Create, read, write, and delete
 generic log files.
@@ -120508,7 +103467,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_watch_generic_logs_dir" lineno="1367">
+<interface name="logging_watch_generic_logs_dir" lineno="1353">
 <summary>
 Watch generic log dirs.
 </summary>
@@ -120518,7 +103477,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="logging_admin_audit" lineno="1392">
+<interface name="logging_admin_audit" lineno="1378">
 <summary>
 All of the rules required to administrate
 the audit environment
@@ -120535,7 +103494,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_admin_syslog" lineno="1436">
+<interface name="logging_admin_syslog" lineno="1422">
 <summary>
 All of the rules required to administrate
 the syslog environment
@@ -120552,7 +103511,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_admin" lineno="1492">
+<interface name="logging_admin" lineno="1478">
 <summary>
 All of the rules required to administrate
 the logging environment
@@ -120569,7 +103528,7 @@ User role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="logging_syslog_managed_log_file" lineno="1515">
+<interface name="logging_syslog_managed_log_file" lineno="1501">
 <summary>
 Mark the type as a syslog managed log file
 and introduce the proper file transition when
@@ -120587,7 +103546,7 @@ Name to use for the file
 </summary>
 </param>
 </interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1554">
+<interface name="logging_syslog_managed_log_dir" lineno="1540">
 <summary>
 Mark the type as a syslog managed log dir
 and introduce the proper file transition when
@@ -120614,7 +103573,7 @@ Name to use for the directory
 </summary>
 </param>
 </interface>
-<interface name="logging_mmap_journal" lineno="1576">
+<interface name="logging_mmap_journal" lineno="1562">
 <summary>
 Map files in /run/log/journal/ directory.
 </summary>
@@ -120727,17 +103686,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="lvm_rw_inherited_pid_pipes" lineno="185">
-<summary>
-Read and write a lvm unnamed pipe.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="lvm_admin" lineno="205">
+<interface name="lvm_admin" lineno="191">
 <summary>
 All of the rules required to
 administrate an lvm environment.
@@ -120901,7 +103850,18 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_generic_tls_privkey" lineno="235">
+<interface name="miscfiles_mounton_generic_cert_dirs" lineno="234">
+<summary>
+Mount on generic SSL/TLS certificate directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_read_generic_tls_privkey" lineno="254">
 <summary>
 Read generic SSL/TLS private
 keys.
@@ -120913,7 +103873,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="256">
+<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="275">
 <summary>
 Manage generic SSL/TLS private
 keys.
@@ -120924,7 +103884,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="276">
+<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="295">
 <summary>
 Manage generic SSL/TLS private
 keys.
@@ -120936,7 +103896,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297">
+<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="316">
 <summary>
 Manage generic SSL/TLS private
 keys.
@@ -120948,7 +103908,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_fonts" lineno="316">
+<interface name="miscfiles_read_fonts" lineno="335">
 <summary>
 Read fonts.
 </summary>
@@ -120959,7 +103919,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_setattr_fonts_dirs" lineno="347">
+<interface name="miscfiles_setattr_fonts_dirs" lineno="366">
 <summary>
 Set the attributes on a fonts directory.
 </summary>
@@ -120970,7 +103930,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367">
+<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="386">
 <summary>
 Do not audit attempts to set the attributes
 on a fonts directory.
@@ -120982,7 +103942,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_dontaudit_write_fonts" lineno="386">
+<interface name="miscfiles_dontaudit_write_fonts" lineno="405">
 <summary>
 Do not audit attempts to write fonts.
 </summary>
@@ -120993,7 +103953,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_fonts" lineno="406">
+<interface name="miscfiles_manage_fonts" lineno="425">
 <summary>
 Create, read, write, and delete fonts.
 </summary>
@@ -121004,7 +103964,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_watch_fonts_dirs" lineno="431">
+<interface name="miscfiles_watch_fonts_dirs" lineno="450">
 <summary>
 Watch fonts directories.
 </summary>
@@ -121015,7 +103975,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449">
+<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="468">
 <summary>
 Set the attributes on a fonts cache directory.
 </summary>
@@ -121025,7 +103985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468">
+<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="487">
 <summary>
 Do not audit attempts to set the attributes
 on a fonts cache directory.
@@ -121036,7 +103996,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_fonts_cache" lineno="487">
+<interface name="miscfiles_manage_fonts_cache" lineno="506">
 <summary>
 Create, read, write, and delete fonts cache.
 </summary>
@@ -121047,7 +104007,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_read_hwdata" lineno="509">
+<interface name="miscfiles_read_hwdata" lineno="528">
 <summary>
 Read hardware identification data.
 </summary>
@@ -121057,7 +104017,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_getattr_localization" lineno="529">
+<interface name="miscfiles_getattr_localization" lineno="548">
 <summary>
 Allow process to get the attributes of localization info
 </summary>
@@ -121067,7 +104027,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_setattr_localization" lineno="549">
+<interface name="miscfiles_setattr_localization" lineno="568">
 <summary>
 Allow process to setattr localization info
 </summary>
@@ -121077,7 +104037,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_localization" lineno="581">
+<interface name="miscfiles_read_localization" lineno="600">
 <summary>
 Allow process to read localization information.
 </summary>
@@ -121099,7 +104059,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="miscfiles_rw_localization" lineno="604">
+<interface name="miscfiles_rw_localization" lineno="623">
 <summary>
 Allow process to write localization info
 </summary>
@@ -121109,7 +104069,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_relabel_localization" lineno="624">
+<interface name="miscfiles_relabel_localization" lineno="643">
 <summary>
 Allow process to relabel localization info
 </summary>
@@ -121119,7 +104079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_legacy_read_localization" lineno="643">
+<interface name="miscfiles_legacy_read_localization" lineno="662">
 <summary>
 Allow process to read legacy time localization info
 </summary>
@@ -121129,7 +104089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_watch_localization" lineno="662">
+<interface name="miscfiles_watch_localization" lineno="681">
 <summary>
 Watch time localization info
 </summary>
@@ -121139,7 +104099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_search_man_pages" lineno="680">
+<interface name="miscfiles_search_man_pages" lineno="699">
 <summary>
 Search man pages.
 </summary>
@@ -121149,7 +104109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_dontaudit_search_man_pages" lineno="699">
+<interface name="miscfiles_dontaudit_search_man_pages" lineno="718">
 <summary>
 Do not audit attempts to search man pages.
 </summary>
@@ -121159,7 +104119,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_man_pages" lineno="718">
+<interface name="miscfiles_read_man_pages" lineno="737">
 <summary>
 Read man pages
 </summary>
@@ -121170,7 +104130,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_delete_man_pages" lineno="740">
+<interface name="miscfiles_delete_man_pages" lineno="759">
 <summary>
 Delete man pages
 </summary>
@@ -121180,7 +104140,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_man_pages" lineno="762">
+<interface name="miscfiles_manage_man_pages" lineno="781">
 <summary>
 Create, read, write, and delete man pages
 </summary>
@@ -121190,7 +104150,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_man_cache" lineno="783">
+<interface name="miscfiles_read_man_cache" lineno="802">
 <summary>
 Read man cache content.
 </summary>
@@ -121200,7 +104160,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_map_man_cache" lineno="804">
+<interface name="miscfiles_map_man_cache" lineno="823">
 <summary>
 Map man cache content.
 </summary>
@@ -121210,7 +104170,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_man_cache" lineno="823">
+<interface name="miscfiles_manage_man_cache" lineno="842">
 <summary>
 Create, read, write, and delete
 man cache content.
@@ -121221,7 +104181,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_relabel_man_cache" lineno="844">
+<interface name="miscfiles_relabel_man_cache" lineno="863">
 <summary>
 Relabel from and to man cache.
 </summary>
@@ -121231,7 +104191,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_public_files" lineno="865">
+<interface name="miscfiles_search_public_dirs" lineno="882">
+<summary>
+Search public directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_public_files" lineno="904">
 <summary>
 Read public files used for file
 transfer services.
@@ -121243,7 +104213,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_manage_public_files" lineno="887">
+<interface name="miscfiles_manage_public_files" lineno="926">
 <summary>
 Create, read, write, and delete public files
 and directories used for file transfer services.
@@ -121255,7 +104225,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="miscfiles_watch_public_dirs" lineno="907">
+<interface name="miscfiles_watch_public_dirs" lineno="946">
 <summary>
 Watch public files
 </summary>
@@ -121265,7 +104235,38 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_tetex_data" lineno="925">
+<interface name="miscfiles_mounton_all_public_dirs" lineno="964">
+<summary>
+Mount on all public content directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_mounton_all_public_files" lineno="984">
+<summary>
+Mount on all public content files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_rangetrans_all_public_content" lineno="1005">
+<summary>
+Transition to the specified sensitivity
+when creating all public content objects.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_tetex_data" lineno="1031">
 <summary>
 Read TeX data
 </summary>
@@ -121275,7 +104276,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_exec_tetex_data" lineno="949">
+<interface name="miscfiles_exec_tetex_data" lineno="1055">
 <summary>
 Execute TeX data programs in the caller domain.
 </summary>
@@ -121285,7 +104286,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_domain_entry_test_files" lineno="973">
+<interface name="miscfiles_domain_entry_test_files" lineno="1079">
 <summary>
 Let test files be an entry point for
 a specified domain.
@@ -121296,7 +104297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_read_test_files" lineno="991">
+<interface name="miscfiles_read_test_files" lineno="1097">
 <summary>
 Read test files and directories.
 </summary>
@@ -121306,7 +104307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_exec_test_files" lineno="1010">
+<interface name="miscfiles_exec_test_files" lineno="1116">
 <summary>
 Execute test files.
 </summary>
@@ -121316,7 +104317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_etc_filetrans_localization" lineno="1030">
+<interface name="miscfiles_etc_filetrans_localization" lineno="1136">
 <summary>
 Create files in etc directories
 with localization file type.
@@ -121327,7 +104328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="miscfiles_manage_localization" lineno="1050">
+<interface name="miscfiles_manage_localization" lineno="1156">
 <summary>
 Create, read, write, and delete localization
 </summary>
@@ -121361,17 +104362,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_read_module_objects" lineno="51">
-<summary>
-Read the kernel modules.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_read_module_config" lineno="68">
+<interface name="modutils_read_module_config" lineno="53">
 <summary>
 Read the configuration options used when
 loading modules.
@@ -121383,7 +104374,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="modutils_rename_module_config" lineno="94">
+<interface name="modutils_rename_module_config" lineno="79">
 <summary>
 Rename a file with the configuration options used when
 loading modules.
@@ -121394,7 +104385,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_delete_module_config" lineno="113">
+<interface name="modutils_delete_module_config" lineno="98">
 <summary>
 Unlink a file with the configuration options used when
 loading modules.
@@ -121405,7 +104396,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_manage_module_config" lineno="132">
+<interface name="modutils_manage_module_config" lineno="117">
 <summary>
 Manage files with the configuration options used when
 loading modules.
@@ -121416,7 +104407,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="modutils_domtrans" lineno="152">
+<interface name="modutils_domtrans" lineno="137">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -121428,7 +104419,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="modutils_run" lineno="181">
+<interface name="modutils_run" lineno="166">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -121448,7 +104439,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="modutils_exec" lineno="202">
+<interface name="modutils_exec" lineno="187">
 <summary>
 Execute any modutil,
 like insmod, kmod, depmod or updates-modules,
@@ -121501,7 +104492,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_signal" lineno="82">
+<interface name="mount_read_state" lineno="82">
+<summary>
+Read the process state (/proc/pid) of mount.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mount_signal" lineno="100">
 <summary>
 Send a generic signal to mount.
 </summary>
@@ -121511,7 +104512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_use_fds" lineno="100">
+<interface name="mount_use_fds" lineno="118">
 <summary>
 Use file descriptors for mount.
 </summary>
@@ -121521,7 +104522,7 @@ The type of the process performing this action.
 </summary>
 </param>
 </interface>
-<interface name="mount_domtrans_unconfined" lineno="118">
+<interface name="mount_domtrans_unconfined" lineno="136">
 <summary>
 Execute mount in the unconfined mount domain.
 </summary>
@@ -121531,7 +104532,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="mount_run_unconfined" lineno="144">
+<interface name="mount_run_unconfined" lineno="162">
 <summary>
 Execute mount in the unconfined mount domain, and
 allow the specified role the unconfined mount domain,
@@ -121549,7 +104550,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="mount_read_loopback_files" lineno="163">
+<interface name="mount_read_loopback_files" lineno="181">
 <summary>
 Read loopback filesystem image files.
 </summary>
@@ -121559,7 +104560,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_rw_loopback_files" lineno="181">
+<interface name="mount_rw_loopback_files" lineno="199">
 <summary>
 Read and write loopback filesystem image files.
 </summary>
@@ -121569,7 +104570,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_list_runtime" lineno="199">
+<interface name="mount_list_runtime" lineno="217">
 <summary>
 List mount runtime files.
 </summary>
@@ -121579,7 +104580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_watch_runtime_dirs" lineno="217">
+<interface name="mount_watch_runtime_dirs" lineno="235">
 <summary>
 Watch mount runtime dirs.
 </summary>
@@ -121589,7 +104590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_watch_runtime_files" lineno="235">
+<interface name="mount_watch_runtime_files" lineno="253">
 <summary>
 Watch mount runtime files.
 </summary>
@@ -121599,7 +104600,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_watch_reads_runtime_files" lineno="253">
+<interface name="mount_watch_reads_runtime_files" lineno="271">
 <summary>
 Watch reads on mount runtime files.
 </summary>
@@ -121609,7 +104610,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_getattr_runtime_files" lineno="271">
+<interface name="mount_getattr_runtime_files" lineno="289">
 <summary>
 Getattr on mount_runtime_t files
 </summary>
@@ -121619,7 +104620,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_read_runtime_files" lineno="289">
+<interface name="mount_read_runtime_files" lineno="307">
 <summary>
 Read mount runtime files.
 </summary>
@@ -121629,7 +104630,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_rw_runtime_files" lineno="307">
+<interface name="mount_rw_runtime_files" lineno="325">
 <summary>
 Read and write mount runtime files.
 </summary>
@@ -121639,7 +104640,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="mount_rw_pipes" lineno="327">
+<interface name="mount_rw_pipes" lineno="345">
 <summary>
 Read and write mount unnamed pipes
 </summary>
@@ -121717,28 +104718,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="raid_read_mdadm_pid" lineno="59">
-<summary>
-read mdadm pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="raid_manage_mdadm_pid" lineno="75">
-<summary>
-Create, read, write, and delete
-mdadm pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="raid_read_mdadm_runtime_files" lineno="90">
+<interface name="raid_read_mdadm_runtime_files" lineno="59">
 <summary>
 Read mdadm runtime files.
 </summary>
@@ -121748,7 +104728,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="raid_manage_mdadm_runtime_files" lineno="111">
+<interface name="raid_manage_mdadm_runtime_files" lineno="80">
 <summary>
 Create, read, write, and delete
 mdadm runtime files.
@@ -121759,7 +104739,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="raid_admin_mdadm" lineno="137">
+<interface name="raid_admin_mdadm" lineno="106">
 <summary>
 All of the rules required to
 administrate an mdadm environment.
@@ -122128,7 +105108,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_dontaudit_search_config" lineno="588">
+<interface name="seutil_dontaudit_exec_setfiles" lineno="587">
+<summary>
+Do not audit attempts to execute setfiles.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="seutil_dontaudit_search_config" lineno="606">
 <summary>
 Do not audit attempts to search the SELinux
 configuration directory (/etc/selinux).
@@ -122139,7 +105129,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="seutil_dontaudit_read_config" lineno="607">
+<interface name="seutil_dontaudit_read_config" lineno="625">
 <summary>
 Do not audit attempts to read the SELinux
 userland configuration (/etc/selinux).
@@ -122150,7 +105140,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="seutil_read_config" lineno="627">
+<interface name="seutil_read_config" lineno="645">
 <summary>
 Read the general SELinux configuration files.
 </summary>
@@ -122161,7 +105151,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_rw_config" lineno="649">
+<interface name="seutil_rw_config" lineno="667">
 <summary>
 Read and write the general SELinux configuration files.
 </summary>
@@ -122172,7 +105162,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_manage_config" lineno="671">
+<interface name="seutil_manage_config" lineno="689">
 <summary>
 Create, read, write, and delete
 the general selinux configuration files.
@@ -122184,7 +105174,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_manage_config_dirs" lineno="693">
+<interface name="seutil_manage_config_dirs" lineno="711">
 <summary>
 Create, read, write, and delete
 the general selinux configuration directories.
@@ -122196,7 +105186,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_search_default_contexts" lineno="712">
+<interface name="seutil_search_default_contexts" lineno="730">
 <summary>
 Search the policy directory with default_context files.
 </summary>
@@ -122206,7 +105196,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_read_default_contexts" lineno="732">
+<interface name="seutil_read_default_contexts" lineno="750">
 <summary>
 Read the default_contexts files.
 </summary>
@@ -122217,7 +105207,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_manage_default_contexts" lineno="752">
+<interface name="seutil_manage_default_contexts" lineno="770">
 <summary>
 Create, read, write, and delete the default_contexts files.
 </summary>
@@ -122227,7 +105217,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_read_file_contexts" lineno="773">
+<interface name="seutil_read_file_contexts" lineno="791">
 <summary>
 Read the file_contexts files.
 </summary>
@@ -122238,7 +105228,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_dontaudit_read_file_contexts" lineno="795">
+<interface name="seutil_dontaudit_read_file_contexts" lineno="813">
 <summary>
 Do not audit attempts to read the file_contexts files.
 </summary>
@@ -122249,7 +105239,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_rw_file_contexts" lineno="815">
+<interface name="seutil_rw_file_contexts" lineno="833">
 <summary>
 Read and write the file_contexts files.
 </summary>
@@ -122259,7 +105249,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_manage_file_contexts" lineno="837">
+<interface name="seutil_manage_file_contexts" lineno="855">
 <summary>
 Create, read, write, and delete the file_contexts files.
 </summary>
@@ -122270,7 +105260,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_read_bin_policy" lineno="858">
+<interface name="seutil_read_bin_policy" lineno="876">
 <summary>
 Read the SELinux binary policy.
 </summary>
@@ -122280,7 +105270,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_create_bin_policy" lineno="885">
+<interface name="seutil_create_bin_policy" lineno="903">
 <summary>
 Create the SELinux binary policy.
 </summary>
@@ -122290,7 +105280,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_relabelto_bin_policy" lineno="908">
+<interface name="seutil_relabelto_bin_policy" lineno="926">
 <summary>
 Allow the caller to relabel a file to the binary policy type.
 </summary>
@@ -122300,7 +105290,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_manage_bin_policy" lineno="929">
+<interface name="seutil_manage_bin_policy" lineno="947">
 <summary>
 Create, read, write, and delete the SELinux
 binary policy.
@@ -122311,7 +105301,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_read_src_policy" lineno="951">
+<interface name="seutil_read_src_policy" lineno="969">
 <summary>
 Read SELinux policy source files.
 </summary>
@@ -122321,7 +105311,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_manage_src_policy" lineno="973">
+<interface name="seutil_manage_src_policy" lineno="991">
 <summary>
 Create, read, write, and delete SELinux
 policy source files.
@@ -122333,7 +105323,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_domtrans_semanage" lineno="994">
+<interface name="seutil_domtrans_semanage" lineno="1012">
 <summary>
 Execute a domain transition to run semanage.
 </summary>
@@ -122343,7 +105333,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="seutil_run_semanage" lineno="1022">
+<interface name="seutil_run_semanage" lineno="1040">
 <summary>
 Execute semanage in the semanage domain, and
 allow the specified role the semanage domain,
@@ -122361,7 +105351,17 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="seutil_read_module_store" lineno="1041">
+<interface name="seutil_dontaudit_exec_semanage" lineno="1059">
+<summary>
+Do not audit attempts to execute semanage.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="seutil_read_module_store" lineno="1077">
 <summary>
 Read the semanage module store.
 </summary>
@@ -122371,7 +105371,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_manage_module_store" lineno="1066">
+<interface name="seutil_manage_module_store" lineno="1102">
 <summary>
 Full management of the semanage
 module store.
@@ -122382,7 +105382,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_get_semanage_read_lock" lineno="1090">
+<interface name="seutil_get_semanage_read_lock" lineno="1126">
 <summary>
 Get read lock on module store
 </summary>
@@ -122392,7 +105392,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_get_semanage_trans_lock" lineno="1109">
+<interface name="seutil_get_semanage_trans_lock" lineno="1145">
 <summary>
 Get trans lock on module store
 </summary>
@@ -122402,7 +105402,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_libselinux_linked" lineno="1137">
+<interface name="seutil_libselinux_linked" lineno="1173">
 <summary>
 SELinux-enabled program access for
 libselinux-linked programs.
@@ -122421,7 +105421,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="seutil_dontaudit_libselinux_linked" lineno="1167">
+<interface name="seutil_dontaudit_libselinux_linked" lineno="1203">
 <summary>
 Do not audit SELinux-enabled program access for
 libselinux-linked programs.
@@ -122693,7 +105693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_mmap_config_files" lineno="385">
+<interface name="sysnet_mmap_config_files" lineno="386">
 <summary>
 Map network config files.
 </summary>
@@ -122709,7 +105709,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_mmap_read_config" lineno="410">
+<interface name="sysnet_mmap_read_config" lineno="411">
 <summary>
 map network config files.
 </summary>
@@ -122725,7 +105725,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dontaudit_read_config" lineno="429">
+<interface name="sysnet_dontaudit_read_config" lineno="430">
 <summary>
 Do not audit attempts to read network config files.
 </summary>
@@ -122735,7 +105735,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_write_config" lineno="447">
+<interface name="sysnet_write_config" lineno="448">
 <summary>
 Write network config files.
 </summary>
@@ -122745,7 +105745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_create_config" lineno="466">
+<interface name="sysnet_create_config" lineno="467">
 <summary>
 Create network config files.
 </summary>
@@ -122755,7 +105755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_relabel_config" lineno="485">
+<interface name="sysnet_relabel_config" lineno="486">
 <summary>
 Relabel network config files.
 </summary>
@@ -122765,7 +105765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_etc_filetrans_config" lineno="510">
+<interface name="sysnet_etc_filetrans_config" lineno="511">
 <summary>
 Create files in /etc with the type used for
 the network config files.
@@ -122781,7 +105781,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_manage_config" lineno="528">
+<interface name="sysnet_manage_config" lineno="529">
 <summary>
 Create, read, write, and delete network config files.
 </summary>
@@ -122791,27 +105791,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_read_dhcpc_pid" lineno="560">
-<summary>
-Read the dhcp client pid file.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sysnet_delete_dhcpc_pid" lineno="575">
-<summary>
-Delete the dhcp client pid file.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sysnet_read_dhcpc_runtime_files" lineno="590">
+<interface name="sysnet_read_dhcpc_runtime_files" lineno="561">
 <summary>
 Read dhcp client runtime files.
 </summary>
@@ -122821,7 +105801,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_delete_dhcpc_runtime_files" lineno="609">
+<interface name="sysnet_delete_dhcpc_runtime_files" lineno="580">
 <summary>
 Delete the dhcp client runtime files.
 </summary>
@@ -122831,7 +105811,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627">
+<interface name="sysnet_manage_dhcpc_runtime_files" lineno="598">
 <summary>
 Create, read, write, and delete dhcp client runtime files.
 </summary>
@@ -122841,7 +105821,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="645">
+<interface name="sysnet_domtrans_ifconfig" lineno="616">
 <summary>
 Execute ifconfig in the ifconfig domain.
 </summary>
@@ -122851,7 +105831,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_run_ifconfig" lineno="672">
+<interface name="sysnet_run_ifconfig" lineno="643">
 <summary>
 Execute ifconfig in the ifconfig domain, and
 allow the specified role the ifconfig domain,
@@ -122869,7 +105849,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_exec_ifconfig" lineno="692">
+<interface name="sysnet_exec_ifconfig" lineno="663">
 <summary>
 Execute ifconfig in the caller domain.
 </summary>
@@ -122879,7 +105859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_signal_ifconfig" lineno="712">
+<interface name="sysnet_signal_ifconfig" lineno="683">
 <summary>
 Send a generic signal to ifconfig.
 </summary>
@@ -122890,7 +105870,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_signull_ifconfig" lineno="731">
+<interface name="sysnet_signull_ifconfig" lineno="702">
 <summary>
 Send null signals to ifconfig.
 </summary>
@@ -122901,7 +105881,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_create_netns_dirs" lineno="750">
+<interface name="sysnet_create_netns_dirs" lineno="721">
 <summary>
 Create the /run/netns directory with
 an automatic type transition.
@@ -122912,7 +105892,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_netns_filetrans" lineno="784">
+<interface name="sysnet_netns_filetrans" lineno="755">
 <summary>
 Create an object in the /run/netns
 directory with a private type.
@@ -122938,7 +105918,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_read_dhcp_config" lineno="805">
+<interface name="sysnet_read_dhcp_config" lineno="776">
 <summary>
 Read the DHCP configuration files.
 </summary>
@@ -122948,7 +105928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_search_dhcp_state" lineno="825">
+<interface name="sysnet_search_dhcp_state" lineno="796">
 <summary>
 Search the DHCP state data directory.
 </summary>
@@ -122958,7 +105938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="869">
+<interface name="sysnet_dhcp_state_filetrans" lineno="840">
 <summary>
 Create DHCP state data.
 </summary>
@@ -122993,7 +105973,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dns_name_resolve" lineno="889">
+<interface name="sysnet_dns_name_resolve" lineno="860">
 <summary>
 Perform a DNS name resolution.
 </summary>
@@ -123004,7 +105984,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="sysnet_use_ldap" lineno="940">
+<interface name="sysnet_use_ldap" lineno="911">
 <summary>
 Connect and use a LDAP server.
 </summary>
@@ -123014,7 +105994,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_use_portmap" lineno="967">
+<interface name="sysnet_use_portmap" lineno="938">
 <summary>
 Connect and use remote port mappers.
 </summary>
@@ -123024,7 +106004,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="1001">
+<interface name="sysnet_dhcpc_script_entry" lineno="972">
 <summary>
 Make the specified program domain
 accessable from the DHCP hooks/scripts.
@@ -123076,7 +106056,7 @@ The type for the user pty
 </summary>
 </param>
 </template>
-<template name="systemd_user_daemon_domain" lineno="221">
+<template name="systemd_user_daemon_domain" lineno="222">
 <summary>
 Allow the specified domain to be started as a daemon by the
 specified systemd user instance.
@@ -123097,7 +106077,7 @@ Domain to allow the systemd user domain to run.
 </summary>
 </param>
 </template>
-<interface name="systemd_user_activated_sock_file" lineno="242">
+<interface name="systemd_user_activated_sock_file" lineno="243">
 <summary>
 Associate the specified file type to be a type whose sock files
 can be managed by systemd user instances for socket activation.
@@ -123108,7 +106088,7 @@ File type to be associated.
 </summary>
 </param>
 </interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="267">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="268">
 <summary>
 Associate the specified domain to be a domain whose unix stream
 sockets and sock files can be managed by systemd user instances
@@ -123125,7 +106105,7 @@ File type of the domain's sock files to be associated.
 </summary>
 </param>
 </interface>
-<template name="systemd_user_send_systemd_notify" lineno="293">
+<template name="systemd_user_send_systemd_notify" lineno="294">
 <summary>
 Allow the target domain the permissions necessary
 to use systemd notify when started by the specified
@@ -123142,7 +106122,7 @@ Domain to be allowed systemd notify permissions.
 </summary>
 </param>
 </template>
-<template name="systemd_user_app_status" lineno="321">
+<template name="systemd_user_app_status" lineno="322">
 <summary>
 Allow the target domain to be monitored and have its output
 captured by the specified systemd user instance domain.
@@ -123158,7 +106138,7 @@ Domain to allow the systemd user instance to monitor.
 </summary>
 </param>
 </template>
-<template name="systemd_read_user_manager_state" lineno="361">
+<template name="systemd_read_user_manager_state" lineno="362">
 <summary>
 Read the process state (/proc/pid) of
 the specified systemd user instance.
@@ -123174,7 +106154,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_start" lineno="385">
+<template name="systemd_user_manager_system_start" lineno="386">
 <summary>
 Send a start request to the specified
 systemd user instance system object.
@@ -123190,7 +106170,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_stop" lineno="409">
+<template name="systemd_user_manager_system_stop" lineno="410">
 <summary>
 Send a stop request to the specified
 systemd user instance system object.
@@ -123206,7 +106186,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_status" lineno="433">
+<template name="systemd_user_manager_system_status" lineno="434">
 <summary>
 Get the status of the specified
 systemd user instance system object.
@@ -123222,7 +106202,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_dbus_chat" lineno="457">
+<template name="systemd_user_manager_dbus_chat" lineno="458">
 <summary>
 Send and receive messages from the
 specified systemd user instance over dbus.
@@ -123238,7 +106218,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="systemd_search_conf_home_content" lineno="478">
+<interface name="systemd_search_conf_home_content" lineno="479">
 <summary>
 Allow the specified domain to search systemd config home
 content.
@@ -123249,7 +106229,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_conf_home_content" lineno="497">
+<interface name="systemd_manage_conf_home_content" lineno="498">
 <summary>
 Allow the specified domain to manage systemd config home
 content.
@@ -123260,7 +106240,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_conf_home_content" lineno="518">
+<interface name="systemd_relabel_conf_home_content" lineno="519">
 <summary>
 Allow the specified domain to relabel systemd config home
 content.
@@ -123271,7 +106251,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_data_home_content" lineno="539">
+<interface name="systemd_search_data_home_content" lineno="540">
 <summary>
 Allow the specified domain to search systemd data home
 content.
@@ -123282,7 +106262,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_data_home_content" lineno="558">
+<interface name="systemd_manage_data_home_content" lineno="559">
 <summary>
 Allow the specified domain to manage systemd data home
 content.
@@ -123293,7 +106273,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_data_home_content" lineno="579">
+<interface name="systemd_relabel_data_home_content" lineno="580">
 <summary>
 Allow the specified domain to relabel systemd data home
 content.
@@ -123304,7 +106284,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime" lineno="600">
+<interface name="systemd_search_user_runtime" lineno="601">
 <summary>
 Allow the specified domain to search systemd user runtime
 content.
@@ -123315,7 +106295,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_files" lineno="618">
+<interface name="systemd_read_user_runtime_files" lineno="619">
 <summary>
 Allow the specified domain to read systemd user runtime files.
 </summary>
@@ -123325,7 +106305,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="636">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="637">
 <summary>
 Allow the specified domain to read systemd user runtime lnk files.
 </summary>
@@ -123335,7 +106315,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_user_runtime_socket" lineno="655">
+<interface name="systemd_write_user_runtime_socket" lineno="656">
 <summary>
 Allow the specified domain to write to
 the systemd user runtime named socket.
@@ -123346,7 +106326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_unit_files" lineno="674">
+<interface name="systemd_read_user_unit_files" lineno="675">
 <summary>
 Allow the specified domain to read system-wide systemd
 user unit files.  (Deprecated)
@@ -123357,7 +106337,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_units_files" lineno="690">
+<interface name="systemd_read_user_units_files" lineno="691">
 <summary>
 Allow the specified domain to read system-wide systemd
 user unit files.
@@ -123368,7 +106348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_units" lineno="710">
+<interface name="systemd_read_user_runtime_units" lineno="711">
 <summary>
 Allow the specified domain to read systemd user runtime unit files.  (Deprecated)
 </summary>
@@ -123378,7 +106358,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_units_files" lineno="725">
+<interface name="systemd_read_user_runtime_units_files" lineno="726">
 <summary>
 Allow the specified domain to read systemd user runtime unit files.
 </summary>
@@ -123388,7 +106368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="745">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="746">
 <summary>
 Allow the specified domain to search systemd user runtime unit
 directories.
@@ -123399,7 +106379,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="764">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="765">
 <summary>
 Allow the specified domain to list the contents of systemd
 user runtime unit directories.
@@ -123410,7 +106390,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_user_runtime_units" lineno="782">
+<interface name="systemd_status_user_runtime_units" lineno="783">
 <summary>
 Allow the specified domain to get the status of systemd user runtime units.  (Deprecated)
 </summary>
@@ -123420,7 +106400,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_runtime_units_status" lineno="797">
+<interface name="systemd_get_user_runtime_units_status" lineno="798">
 <summary>
 Allow the specified domain to get the status of systemd user runtime units.
 </summary>
@@ -123430,7 +106410,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_runtime_units" lineno="816">
+<interface name="systemd_start_user_runtime_units" lineno="817">
 <summary>
 Allow the specified domain to start systemd user runtime units.
 </summary>
@@ -123440,7 +106420,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_runtime_units" lineno="835">
+<interface name="systemd_stop_user_runtime_units" lineno="836">
 <summary>
 Allow the specified domain to stop systemd user runtime units.
 </summary>
@@ -123450,7 +106430,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_runtime_units" lineno="854">
+<interface name="systemd_reload_user_runtime_units" lineno="855">
 <summary>
 Allow the specified domain to reload systemd user runtime units.
 </summary>
@@ -123460,7 +106440,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_transient_units_files" lineno="873">
+<interface name="systemd_read_user_transient_units_files" lineno="874">
 <summary>
 Allow the specified domain to read systemd user transient unit files.
 </summary>
@@ -123470,7 +106450,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_transient_unit_dirs" lineno="893">
+<interface name="systemd_search_user_transient_unit_dirs" lineno="894">
 <summary>
 Allow the specified domain to search systemd user transient unit
 directories.
@@ -123481,7 +106461,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_user_transient_unit_dirs" lineno="912">
+<interface name="systemd_list_user_transient_unit_dirs" lineno="913">
 <summary>
 Allow the specified domain to list the contents of systemd
 user transient unit directories.
@@ -123492,7 +106472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_transient_units_status" lineno="930">
+<interface name="systemd_get_user_transient_units_status" lineno="931">
 <summary>
 Allow the specified domain to get the status of systemd user transient units.
 </summary>
@@ -123502,7 +106482,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_transient_units" lineno="949">
+<interface name="systemd_start_user_transient_units" lineno="950">
 <summary>
 Allow the specified domain to start systemd user transient units.
 </summary>
@@ -123512,7 +106492,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_transient_units" lineno="968">
+<interface name="systemd_stop_user_transient_units" lineno="969">
 <summary>
 Allow the specified domain to stop systemd user transient units.
 </summary>
@@ -123522,7 +106502,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_transient_units" lineno="987">
+<interface name="systemd_reload_user_transient_units" lineno="988">
 <summary>
 Allow the specified domain to reload systemd user transient units.
 </summary>
@@ -123532,7 +106512,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_log_parse_environment" lineno="1007">
+<interface name="systemd_log_parse_environment" lineno="1008">
 <summary>
 Make the specified type usable as an
 log parse environment type.
@@ -123543,7 +106523,7 @@ Type to be used as a log parse environment type.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_nss" lineno="1027">
+<interface name="systemd_use_nss" lineno="1028">
 <summary>
 Allow domain to use systemd's Name Service Switch (NSS) module.
 This module provides UNIX user and group name resolution for dynamic users
@@ -123555,7 +106535,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_PrivateDevices" lineno="1054">
+<interface name="systemd_PrivateDevices" lineno="1055">
 <summary>
 Allow domain to be used as a systemd service with a unit
 that uses PrivateDevices=yes in section [Service].
@@ -123566,7 +106546,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_homework_semaphores" lineno="1071">
+<interface name="systemd_rw_homework_semaphores" lineno="1072">
 <summary>
 Read and write systemd-homework semaphores.
 </summary>
@@ -123576,7 +106556,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_hwdb" lineno="1089">
+<interface name="systemd_read_hwdb" lineno="1090">
 <summary>
 Allow domain to read udev hwdb file
 </summary>
@@ -123586,7 +106566,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_map_hwdb" lineno="1107">
+<interface name="systemd_map_hwdb" lineno="1108">
 <summary>
 Allow domain to map udev hwdb file
 </summary>
@@ -123596,9 +106576,9 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_pids" lineno="1125">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1126">
 <summary>
-Read systemd_login PID files.  (Deprecated)
+Watch systemd-logind runtime dirs.
 </summary>
 <param name="domain">
 <summary>
@@ -123606,9 +106586,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="1140">
+<interface name="systemd_read_logind_runtime_files" lineno="1145">
 <summary>
-Manage systemd_login PID pipes.  (Deprecated)
+Read systemd-logind runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -123616,9 +106596,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="1155">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1165">
 <summary>
-Write systemd_login named pipe.  (Deprecated)
+Manage systemd-logind runtime pipes.
 </summary>
 <param name="domain">
 <summary>
@@ -123626,9 +106606,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="1170">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1184">
 <summary>
-Watch systemd-logind runtime dirs.
+Write systemd-logind runtime named pipe.
 </summary>
 <param name="domain">
 <summary>
@@ -123636,9 +106616,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_runtime_files" lineno="1189">
+<interface name="systemd_use_logind_fds" lineno="1205">
 <summary>
-Read systemd-logind runtime files.
+Use inherited systemd
+logind file descriptors.
 </summary>
 <param name="domain">
 <summary>
@@ -123646,9 +106627,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="1209">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1223">
 <summary>
-Manage systemd-logind runtime pipes.
+Watch logind sessions dirs.
 </summary>
 <param name="domain">
 <summary>
@@ -123656,9 +106637,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1228">
+<interface name="systemd_read_logind_sessions_files" lineno="1242">
 <summary>
-Write systemd-logind runtime named pipe.
+Read logind sessions files.
 </summary>
 <param name="domain">
 <summary>
@@ -123666,10 +106647,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_logind_fds" lineno="1249">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1263">
 <summary>
-Use inherited systemd
-logind file descriptors.
+Write inherited logind sessions pipes.
 </summary>
 <param name="domain">
 <summary>
@@ -123677,9 +106657,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1267">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1283">
 <summary>
-Watch logind sessions dirs.
+Write inherited logind inhibit pipes.
 </summary>
 <param name="domain">
 <summary>
@@ -123687,9 +106667,10 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1286">
+<interface name="systemd_dbus_chat_logind" lineno="1304">
 <summary>
-Read logind sessions files.
+Send and receive messages from
+systemd logind over dbus.
 </summary>
 <param name="domain">
 <summary>
@@ -123697,9 +106678,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307">
+<interface name="systemd_status_logind" lineno="1324">
 <summary>
-Write inherited logind sessions pipes.
+Get the system status information from systemd_login
 </summary>
 <param name="domain">
 <summary>
@@ -123707,9 +106688,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327">
+<interface name="systemd_signull_logind" lineno="1343">
 <summary>
-Write inherited logind inhibit pipes.
+Send systemd_login a null signal.
 </summary>
 <param name="domain">
 <summary>
@@ -123717,10 +106698,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_logind" lineno="1348">
+<interface name="systemd_list_userdb_runtime_dirs" lineno="1361">
 <summary>
-Send and receive messages from
-systemd logind over dbus.
+List the contents of systemd userdb runtime directories.
 </summary>
 <param name="domain">
 <summary>
@@ -123728,9 +106708,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_logind" lineno="1368">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1379">
 <summary>
-Get the system status information from systemd_login
+Manage systemd userdb runtime directories.
 </summary>
 <param name="domain">
 <summary>
@@ -123738,9 +106718,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_signull_logind" lineno="1387">
+<interface name="systemd_read_userdb_runtime_files" lineno="1397">
 <summary>
-Send systemd_login a null signal.
+Read systemd userdb runtime files.
 </summary>
 <param name="domain">
 <summary>
@@ -123748,9 +106728,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1415">
 <summary>
-Manage systemd userdb runtime directories.
+Manage socket files under /run/systemd/userdb .
 </summary>
 <param name="domain">
 <summary>
@@ -123758,9 +106738,9 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423">
+<interface name="systemd_stream_connect_userdb" lineno="1433">
 <summary>
-Manage socket files under /run/systemd/userdb .
+Connect to /run/systemd/userdb/io.systemd.DynamicUser .
 </summary>
 <param name="domain">
 <summary>
@@ -123768,27 +106748,27 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_userdb" lineno="1441">
+<interface name="systemd_read_machines" lineno="1455">
 <summary>
-Connect to /run/systemd/userdb/io.systemd.DynamicUser .
+Allow reading /run/systemd/machines
 </summary>
 <param name="domain">
 <summary>
-Domain allowed access.
+Domain that can access the machines files
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_machines" lineno="1463">
+<interface name="systemd_watch_machines_dirs" lineno="1474">
 <summary>
-Allow reading /run/systemd/machines
+Allow watching /run/systemd/machines
 </summary>
 <param name="domain">
 <summary>
-Domain that can access the machines files
+Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_connect_machined" lineno="1482">
+<interface name="systemd_connect_machined" lineno="1492">
 <summary>
 Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
 </summary>
@@ -123798,7 +106778,7 @@ Domain that can access the socket
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_machined" lineno="1501">
+<interface name="systemd_dbus_chat_machined" lineno="1511">
 <summary>
 Send and receive messages from
 systemd machined over dbus.
@@ -123809,7 +106789,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1522">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1532">
 <summary>
 Send and receive messages from
 systemd hostnamed over dbus.
@@ -123820,7 +106800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1542">
+<interface name="systemd_use_passwd_agent_fds" lineno="1552">
 <summary>
 allow systemd_passwd_agent to inherit fds
 </summary>
@@ -123830,7 +106810,7 @@ Domain that owns the fds
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_passwd_agent" lineno="1565">
+<interface name="systemd_run_passwd_agent" lineno="1575">
 <summary>
 allow systemd_passwd_agent to be run by admin
 </summary>
@@ -123845,7 +106825,7 @@ role that it runs in
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent" lineno="1586">
+<interface name="systemd_use_passwd_agent" lineno="1596">
 <summary>
 Allow a systemd_passwd_agent_t process to interact with a daemon
 that needs a password from the sysadmin.
@@ -123856,7 +106836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1620">
 <summary>
 Transition to systemd_passwd_runtime_t when creating dirs
 </summary>
@@ -123866,7 +106846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1641">
 <summary>
 Transition to systemd_userdbd_runtime_t when
 creating the userdb directory inside an init runtime
@@ -123878,7 +106858,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1659">
 <summary>
 Allow to domain to create systemd-passwd symlink
 </summary>
@@ -123888,7 +106868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1677">
 <summary>
 Allow a domain to watch systemd-passwd runtime dirs.
 </summary>
@@ -123898,17 +106878,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_all_units" lineno="1685">
-<summary>
-manage systemd unit dirs and the files in them  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="systemd_list_journal_dirs" lineno="1700">
+<interface name="systemd_list_journal_dirs" lineno="1695">
 <summary>
 Allow domain to list the contents of systemd_journal_t dirs
 </summary>
@@ -123918,7 +106888,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_journal_files" lineno="1718">
+<interface name="systemd_read_journal_files" lineno="1713">
 <summary>
 Allow domain to read systemd_journal_t files
 </summary>
@@ -123928,7 +106898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_journal_files" lineno="1737">
+<interface name="systemd_manage_journal_files" lineno="1732">
 <summary>
 Allow domain to create/manage systemd_journal_t files
 </summary>
@@ -123938,7 +106908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_journal_dirs" lineno="1757">
+<interface name="systemd_watch_journal_dirs" lineno="1752">
 <summary>
 Allow domain to add a watch on systemd_journal_t directories
 </summary>
@@ -123948,7 +106918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1775">
+<interface name="systemd_relabelto_journal_dirs" lineno="1770">
 <summary>
 Relabel to systemd-journald directory type.
 </summary>
@@ -123958,7 +106928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_files" lineno="1794">
+<interface name="systemd_relabelto_journal_files" lineno="1789">
 <summary>
 Relabel to systemd-journald file type.
 </summary>
@@ -123968,7 +106938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_units" lineno="1814">
+<interface name="systemd_read_networkd_units" lineno="1809">
 <summary>
 Allow domain to read systemd_networkd_t unit files
 </summary>
@@ -123978,7 +106948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_networkd_units" lineno="1834">
+<interface name="systemd_manage_networkd_units" lineno="1829">
 <summary>
 Allow domain to create/manage systemd_networkd_t unit files
 </summary>
@@ -123988,7 +106958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_enabledisable_networkd" lineno="1854">
+<interface name="systemd_enabledisable_networkd" lineno="1849">
 <summary>
 Allow specified domain to enable systemd-networkd units
 </summary>
@@ -123998,7 +106968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_startstop_networkd" lineno="1873">
+<interface name="systemd_startstop_networkd" lineno="1868">
 <summary>
 Allow specified domain to start systemd-networkd units
 </summary>
@@ -124008,7 +106978,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1893">
+<interface name="systemd_dbus_chat_networkd" lineno="1888">
 <summary>
 Send and receive messages from
 systemd networkd over dbus.
@@ -124019,7 +106989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_networkd" lineno="1913">
+<interface name="systemd_status_networkd" lineno="1908">
 <summary>
 Allow specified domain to get status of systemd-networkd
 </summary>
@@ -124029,7 +106999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1927">
 <summary>
 Relabel systemd_networkd tun socket.
 </summary>
@@ -124039,7 +107009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1945">
 <summary>
 Read/Write from systemd_networkd netlink route socket.
 </summary>
@@ -124049,7 +107019,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_networkd_runtime" lineno="1968">
+<interface name="systemd_list_networkd_runtime" lineno="1963">
 <summary>
 Allow domain to list dirs under /run/systemd/netif
 </summary>
@@ -124059,7 +107029,7 @@ domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="1982">
 <summary>
 Watch directories under /run/systemd/netif
 </summary>
@@ -124069,7 +107039,7 @@ Domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_runtime" lineno="2006">
+<interface name="systemd_read_networkd_runtime" lineno="2001">
 <summary>
 Allow domain to read files generated by systemd_networkd
 </summary>
@@ -124079,7 +107049,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_state" lineno="2025">
+<interface name="systemd_read_logind_state" lineno="2020">
 <summary>
 Allow systemd_logind_t to read process state for cgroup file
 </summary>
@@ -124089,7 +107059,7 @@ Domain systemd_logind_t may access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_logind_linger_dir" lineno="2046">
+<interface name="systemd_create_logind_linger_dir" lineno="2041">
 <summary>
 Allow the specified domain to create
 the systemd-logind linger directory with
@@ -124101,7 +107071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_manager_units" lineno="2066">
+<interface name="systemd_start_user_manager_units" lineno="2061">
 <summary>
 Allow the specified domain to start systemd
 user manager units (systemd --user).
@@ -124112,7 +107082,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_manager_units" lineno="2086">
+<interface name="systemd_stop_user_manager_units" lineno="2081">
 <summary>
 Allow the specified domain to stop systemd
 user manager units (systemd --user).
@@ -124123,7 +107093,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_manager_units" lineno="2106">
+<interface name="systemd_reload_user_manager_units" lineno="2101">
 <summary>
 Allow the specified domain to reload systemd
 user manager units (systemd --user).
@@ -124134,7 +107104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_manager_units_status" lineno="2126">
+<interface name="systemd_get_user_manager_units_status" lineno="2121">
 <summary>
 Get the status of systemd user manager
 units (systemd --user).
@@ -124145,7 +107115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_power_units" lineno="2145">
+<interface name="systemd_start_power_units" lineno="2140">
 <summary>
 Allow specified domain to start power units
 </summary>
@@ -124155,7 +107125,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_power_units" lineno="2164">
+<interface name="systemd_status_power_units" lineno="2159">
 <summary>
 Get the system status information about power units
 </summary>
@@ -124165,7 +107135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="2183">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2178">
 <summary>
 Allows connections to the systemd-socket-proxyd's socket.
 </summary>
@@ -124175,7 +107145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="2202">
+<interface name="systemd_tmpfiles_conf_file" lineno="2197">
 <summary>
 Make the specified type usable for
 systemd tmpfiles config files.
@@ -124186,7 +107156,7 @@ Type to be used for systemd tmpfiles config files.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_creator" lineno="2223">
+<interface name="systemd_tmpfiles_creator" lineno="2218">
 <summary>
 Allow the specified domain to create
 the tmpfiles config directory with
@@ -124198,7 +107168,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2254">
 <summary>
 Create an object in the systemd tmpfiles config
 directory, with a private type
@@ -124225,7 +107195,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2278">
+<interface name="systemd_list_tmpfiles_conf" lineno="2273">
 <summary>
 Allow domain to list systemd tmpfiles config directory
 </summary>
@@ -124235,7 +107205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2291">
 <summary>
 Allow domain to relabel to systemd tmpfiles config directory
 </summary>
@@ -124245,7 +107215,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2309">
 <summary>
 Allow domain to relabel to systemd tmpfiles config files
 </summary>
@@ -124255,7 +107225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2332">
+<interface name="systemd_tmpfilesd_managed" lineno="2327">
 <summary>
 Allow systemd_tmpfiles_t to manage filesystem objects
 </summary>
@@ -124265,7 +107235,7 @@ Type of object to manage
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_resolved" lineno="2359">
+<interface name="systemd_stream_connect_resolved" lineno="2354">
 <summary>
 Connect to systemd resolved over
 /run/systemd/resolve/io.systemd.Resolve .
@@ -124276,7 +107246,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2380">
+<interface name="systemd_dbus_chat_resolved" lineno="2375">
 <summary>
 Send and receive messages from
 systemd resolved over dbus.
@@ -124287,7 +107257,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_resolved_runtime" lineno="2400">
+<interface name="systemd_read_resolved_runtime" lineno="2395">
 <summary>
 Allow domain to read resolv.conf file generated by systemd_resolved
 </summary>
@@ -124297,7 +107267,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_exec_systemctl" lineno="2422">
+<interface name="systemd_exec_systemctl" lineno="2417">
 <summary>
 Execute the systemctl program.
 </summary>
@@ -124307,7 +107277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2453">
+<interface name="systemd_getattr_updated_runtime" lineno="2448">
 <summary>
 Allow domain to getattr on .updated file (generated by systemd-update-done
 </summary>
@@ -124317,7 +107287,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_all_user_keys" lineno="2471">
+<interface name="systemd_search_all_user_keys" lineno="2466">
 <summary>
 Search keys for the all systemd --user domains.
 </summary>
@@ -124327,7 +107297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_all_user_keys" lineno="2489">
+<interface name="systemd_create_all_user_keys" lineno="2484">
 <summary>
 Create keys for the all systemd --user domains.
 </summary>
@@ -124337,7 +107307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_all_user_keys" lineno="2507">
+<interface name="systemd_write_all_user_keys" lineno="2502">
 <summary>
 Write keys for the all systemd --user domains.
 </summary>
@@ -124347,7 +107317,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_domtrans_sysusers" lineno="2526">
+<interface name="systemd_domtrans_sysusers" lineno="2521">
 <summary>
 Execute systemd-sysusers in the
 systemd sysusers domain.
@@ -124358,7 +107328,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_sysusers" lineno="2551">
+<interface name="systemd_run_sysusers" lineno="2546">
 <summary>
 Run systemd-sysusers with a domain transition.
 </summary>
@@ -124374,7 +107344,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2571">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2566">
 <summary>
 receive and use a systemd_machined_devpts_t file handle
 </summary>
@@ -124877,7 +107847,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_dontaudit_rw_runtime_files" lineno="591">
+<interface name="udev_dontaudit_rw_runtime_files" lineno="592">
 <summary>
 dontaudit attempts to read/write udev runtime files.
 </summary>
@@ -124887,7 +107857,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_manage_runtime_files" lineno="610">
+<interface name="udev_manage_runtime_files" lineno="611">
 <summary>
 Create, read, write, and delete
 udev runtime files.
@@ -124898,7 +107868,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_domtrans_udevadm" lineno="629">
+<interface name="udev_domtrans_udevadm" lineno="630">
 <summary>
 Execute udev admin in the udevadm domain.
 </summary>
@@ -124908,7 +107878,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="udevadm_domtrans" lineno="647">
+<interface name="udevadm_domtrans" lineno="648">
 <summary>
 Execute udev admin in the udevadm domain.  (Deprecated)
 </summary>
@@ -124918,7 +107888,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="udevadm_run" lineno="669">
+<interface name="udevadm_run" lineno="670">
 <summary>
 Execute udevadm in the udevadm domain, and
 allow the specified role the udevadm domain.  (Deprecated)
@@ -124935,7 +107905,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="udev_run_udevadm" lineno="691">
+<interface name="udev_run_udevadm" lineno="692">
 <summary>
 Execute udevadm in the udevadm domain, and
 allow the specified role the udevadm domain.
@@ -124952,7 +107922,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="udevadm_exec" lineno="710">
+<interface name="udevadm_exec" lineno="711">
 <summary>
 Execute udevadm in the caller domain.  (Deprecated)
 </summary>
@@ -124962,7 +107932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_exec_udevadm" lineno="725">
+<interface name="udev_exec_udevadm" lineno="726">
 <summary>
 Execute udevadm in the caller domain.
 </summary>
@@ -124972,7 +107942,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="udev_pid_filetrans_rules" lineno="755">
+<interface name="udev_pid_filetrans_rules" lineno="756">
 <summary>
 Write in /var/run/udev with the udev_rules_t (udev rules) file type
 </summary>
@@ -124992,7 +107962,7 @@ Name of the directory that the file transition will work on
 </summary>
 </param>
 </interface>
-<interface name="udev_create_rules_dirs" lineno="774">
+<interface name="udev_create_rules_dirs" lineno="775">
 <summary>
 Create udev rules directories
 </summary>
@@ -125660,7 +108630,7 @@ is the prefix for sysadm_t).
 </summary>
 </param>
 </template>
-<interface name="userdom_security_admin_template" lineno="1505">
+<interface name="userdom_security_admin_template" lineno="1506">
 <summary>
 Allow user to run as a secadm
 </summary>
@@ -125686,7 +108656,7 @@ The role  of the object to create.
 </summary>
 </param>
 </interface>
-<template name="userdom_xdg_user_template" lineno="1608">
+<template name="userdom_xdg_user_template" lineno="1609">
 <summary>
 Allow user to interact with xdg content types
 </summary>
@@ -125707,7 +108677,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="userdom_user_application_type" lineno="1657">
+<interface name="userdom_user_application_type" lineno="1658">
 <summary>
 Make the specified type usable as
 a user application domain type.
@@ -125718,7 +108688,7 @@ Type to be used as a user application domain.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_application_domain" lineno="1678">
+<interface name="userdom_user_application_domain" lineno="1679">
 <summary>
 Make the specified type usable as
 a user application domain.
@@ -125734,7 +108704,7 @@ Type to be used as the domain entry point.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content" lineno="1695">
+<interface name="userdom_user_home_content" lineno="1696">
 <summary>
 Make the specified type usable in a
 user home directory.
@@ -125746,7 +108716,7 @@ user home directory.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_file" lineno="1721">
+<interface name="userdom_user_tmp_file" lineno="1722">
 <summary>
 Make the specified type usable as a
 user temporary file.
@@ -125758,7 +108728,7 @@ temporary directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmpfs_file" lineno="1738">
+<interface name="userdom_user_tmpfs_file" lineno="1739">
 <summary>
 Make the specified type usable as a
 user tmpfs file.
@@ -125770,7 +108740,7 @@ tmpfs directories.
 </summary>
 </param>
 </interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1753">
+<interface name="userdom_attach_admin_tun_iface" lineno="1754">
 <summary>
 Allow domain to attach to TUN devices created by administrative users.
 </summary>
@@ -125780,7 +108750,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ptys" lineno="1772">
+<interface name="userdom_setattr_user_ptys" lineno="1773">
 <summary>
 Set the attributes of a user pty.
 </summary>
@@ -125790,7 +108760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_pty" lineno="1790">
+<interface name="userdom_create_user_pty" lineno="1791">
 <summary>
 Create a user pty.
 </summary>
@@ -125800,7 +108770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1808">
+<interface name="userdom_getattr_user_home_dirs" lineno="1809">
 <summary>
 Get the attributes of user home directories.
 </summary>
@@ -125810,7 +108780,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1828">
 <summary>
 Do not audit attempts to get the attributes of user home directories.
 </summary>
@@ -125820,7 +108790,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_dirs" lineno="1845">
+<interface name="userdom_search_user_home_dirs" lineno="1846">
 <summary>
 Search user home directories.
 </summary>
@@ -125830,7 +108800,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1873">
 <summary>
 Do not audit attempts to search user home directories.
 </summary>
@@ -125848,7 +108818,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_list_user_home_dirs" lineno="1890">
+<interface name="userdom_list_user_home_dirs" lineno="1891">
 <summary>
 List user home directories.
 </summary>
@@ -125858,7 +108828,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1910">
 <summary>
 Do not audit attempts to list user home subdirectories.
 </summary>
@@ -125868,7 +108838,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_user_home_dirs" lineno="1927">
+<interface name="userdom_create_user_home_dirs" lineno="1928">
 <summary>
 Create user home directories.
 </summary>
@@ -125878,7 +108848,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1945">
+<interface name="userdom_manage_user_home_dirs" lineno="1946">
 <summary>
 Manage user home directories.
 </summary>
@@ -125888,7 +108858,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1963">
+<interface name="userdom_dontaudit_manage_user_home_dirs" lineno="1965">
+<summary>
+Do not audit attempts to manage user
+home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="userdom_relabelto_user_home_dirs" lineno="1983">
 <summary>
 Relabel to user home directories.
 </summary>
@@ -125898,7 +108879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1987">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="2007">
 <summary>
 Create directories in the home dir root with
 the user home directory type.
@@ -125914,7 +108895,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_domtrans" lineno="2024">
+<interface name="userdom_user_home_domtrans" lineno="2044">
 <summary>
 Do a domain transition to the specified
 domain when executing a program in the
@@ -125943,7 +108924,7 @@ Domain to transition to.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="2044">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="2064">
 <summary>
 Do not audit attempts to search user home content directories.
 </summary>
@@ -125953,7 +108934,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_home_content" lineno="2062">
+<interface name="userdom_list_all_user_home_content" lineno="2082">
 <summary>
 List all users home content directories.
 </summary>
@@ -125963,7 +108944,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_home_content" lineno="2081">
+<interface name="userdom_list_user_home_content" lineno="2101">
 <summary>
 List contents of users home directory.
 </summary>
@@ -125973,7 +108954,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="2100">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2120">
 <summary>
 Create, read, write, and delete directories
 in a user home subdirectory.
@@ -125984,7 +108965,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2139">
 <summary>
 Delete all user home content directories.
 </summary>
@@ -125994,7 +108975,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="2139">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2159">
 <summary>
 Delete directories in a user home subdirectory.
 </summary>
@@ -126004,7 +108985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2177">
 <summary>
 Set attributes of all user home content directories.
 </summary>
@@ -126014,7 +108995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2197">
 <summary>
 Do not audit attempts to set the
 attributes of user home files.
@@ -126025,7 +109006,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_home_content_files" lineno="2195">
+<interface name="userdom_map_user_home_content_files" lineno="2215">
 <summary>
 Map user home files.
 </summary>
@@ -126035,7 +109016,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2213">
+<interface name="userdom_mmap_user_home_content_files" lineno="2233">
 <summary>
 Mmap user home files.
 </summary>
@@ -126045,7 +109026,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_files" lineno="2232">
+<interface name="userdom_read_user_home_content_files" lineno="2252">
 <summary>
 Read user home files.
 </summary>
@@ -126055,7 +109036,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2271">
 <summary>
 Do not audit attempts to read user home files.
 </summary>
@@ -126065,7 +109046,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_user_home_content" lineno="2270">
+<interface name="userdom_read_all_user_home_content" lineno="2290">
 <summary>
 Read all user home content, including application-specific resources.
 </summary>
@@ -126075,7 +109056,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2292">
+<interface name="userdom_manage_all_user_home_content" lineno="2312">
 <summary>
 Manage all user home content, including application-specific resources.
 </summary>
@@ -126085,7 +109066,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_all_user_home_content_files" lineno="2314">
+<interface name="userdom_map_all_user_home_content_files" lineno="2334">
 <summary>
 Map all user home content, including application-specific resources.
 </summary>
@@ -126095,7 +109076,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2352">
 <summary>
 Do not audit attempts to append user home files.
 </summary>
@@ -126105,7 +109086,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2370">
 <summary>
 Do not audit attempts to write user home files.
 </summary>
@@ -126115,7 +109096,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2368">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2388">
 <summary>
 Delete all user home content files.
 </summary>
@@ -126125,7 +109106,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2388">
+<interface name="userdom_delete_user_home_content_files" lineno="2408">
 <summary>
 Delete files in a user home subdirectory.
 </summary>
@@ -126135,7 +109116,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406">
+<interface name="userdom_relabel_generic_user_home_dirs" lineno="2426">
 <summary>
 Relabel generic user home dirs.
 </summary>
@@ -126145,7 +109126,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_generic_user_home_files" lineno="2424">
+<interface name="userdom_relabel_generic_user_home_files" lineno="2444">
 <summary>
 Relabel generic user home files.
 </summary>
@@ -126155,7 +109136,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2462">
 <summary>
 Do not audit attempts to relabel user home files.
 </summary>
@@ -126165,7 +109146,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2460">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2480">
 <summary>
 Read user home subdirectory symbolic links.
 </summary>
@@ -126175,7 +109156,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2480">
+<interface name="userdom_exec_user_home_content_files" lineno="2500">
 <summary>
 Execute user home files.
 </summary>
@@ -126186,7 +109167,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2527">
 <summary>
 Do not audit attempts to execute user home files.
 </summary>
@@ -126196,7 +109177,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2526">
+<interface name="userdom_manage_user_home_content_files" lineno="2546">
 <summary>
 Create, read, write, and delete files
 in a user home subdirectory.
@@ -126207,7 +109188,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2567">
 <summary>
 Do not audit attempts to create, read, write, and delete directories
 in a user home subdirectory.
@@ -126218,7 +109199,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2566">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2586">
 <summary>
 Create, read, write, and delete symbolic links
 in a user home subdirectory.
@@ -126229,7 +109210,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2606">
 <summary>
 Delete all user home content symbolic links.
 </summary>
@@ -126239,7 +109220,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2606">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2626">
 <summary>
 Delete symbolic links in a user home directory.
 </summary>
@@ -126249,7 +109230,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2625">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2645">
 <summary>
 Create, read, write, and delete named pipes
 in a user home subdirectory.
@@ -126260,7 +109241,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2646">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2666">
 <summary>
 Create, read, write, and delete named sockets
 in a user home subdirectory.
@@ -126271,7 +109252,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2683">
+<interface name="userdom_user_home_dir_filetrans" lineno="2703">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -126298,7 +109279,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2720">
+<interface name="userdom_user_home_content_filetrans" lineno="2740">
 <summary>
 Create objects in a directory located
 in a user home directory with an
@@ -126326,7 +109307,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2771">
 <summary>
 Automatically use the user_cert_t label for selected resources
 created in a users home directory
@@ -126347,7 +109328,7 @@ Name of the resource that is being created
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2801">
 <summary>
 Create objects in a user home directory
 with an automatic type transition to
@@ -126369,7 +109350,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_exec_user_bin_files" lineno="2800">
+<interface name="userdom_exec_user_bin_files" lineno="2820">
 <summary>
 Execute user executable files.
 </summary>
@@ -126379,7 +109360,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_bin" lineno="2820">
+<interface name="userdom_manage_user_bin" lineno="2840">
 <summary>
 Manage user executable files.
 </summary>
@@ -126389,7 +109370,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_certs" lineno="2842">
+<interface name="userdom_read_user_certs" lineno="2862">
 <summary>
 Read user SSL certificates.
 </summary>
@@ -126400,7 +109381,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2865">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2885">
 <summary>
 Do not audit attempts to manage
 the user SSL certificates.
@@ -126412,7 +109393,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="userdom_manage_user_certs" lineno="2885">
+<interface name="userdom_manage_user_certs" lineno="2905">
 <summary>
 Manage user SSL certificates.
 </summary>
@@ -126422,7 +109403,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2906">
+<interface name="userdom_write_user_tmp_sockets" lineno="2926">
 <summary>
 Write to user temporary named sockets.
 </summary>
@@ -126432,7 +109413,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_user_tmp" lineno="2926">
+<interface name="userdom_list_user_tmp" lineno="2946">
 <summary>
 List user temporary directories.
 </summary>
@@ -126442,7 +109423,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2948">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2968">
 <summary>
 Do not audit attempts to list user
 temporary directories.
@@ -126453,7 +109434,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2966">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2986">
 <summary>
 Delete users temporary directories.
 </summary>
@@ -126463,7 +109444,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="3005">
 <summary>
 Do not audit attempts to manage users
 temporary directories.
@@ -126474,7 +109455,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_files" lineno="3003">
+<interface name="userdom_read_user_tmp_files" lineno="3023">
 <summary>
 Read user temporary files.
 </summary>
@@ -126484,7 +109465,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmp_files" lineno="3024">
+<interface name="userdom_map_user_tmp_files" lineno="3044">
 <summary>
 Map user temporary files.
 </summary>
@@ -126494,7 +109475,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3063">
 <summary>
 Do not audit attempts to read users
 temporary files.
@@ -126505,7 +109486,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3082">
 <summary>
 Do not audit attempts to append users
 temporary files.
@@ -126516,7 +109497,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmp_files" lineno="3080">
+<interface name="userdom_rw_user_tmp_files" lineno="3100">
 <summary>
 Read and write user temporary files.
 </summary>
@@ -126526,7 +109507,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_files" lineno="3101">
+<interface name="userdom_delete_user_tmp_files" lineno="3121">
 <summary>
 Delete users temporary files.
 </summary>
@@ -126536,7 +109517,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3140">
 <summary>
 Do not audit attempts to manage users
 temporary files.
@@ -126547,7 +109528,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="3138">
+<interface name="userdom_read_user_tmp_symlinks" lineno="3158">
 <summary>
 Read user temporary symbolic links.
 </summary>
@@ -126557,7 +109538,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="3159">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3179">
 <summary>
 Delete users temporary symbolic links.
 </summary>
@@ -126567,7 +109548,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="3178">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3198">
 <summary>
 Create, read, write, and delete user
 temporary directories.
@@ -126578,7 +109559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3218">
 <summary>
 Delete users temporary named pipes.
 </summary>
@@ -126588,7 +109569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_files" lineno="3217">
+<interface name="userdom_manage_user_tmp_files" lineno="3237">
 <summary>
 Create, read, write, and delete user
 temporary files.
@@ -126599,7 +109580,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3257">
 <summary>
 Delete users temporary named sockets.
 </summary>
@@ -126609,7 +109590,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3256">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3276">
 <summary>
 Create, read, write, and delete user
 temporary symbolic links.
@@ -126620,7 +109601,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277">
+<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3297">
 <summary>
 Do not audit attempts to read and write
 temporary pipes.
@@ -126631,7 +109612,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3296">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3316">
 <summary>
 Create, read, write, and delete user
 temporary named pipes.
@@ -126642,7 +109623,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3317">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3337">
 <summary>
 Create, read, write, and delete user
 temporary named sockets.
@@ -126653,7 +109634,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3354">
+<interface name="userdom_user_tmp_filetrans" lineno="3374">
 <summary>
 Create objects in a user temporary directory
 with an automatic type transition to
@@ -126680,7 +109661,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3406">
 <summary>
 Create objects in the temporary directory
 with an automatic type transition to
@@ -126702,7 +109683,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3404">
+<interface name="userdom_map_user_tmpfs_files" lineno="3424">
 <summary>
 Map user tmpfs files.
 </summary>
@@ -126712,7 +109693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3422">
+<interface name="userdom_read_user_tmpfs_files" lineno="3442">
 <summary>
 Read user tmpfs files.
 </summary>
@@ -126722,7 +109703,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3462">
 <summary>
 dontaudit Read attempts of user tmpfs files.
 </summary>
@@ -126732,7 +109713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3481">
 <summary>
 relabel to/from user tmpfs dirs
 </summary>
@@ -126742,7 +109723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3480">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3500">
 <summary>
 relabel to/from user tmpfs files
 </summary>
@@ -126752,7 +109733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_content" lineno="3502">
+<interface name="userdom_user_runtime_content" lineno="3522">
 <summary>
 Make the specified type usable in
 the directory /run/user/%{USERID}/.
@@ -126764,7 +109745,7 @@ user_runtime_content_dir_t.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime" lineno="3522">
+<interface name="userdom_search_user_runtime" lineno="3542">
 <summary>
 Search users runtime directories.
 </summary>
@@ -126774,7 +109755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_runtime_root" lineno="3541">
+<interface name="userdom_search_user_runtime_root" lineno="3561">
 <summary>
 Search user runtime root directories.
 </summary>
@@ -126784,7 +109765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561">
+<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3581">
 <summary>
 Do not audit attempts to search
 user runtime root directories.
@@ -126795,7 +109776,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3600">
 <summary>
 Create, read, write, and delete user
 runtime root dirs.
@@ -126806,7 +109787,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3619">
 <summary>
 Relabel to and from user runtime root dirs.
 </summary>
@@ -126816,7 +109797,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3618">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3638">
 <summary>
 Create, read, write, and delete user
 runtime dirs.
@@ -126827,7 +109808,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3638">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3658">
 <summary>
 Mount a filesystem on user runtime dir
 directories.
@@ -126838,7 +109819,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3676">
 <summary>
 Relabel to user runtime directories.
 </summary>
@@ -126848,7 +109829,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3694">
 <summary>
 Relabel from user runtime directories.
 </summary>
@@ -126858,7 +109839,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3692">
+<interface name="userdom_delete_user_runtime_files" lineno="3712">
 <summary>
 delete user runtime files
 </summary>
@@ -126868,7 +109849,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_all_user_runtime" lineno="3711">
+<interface name="userdom_search_all_user_runtime" lineno="3731">
 <summary>
 Search users runtime directories.
 </summary>
@@ -126878,7 +109859,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_list_all_user_runtime" lineno="3730">
+<interface name="userdom_list_all_user_runtime" lineno="3750">
 <summary>
 List user runtime directories.
 </summary>
@@ -126888,7 +109869,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3769">
 <summary>
 delete user runtime directories
 </summary>
@@ -126898,7 +109879,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3767">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3787">
 <summary>
 delete user runtime files
 </summary>
@@ -126908,7 +109889,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3805">
 <summary>
 delete user runtime symlink files
 </summary>
@@ -126918,7 +109899,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3823">
 <summary>
 delete user runtime fifo files
 </summary>
@@ -126928,7 +109909,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3841">
 <summary>
 delete user runtime socket files
 </summary>
@@ -126938,7 +109919,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839">
+<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3859">
 <summary>
 delete user runtime blk files
 </summary>
@@ -126948,7 +109929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857">
+<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3877">
 <summary>
 delete user runtime chr files
 </summary>
@@ -126958,29 +109939,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887">
-<summary>
-Create objects in the pid directory
-with an automatic type transition to
-the user runtime root type.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-The class of the object to be created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914">
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3907">
 <summary>
 Create objects in the runtime directory
 with an automatic type transition to
@@ -127002,7 +109961,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3950">
+<interface name="userdom_user_runtime_filetrans" lineno="3943">
 <summary>
 Create objects in a user runtime
 directory with an automatic type
@@ -127030,7 +109989,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3974">
 <summary>
 Create objects in the user runtime directory
 with an automatic type transition to
@@ -127052,7 +110011,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4004">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -127074,7 +110033,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="4035">
 <summary>
 Create objects in the user runtime root
 directory with an automatic type transition
@@ -127096,7 +110055,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="4060">
+<interface name="userdom_rw_user_tmpfs_files" lineno="4053">
 <summary>
 Read and write user tmpfs files.
 </summary>
@@ -127106,7 +110065,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="4081">
+<interface name="userdom_delete_user_tmpfs_files" lineno="4074">
 <summary>
 Delete user tmpfs files.
 </summary>
@@ -127116,7 +110075,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="4100">
+<interface name="userdom_manage_user_tmpfs_files" lineno="4093">
 <summary>
 Create, read, write, and delete user tmpfs files.
 </summary>
@@ -127126,7 +110085,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_user_ttys" lineno="4120">
+<interface name="userdom_getattr_user_ttys" lineno="4113">
 <summary>
 Get the attributes of a user domain tty.
 </summary>
@@ -127136,7 +110095,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4131">
 <summary>
 Do not audit attempts to get the attributes of a user domain tty.
 </summary>
@@ -127146,7 +110105,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_setattr_user_ttys" lineno="4156">
+<interface name="userdom_setattr_user_ttys" lineno="4149">
 <summary>
 Set the attributes of a user domain tty.
 </summary>
@@ -127156,7 +110115,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4167">
 <summary>
 Do not audit attempts to set the attributes of a user domain tty.
 </summary>
@@ -127166,7 +110125,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ttys" lineno="4192">
+<interface name="userdom_use_user_ttys" lineno="4185">
 <summary>
 Read and write a user domain tty.
 </summary>
@@ -127176,7 +110135,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_user_ptys" lineno="4210">
+<interface name="userdom_use_user_ptys" lineno="4203">
 <summary>
 Read and write a user domain pty.
 </summary>
@@ -127186,7 +110145,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="4245">
+<interface name="userdom_use_inherited_user_terminals" lineno="4238">
 <summary>
 Read and write a user TTYs and PTYs.
 </summary>
@@ -127212,7 +110171,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_use_user_terminals" lineno="4286">
+<interface name="userdom_use_user_terminals" lineno="4279">
 <summary>
 Read, write and open a user TTYs and PTYs.
 </summary>
@@ -127244,7 +110203,7 @@ Domain allowed access.
 </param>
 <infoflow type="both" weight="10"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="4302">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4295">
 <summary>
 Do not audit attempts to read and write
 a user domain tty and pty.
@@ -127255,7 +110214,17 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="4323">
+<interface name="userdom_lock_user_terminals" lineno="4314">
+<summary>
+Lock user TTYs and PTYs.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="userdom_spec_domtrans_all_users" lineno="4335">
 <summary>
 Execute a shell in all user domains.  This
 is an explicit transition, requiring the
@@ -127267,7 +110236,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4358">
 <summary>
 Execute an Xserver session in all user domains.  This
 is an explicit transition, requiring the
@@ -127279,7 +110248,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4381">
 <summary>
 Execute a shell in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -127291,7 +110260,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4404">
 <summary>
 Execute an Xserver session in all unprivileged user domains.  This
 is an explicit transition, requiring the
@@ -127303,7 +110272,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4425">
 <summary>
 Read and write unpriviledged user SysV sempaphores.
 </summary>
@@ -127313,7 +110282,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4443">
 <summary>
 Manage unpriviledged user SysV sempaphores.
 </summary>
@@ -127323,7 +110292,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4462">
 <summary>
 Read and write unpriviledged user SysV shared
 memory segments.
@@ -127334,7 +110303,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4481">
 <summary>
 Manage unpriviledged user SysV shared
 memory segments.
@@ -127345,7 +110314,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4501">
 <summary>
 Execute bin_t in the unprivileged user domains. This
 is an explicit transition, requiring the
@@ -127357,7 +110326,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4524">
 <summary>
 Execute all entrypoint files in unprivileged user
 domains. This is an explicit transition, requiring the
@@ -127369,7 +110338,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_search_user_home_content" lineno="4533">
+<interface name="userdom_search_user_home_content" lineno="4545">
 <summary>
 Search users home directories.
 </summary>
@@ -127379,7 +110348,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signull_unpriv_users" lineno="4552">
+<interface name="userdom_signull_unpriv_users" lineno="4564">
 <summary>
 Send signull to unprivileged user domains.
 </summary>
@@ -127389,7 +110358,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_unpriv_users" lineno="4570">
+<interface name="userdom_signal_unpriv_users" lineno="4582">
 <summary>
 Send general signals to unprivileged user domains.
 </summary>
@@ -127399,7 +110368,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4588">
+<interface name="userdom_use_unpriv_users_fds" lineno="4600">
 <summary>
 Inherit the file descriptors from unprivileged user domains.
 </summary>
@@ -127409,7 +110378,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4628">
 <summary>
 Do not audit attempts to inherit the file descriptors
 from unprivileged user domains.
@@ -127429,7 +110398,7 @@ Domain to not audit.
 </param>
 <infoflow type="none"/>
 </interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4634">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4646">
 <summary>
 Do not audit attempts to use user ptys.
 </summary>
@@ -127439,7 +110408,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4652">
+<interface name="userdom_relabelto_user_ptys" lineno="4664">
 <summary>
 Relabel files to unprivileged user pty types.
 </summary>
@@ -127449,7 +110418,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4683">
 <summary>
 Do not audit attempts to relabel files from
 user pty types.
@@ -127460,7 +110429,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_user_tmp_files" lineno="4689">
+<interface name="userdom_write_user_tmp_files" lineno="4701">
 <summary>
 Write all users files in /tmp
 </summary>
@@ -127470,7 +110439,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4720">
 <summary>
 Do not audit attempts to write users
 temporary files.
@@ -127481,7 +110450,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4726">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4738">
 <summary>
 Do not audit attempts to use user ttys.
 </summary>
@@ -127491,7 +110460,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_state" lineno="4744">
+<interface name="userdom_read_all_users_state" lineno="4756">
 <summary>
 Read the process state of all user domains.
 </summary>
@@ -127501,7 +110470,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_getattr_all_users" lineno="4764">
+<interface name="userdom_getattr_all_users" lineno="4776">
 <summary>
 Get the attributes of all user domains.
 </summary>
@@ -127511,7 +110480,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_use_all_users_fds" lineno="4782">
+<interface name="userdom_use_all_users_fds" lineno="4794">
 <summary>
 Inherit the file descriptors from all user domains
 </summary>
@@ -127521,7 +110490,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4813">
 <summary>
 Do not audit attempts to inherit the file
 descriptors from any user domains.
@@ -127532,7 +110501,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="userdom_signal_all_users" lineno="4819">
+<interface name="userdom_signal_all_users" lineno="4831">
 <summary>
 Send general signals to all user domains.
 </summary>
@@ -127542,7 +110511,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_sigchld_all_users" lineno="4837">
+<interface name="userdom_sigchld_all_users" lineno="4849">
 <summary>
 Send a SIGCHLD signal to all user domains.
 </summary>
@@ -127552,7 +110521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_read_all_users_keys" lineno="4855">
+<interface name="userdom_read_all_users_keys" lineno="4867">
 <summary>
 Read keys for all user domains.
 </summary>
@@ -127562,7 +110531,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_write_all_users_keys" lineno="4873">
+<interface name="userdom_write_all_users_keys" lineno="4885">
 <summary>
 Write keys for all user domains.
 </summary>
@@ -127572,7 +110541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_rw_all_users_keys" lineno="4891">
+<interface name="userdom_rw_all_users_keys" lineno="4903">
 <summary>
 Read and write keys for all user domains.
 </summary>
@@ -127582,7 +110551,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_create_all_users_keys" lineno="4909">
+<interface name="userdom_create_all_users_keys" lineno="4921">
 <summary>
 Create keys for all user domains.
 </summary>
@@ -127592,7 +110561,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_all_users_keys" lineno="4927">
+<interface name="userdom_manage_all_users_keys" lineno="4939">
 <summary>
 Manage keys for all user domains.
 </summary>
@@ -127602,7 +110571,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_dbus_send_all_users" lineno="4945">
+<interface name="userdom_dbus_send_all_users" lineno="4957">
 <summary>
 Send a dbus message to all user domains.
 </summary>
@@ -127612,7 +110581,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4967">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4979">
 <summary>
 Create, read, write, and delete user
 temporary character files.
@@ -127623,7 +110592,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="userdom_relabel_user_certs" lineno="4988">
+<interface name="userdom_relabel_user_certs" lineno="5000">
 <summary>
 Allow relabeling resources to user_cert_t
 </summary>
@@ -127633,7 +110602,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5023">
 <summary>
 Do not audit attempts to read and write
 unserdomain stream.
@@ -127897,7 +110866,18 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_config_dirs" lineno="382">
+<interface name="xdg_dontaudit_search_config_dirs" lineno="383">
+<summary>
+Do not audit attempts to search through the
+xdg config home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_config_dirs" lineno="401">
 <summary>
 Watch the xdg config home directories
 </summary>
@@ -127907,7 +110887,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_all_config_dirs" lineno="400">
+<interface name="xdg_watch_all_config_dirs" lineno="419">
 <summary>
 Watch all the xdg config home directories
 </summary>
@@ -127917,7 +110897,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_config_files" lineno="418">
+<interface name="xdg_read_config_files" lineno="437">
 <summary>
 Read the xdg config home files
 </summary>
@@ -127927,7 +110907,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_config_files" lineno="441">
+<interface name="xdg_read_all_config_files" lineno="460">
 <summary>
 Read all xdg_config_type files
 </summary>
@@ -127937,7 +110917,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_filetrans" lineno="481">
+<interface name="xdg_config_filetrans" lineno="500">
 <summary>
 Create objects in an xdg_config directory
 with an automatic type transition to
@@ -127964,7 +110944,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514">
+<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="533">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_config_t type.
@@ -127985,7 +110965,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_config_dirs" lineno="532">
+<interface name="xdg_create_config_dirs" lineno="551">
 <summary>
 Create xdg config home directories
 </summary>
@@ -127995,7 +110975,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_config" lineno="550">
+<interface name="xdg_manage_config" lineno="569">
 <summary>
 Manage the xdg config home files
 </summary>
@@ -128005,7 +110985,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_config" lineno="575">
+<interface name="xdg_manage_all_config" lineno="594">
 <summary>
 Manage all the xdg config home files regardless of their specific type
 </summary>
@@ -128015,7 +110995,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_config" lineno="600">
+<interface name="xdg_relabel_config" lineno="619">
 <summary>
 Allow relabeling the xdg config home files
 </summary>
@@ -128025,7 +111005,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_config" lineno="624">
+<interface name="xdg_relabel_all_config" lineno="643">
 <summary>
 Allow relabeling the xdg config home files, regardless of their specific type
 </summary>
@@ -128035,7 +111015,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_search_data_dirs" lineno="648">
+<interface name="xdg_search_data_dirs" lineno="667">
 <summary>
 Search through the xdg data home directories
 </summary>
@@ -128045,7 +111025,18 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_data_dirs" lineno="666">
+<interface name="xdg_dontaudit_search_data_dirs" lineno="686">
+<summary>
+Do not audit attempts to search through the
+xdg data home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_data_dirs" lineno="704">
 <summary>
 Watch the xdg data home directories
 </summary>
@@ -128055,7 +111046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_all_data_dirs" lineno="684">
+<interface name="xdg_watch_all_data_dirs" lineno="722">
 <summary>
 Watch all the xdg data home directories
 </summary>
@@ -128065,7 +111056,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_data_files" lineno="702">
+<interface name="xdg_read_data_files" lineno="740">
 <summary>
 Read the xdg data home files
 </summary>
@@ -128075,7 +111066,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_data_files" lineno="725">
+<interface name="xdg_read_all_data_files" lineno="763">
 <summary>
 Read all xdg_data_type files
 </summary>
@@ -128085,7 +111076,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_filetrans" lineno="765">
+<interface name="xdg_data_filetrans" lineno="803">
 <summary>
 Create objects in an xdg_data directory
 with an automatic type transition to
@@ -128112,7 +111103,7 @@ Optional name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="798">
+<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="836">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_data_t type.
@@ -128133,7 +111124,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_data_dirs" lineno="816">
+<interface name="xdg_create_data_dirs" lineno="854">
 <summary>
 Create xdg data home directories
 </summary>
@@ -128143,7 +111134,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_data" lineno="834">
+<interface name="xdg_manage_data" lineno="872">
 <summary>
 Manage the xdg data home files
 </summary>
@@ -128153,7 +111144,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_data" lineno="859">
+<interface name="xdg_manage_all_data" lineno="897">
 <summary>
 Manage all the xdg data home files, regardless of their specific type
 </summary>
@@ -128163,7 +111154,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_data" lineno="884">
+<interface name="xdg_relabel_data" lineno="922">
 <summary>
 Allow relabeling the xdg data home files
 </summary>
@@ -128173,7 +111164,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_data" lineno="908">
+<interface name="xdg_relabel_all_data" lineno="946">
 <summary>
 Allow relabeling the xdg data home files, regardless of their type
 </summary>
@@ -128183,7 +111174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_documents_dirs" lineno="932">
+<interface name="xdg_watch_documents_dirs" lineno="970">
 <summary>
 Watch the xdg documents home directories
 </summary>
@@ -128193,7 +111184,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="961">
+<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="999">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_documents_t type.
@@ -128214,7 +111205,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_documents" lineno="979">
+<interface name="xdg_manage_documents" lineno="1017">
 <summary>
 Manage documents content
 </summary>
@@ -128224,7 +111215,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_documents" lineno="1000">
+<interface name="xdg_relabel_documents" lineno="1038">
 <summary>
 Allow relabeling the documents resources
 </summary>
@@ -128234,7 +111225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_downloads_dirs" lineno="1022">
+<interface name="xdg_watch_downloads_dirs" lineno="1060">
 <summary>
 Watch the xdg downloads home directories
 </summary>
@@ -128244,7 +111235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_downloads" lineno="1040">
+<interface name="xdg_read_downloads" lineno="1078">
 <summary>
 Read downloaded content
 </summary>
@@ -128254,7 +111245,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_downloads" lineno="1063">
+<interface name="xdg_create_downloads" lineno="1101">
 <summary>
 Create downloaded content
 </summary>
@@ -128264,7 +111255,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_write_downloads" lineno="1086">
+<interface name="xdg_write_downloads" lineno="1124">
 <summary>
 Write downloaded content
 </summary>
@@ -128274,7 +111265,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1120">
+<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1158">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_downloads_t type.
@@ -128295,7 +111286,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_downloads" lineno="1138">
+<interface name="xdg_manage_downloads" lineno="1176">
 <summary>
 Manage downloaded content
 </summary>
@@ -128305,7 +111296,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_downloads" lineno="1159">
+<interface name="xdg_relabel_downloads" lineno="1197">
 <summary>
 Allow relabeling the downloads resources
 </summary>
@@ -128315,7 +111306,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_pictures_dirs" lineno="1181">
+<interface name="xdg_watch_pictures_dirs" lineno="1219">
 <summary>
 Watch the xdg pictures home directories
 </summary>
@@ -128325,7 +111316,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_pictures" lineno="1199">
+<interface name="xdg_read_pictures" lineno="1237">
 <summary>
 Read user pictures content
 </summary>
@@ -128335,7 +111326,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1233">
+<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1271">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_pictures_t type.
@@ -128356,7 +111347,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_pictures" lineno="1251">
+<interface name="xdg_manage_pictures" lineno="1289">
 <summary>
 Manage pictures content
 </summary>
@@ -128366,7 +111357,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_pictures" lineno="1272">
+<interface name="xdg_relabel_pictures" lineno="1310">
 <summary>
 Allow relabeling the pictures resources
 </summary>
@@ -128376,7 +111367,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_music_dirs" lineno="1294">
+<interface name="xdg_watch_music_dirs" lineno="1332">
 <summary>
 Watch the xdg music home directories
 </summary>
@@ -128386,7 +111377,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_music" lineno="1312">
+<interface name="xdg_read_music" lineno="1350">
 <summary>
 Read user music content
 </summary>
@@ -128396,7 +111387,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1346">
+<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1384">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_pictures_t type.
@@ -128417,7 +111408,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_music" lineno="1364">
+<interface name="xdg_manage_music" lineno="1402">
 <summary>
 Manage music content
 </summary>
@@ -128427,7 +111418,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_music" lineno="1385">
+<interface name="xdg_relabel_music" lineno="1423">
 <summary>
 Allow relabeling the music resources
 </summary>
@@ -128437,7 +111428,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_watch_videos_dirs" lineno="1407">
+<interface name="xdg_watch_videos_dirs" lineno="1445">
 <summary>
 Watch the xdg video content
 </summary>
@@ -128447,7 +111438,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_videos" lineno="1425">
+<interface name="xdg_read_videos" lineno="1463">
 <summary>
 Read user video content
 </summary>
@@ -128457,7 +111448,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1459">
+<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1497">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_videos_t type.
@@ -128478,7 +111469,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_videos" lineno="1477">
+<interface name="xdg_manage_videos" lineno="1515">
 <summary>
 Manage video content
 </summary>
@@ -128488,7 +111479,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_videos" lineno="1498">
+<interface name="xdg_relabel_videos" lineno="1536">
 <summary>
 Allow relabeling the videos resources
 </summary>
@@ -128498,7 +111489,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_cache_home_content" lineno="1524">
+<interface name="xdg_cache_home_content" lineno="1562">
 <summary>
 Mark the selected type as an xdg_cache_home_type
 </summary>
@@ -128508,7 +111499,7 @@ Type to give the xdg_cache_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_home_content" lineno="1538">
+<interface name="xdg_config_home_content" lineno="1576">
 <summary>
 Mark the selected type as an xdg_config_home_type
 </summary>
@@ -128518,7 +111509,7 @@ Type to give the xdg_config_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_home_content" lineno="1552">
+<interface name="xdg_data_home_content" lineno="1590">
 <summary>
 Mark the selected type as an xdg_data_home_type
 </summary>
@@ -128528,7 +111519,7 @@ Type to give the xdg_data_home_type attribute to
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_cache_home_files" lineno="1566">
+<interface name="xdg_read_cache_home_files" lineno="1604">
 <summary>
 Read the xdg cache home files
 </summary>
@@ -128538,7 +111529,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_cache_home_files" lineno="1580">
+<interface name="xdg_read_all_cache_home_files" lineno="1618">
 <summary>
 Read all xdg_cache_home_type files
 </summary>
@@ -128548,7 +111539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_cache_home_filetrans" lineno="1611">
+<interface name="xdg_cache_home_filetrans" lineno="1649">
 <summary>
 Create objects in an xdg_cache_home directory
 with an automatic type transition to
@@ -128575,7 +111566,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1636">
+<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1674">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_cache_home_t type.
@@ -128596,7 +111587,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_cache_home_dirs" lineno="1650">
+<interface name="xdg_create_cache_home_dirs" lineno="1688">
 <summary>
 Create xdg cache home directories
 </summary>
@@ -128606,7 +111597,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_cache_home" lineno="1664">
+<interface name="xdg_manage_cache_home" lineno="1702">
 <summary>
 Manage the xdg cache home files
 </summary>
@@ -128616,7 +111607,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_cache_home" lineno="1678">
+<interface name="xdg_manage_all_cache_home" lineno="1716">
 <summary>
 Manage all the xdg cache home files regardless of their specific type
 </summary>
@@ -128626,7 +111617,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_cache_home" lineno="1692">
+<interface name="xdg_relabel_cache_home" lineno="1730">
 <summary>
 Allow relabeling the xdg cache home files
 </summary>
@@ -128636,7 +111627,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_cache_home" lineno="1706">
+<interface name="xdg_relabel_all_cache_home" lineno="1744">
 <summary>
 Allow relabeling the xdg cache home files, regardless of their specific type
 </summary>
@@ -128646,7 +111637,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_search_config_home_dirs" lineno="1720">
+<interface name="xdg_search_config_home_dirs" lineno="1758">
 <summary>
 Search through the xdg config home directories
 </summary>
@@ -128656,7 +111647,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_config_home_files" lineno="1734">
+<interface name="xdg_read_config_home_files" lineno="1772">
 <summary>
 Read the xdg config home files
 </summary>
@@ -128666,7 +111657,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_config_home_files" lineno="1748">
+<interface name="xdg_read_all_config_home_files" lineno="1786">
 <summary>
 Read all xdg_config_home_type files
 </summary>
@@ -128676,7 +111667,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_config_home_filetrans" lineno="1779">
+<interface name="xdg_config_home_filetrans" lineno="1817">
 <summary>
 Create objects in an xdg_config_home directory
 with an automatic type transition to
@@ -128703,7 +111694,7 @@ Name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1804">
+<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1842">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_config_home_t type.
@@ -128724,7 +111715,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_config_home_dirs" lineno="1818">
+<interface name="xdg_create_config_home_dirs" lineno="1856">
 <summary>
 Create xdg config home directories
 </summary>
@@ -128734,7 +111725,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_config_home" lineno="1832">
+<interface name="xdg_manage_config_home" lineno="1870">
 <summary>
 Manage the xdg config home files
 </summary>
@@ -128744,7 +111735,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_config_home" lineno="1846">
+<interface name="xdg_manage_all_config_home" lineno="1884">
 <summary>
 Manage all the xdg config home files regardless of their specific type
 </summary>
@@ -128754,7 +111745,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_config_home" lineno="1860">
+<interface name="xdg_relabel_config_home" lineno="1898">
 <summary>
 Allow relabeling the xdg config home files
 </summary>
@@ -128764,7 +111755,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_config_home" lineno="1874">
+<interface name="xdg_relabel_all_config_home" lineno="1912">
 <summary>
 Allow relabeling the xdg config home files, regardless of their specific type
 </summary>
@@ -128774,7 +111765,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_data_home_files" lineno="1888">
+<interface name="xdg_read_data_home_files" lineno="1926">
 <summary>
 Read the xdg data home files
 </summary>
@@ -128784,7 +111775,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_all_data_home_files" lineno="1902">
+<interface name="xdg_read_all_data_home_files" lineno="1940">
 <summary>
 Read all xdg_data_home_type files
 </summary>
@@ -128794,7 +111785,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_data_home_filetrans" lineno="1933">
+<interface name="xdg_data_home_filetrans" lineno="1971">
 <summary>
 Create objects in an xdg_data_home directory
 with an automatic type transition to
@@ -128821,7 +111812,7 @@ Optional name of the file or directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1958">
+<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1996">
 <summary>
 Create objects in the user home dir with an automatic type transition to
 the xdg_data_home_t type.
@@ -128842,7 +111833,7 @@ Name of the directory created
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_data_home_dirs" lineno="1972">
+<interface name="xdg_create_data_home_dirs" lineno="2010">
 <summary>
 Create xdg data home directories
 </summary>
@@ -128852,7 +111843,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_data_home" lineno="1986">
+<interface name="xdg_manage_data_home" lineno="2024">
 <summary>
 Manage the xdg data home files
 </summary>
@@ -128862,7 +111853,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_all_data_home" lineno="2000">
+<interface name="xdg_manage_all_data_home" lineno="2038">
 <summary>
 Manage all the xdg data home files, regardless of their specific type
 </summary>
@@ -128872,7 +111863,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_data_home" lineno="2014">
+<interface name="xdg_relabel_data_home" lineno="2052">
 <summary>
 Allow relabeling the xdg data home files
 </summary>
@@ -128882,7 +111873,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_relabel_all_data_home" lineno="2028">
+<interface name="xdg_relabel_all_data_home" lineno="2066">
 <summary>
 Allow relabeling the xdg data home files, regardless of their type
 </summary>
@@ -128892,7 +111883,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_downloads_home" lineno="2042">
+<interface name="xdg_read_downloads_home" lineno="2080">
 <summary>
 Read downloaded content
 </summary>
@@ -128902,7 +111893,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_videos_home" lineno="2056">
+<interface name="xdg_read_videos_home" lineno="2094">
 <summary>
 Read user video content
 </summary>
@@ -128912,7 +111903,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_pictures_home" lineno="2070">
+<interface name="xdg_read_pictures_home" lineno="2108">
 <summary>
 Read user pictures content
 </summary>
@@ -128922,7 +111913,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_read_music_home" lineno="2084">
+<interface name="xdg_read_music_home" lineno="2122">
 <summary>
 Read user music content
 </summary>
@@ -128932,7 +111923,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_create_downloads_home" lineno="2098">
+<interface name="xdg_create_downloads_home" lineno="2136">
 <summary>
 Create downloaded content
 </summary>
@@ -128942,7 +111933,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_write_downloads_home" lineno="2112">
+<interface name="xdg_write_downloads_home" lineno="2150">
 <summary>
 Write downloaded content
 </summary>
@@ -128952,7 +111943,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_downloads_home" lineno="2126">
+<interface name="xdg_manage_downloads_home" lineno="2164">
 <summary>
 Manage downloaded content
 </summary>
@@ -128962,7 +111953,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_documents_home" lineno="2140">
+<interface name="xdg_manage_documents_home" lineno="2178">
 <summary>
 Manage documents content
 </summary>
@@ -128972,7 +111963,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_music_home" lineno="2154">
+<interface name="xdg_manage_music_home" lineno="2192">
 <summary>
 Manage music content
 </summary>
@@ -128982,7 +111973,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_pictures_home" lineno="2168">
+<interface name="xdg_manage_pictures_home" lineno="2206">
 <summary>
 Manage pictures content
 </summary>
@@ -128992,7 +111983,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="xdg_manage_videos_home" lineno="2182">
+<interface name="xdg_manage_videos_home" lineno="2220">
 <summary>
 Manage video content
 </summary>
@@ -129098,17 +112089,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_read_xenstored_pid_files" lineno="189">
-<summary>
-Read xenstored pid files.  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xen_read_xenstored_runtime_files" lineno="204">
+<interface name="xen_read_xenstored_runtime_files" lineno="189">
 <summary>
 Read xenstored runtime files.
 </summary>
@@ -129118,7 +112099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224">
+<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209">
 <summary>
 Do not audit attempts to read and write
 Xen unix domain stream sockets.
@@ -129129,7 +112110,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect_xenstore" lineno="243">
+<interface name="xen_stream_connect_xenstore" lineno="228">
 <summary>
 Connect to xenstored with a unix
 domain stream socket.
@@ -129140,7 +112121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect" lineno="263">
+<interface name="xen_stream_connect" lineno="248">
 <summary>
 Connect to xend with a unix
 domain stream socket.
@@ -129151,27 +112132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="xen_pid_filetrans" lineno="295">
-<summary>
-Create in a xend_runtime_t directory  (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="xen_runtime_filetrans" lineno="320">
+<interface name="xen_runtime_filetrans" lineno="280">
 <summary>
 Create in a xend_runtime_t directory
 </summary>
@@ -129191,7 +112152,7 @@ The object class of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="xen_domtrans_xm" lineno="338">
+<interface name="xen_domtrans_xm" lineno="298">
 <summary>
 Execute a domain transition to run xm.
 </summary>
@@ -129201,7 +112162,7 @@ Domain allowed to transition.
 </summary>
 </param>
 </interface>
-<interface name="xen_stream_connect_xm" lineno="358">
+<interface name="xen_stream_connect_xm" lineno="318">
 <summary>
 Connect to xm with a unix
 domain stream socket.

diff --git a/policy/booleans.conf b/policy/booleans.conf
index d2fac33af..7ef0cb2d3 100644
--- a/policy/booleans.conf
+++ b/policy/booleans.conf
@@ -759,6 +759,37 @@ phpfpm_use_ldap = false
 # 
 phpfpm_send_syslog_msg = false
 
+#
+# Allow phpfpm to execute shells. This
+# is needed by some webapps.
+# 
+phpfpm_exec_shell = false
+
+#
+# Allow phpfpm to connect to http ports.
+# 
+phpfpm_connect_http = false
+
+#
+# Allow phpfpm to connect to pop ports.
+# 
+phpfpm_connect_pop = false
+
+#
+# Allow phpfpm to connect to redis ports.
+# 
+phpfpm_connect_redis = false
+
+#
+# Allow phpfpm to connect to sieve ports.
+# 
+phpfpm_connect_sieve = false
+
+#
+# Allow phpfpm to connect to smtp ports.
+# 
+phpfpm_connect_smtp = false
+
 #
 # Allow rtorrent to use dht.
 # The correspondig port must be rtorrent_udp_port_t.
@@ -805,6 +836,12 @@ dbadm_manage_user_files = false
 # 
 dbadm_read_user_files = false
 
+#
+# Determine whether guest can
+# configure network manager.
+# 
+guest_connect_network = false
+
 #
 # Determine whether webadm can
 # manage generic user files.
@@ -1203,11 +1240,31 @@ container_manage_public_content = false
 # 
 container_read_public_content = false
 
+#
+# Allow super privileged containers to create NFS servers.
+# 
+container_spc_create_nfs_servers = false
+
+#
+# Allow super privileged containers to use tun-tap devices.
+# 
+container_spc_use_tun_tap_dev = false
+
+#
+# Allow containers to use direct rendering devices.
+# 
+container_use_dri = false
+
 #
 # Allow containers to use eCryptfs filesystems.
 # 
 container_use_ecryptfs = false
 
+#
+# Allow containers to use huge pages.
+# 
+container_use_hugetlbfs = false
+
 #
 # Allow containers to use NFS filesystems.
 # 
@@ -1479,6 +1536,14 @@ git_client_manage_all_user_home_content = false
 # 
 allow_httpd_git_script_anon_write = false
 
+#
+# Allow the gluster daemon to automatically
+# add and remove file contexts from the local
+# SELinux policy when adding and removing
+# bricks.
+# 
+glusterfs_modify_policy = false
+
 #
 # Grant the i18n_input domains read access to generic user content
 # 
@@ -2046,6 +2111,11 @@ authlogin_nsswitch_use_ldap = false
 # 
 init_upstart = false
 
+#
+# Enable systemd to create mountpoints.
+# 
+init_create_mountpoints = false
+
 #
 # Allow all daemons the ability to read/write terminals
 # 

diff --git a/policy/modules.conf b/policy/modules.conf
index 2487c0f70..055d20fa1 100644
--- a/policy/modules.conf
+++ b/policy/modules.conf
@@ -263,6 +263,15 @@ dpkg = module
 # 
 fakehwclock = module
 
+# Layer: admin
+# Module: fapolicyd
+#
+# The fapolicyd software framework controls the execution of applications based
+# on a user-defined policy. This is one of the most efficient ways to prevent
+# running untrusted and possibly malicious applications on the system.
+# 
+fapolicyd = module
+
 # Layer: admin
 # Module: firstboot
 #
@@ -1349,6 +1358,13 @@ courier = module
 # 
 cpucontrol = module
 
+# Layer: services
+# Module: crio
+#
+# policy for cri-o
+# 
+crio = module
+
 # Layer: services
 # Module: cron
 #
@@ -1762,6 +1778,13 @@ knot = module
 # 
 ksmtuned = module
 
+# Layer: services
+# Module: kubernetes
+#
+# policy for kubernetes
+# 
+kubernetes = module
+
 # Layer: services
 # Module: l2tp
 #
@@ -2077,6 +2100,13 @@ openct = module
 # 
 openhpi = module
 
+# Layer: services
+# Module: opensm
+#
+# OpenSM is a software implementation of an InfiniBand subnet manager.
+# 
+opensm = module
+
 # Layer: services
 # Module: openvpn
 #
@@ -2581,6 +2611,13 @@ stunnel = module
 # 
 svnserve = module
 
+# Layer: services
+# Module: sympa
+#
+# Sympa mailing list manager
+# 
+sympa = module
+
 # Layer: services
 # Module: sysstat
 #
@@ -2805,6 +2842,13 @@ zarafa = module
 # 
 zebra = module
 
+# Layer: services
+# Module: zfs
+#
+# Tools for the Zettabyte File System.
+# 
+zfs = module
+
 # Layer: services
 # Module: zosremote
 #

diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
index 5d3edc207..7355bafab 100644
--- a/policy/modules/kernel/corenetwork.if
+++ b/policy/modules/kernel/corenetwork.if
@@ -3670,112 +3670,6 @@ interface(`corenet_relabelto_icmp_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the adb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_adb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the adb port.
@@ -4091,112 +3985,6 @@ interface(`corenet_relabelto_adb_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs_bos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs_bos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs_bos port.
@@ -4512,112 +4300,6 @@ interface(`corenet_relabelto_afs_bos_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs_fs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs_fs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs_fs port.
@@ -4933,112 +4615,6 @@ interface(`corenet_relabelto_afs_fs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs_ka port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs_ka_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs_ka port.
@@ -5354,112 +4930,6 @@ interface(`corenet_relabelto_afs_ka_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs_pt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs_pt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs_pt port.
@@ -5775,112 +5245,6 @@ interface(`corenet_relabelto_afs_pt_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs_vl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs_vl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs_vl port.
@@ -6196,112 +5560,6 @@ interface(`corenet_relabelto_afs_vl_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the afs3_callback port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_afs3_callback_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the afs3_callback port.
@@ -6617,112 +5875,6 @@ interface(`corenet_relabelto_afs3_callback_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the agentx port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_agentx_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the agentx port.
@@ -7038,112 +6190,6 @@ interface(`corenet_relabelto_agentx_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the amanda port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_amanda_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the amanda port.
@@ -7459,112 +6505,6 @@ interface(`corenet_relabelto_amanda_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the amavisd_recv port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_amavisd_recv_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the amavisd_recv port.
@@ -7880,112 +6820,6 @@ interface(`corenet_relabelto_amavisd_recv_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the amavisd_send port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_amavisd_send_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the amavisd_send port.
@@ -8301,112 +7135,6 @@ interface(`corenet_relabelto_amavisd_send_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the amqp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_amqp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the amqp port.
@@ -8722,112 +7450,6 @@ interface(`corenet_relabelto_amqp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the aol port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_aol_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the aol port.
@@ -9143,112 +7765,6 @@ interface(`corenet_relabelto_aol_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the apcupsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_apcupsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the apcupsd port.
@@ -9564,112 +8080,6 @@ interface(`corenet_relabelto_apcupsd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the apertus_ldp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_apertus_ldp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the apertus_ldp port.
@@ -9985,112 +8395,6 @@ interface(`corenet_relabelto_apertus_ldp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the aptcacher port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_aptcacher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the aptcacher port.
@@ -10406,112 +8710,6 @@ interface(`corenet_relabelto_aptcacher_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the armtechdaemon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_armtechdaemon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the armtechdaemon port.
@@ -10827,112 +9025,6 @@ interface(`corenet_relabelto_armtechdaemon_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the asterisk port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_asterisk_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the asterisk port.
@@ -11248,112 +9340,6 @@ interface(`corenet_relabelto_asterisk_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the audit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_audit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the audit port.
@@ -11669,112 +9655,6 @@ interface(`corenet_relabelto_audit_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the auth port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_auth_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the auth port.
@@ -12090,112 +9970,6 @@ interface(`corenet_relabelto_auth_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the bgp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_bgp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the bgp port.
@@ -12511,112 +10285,6 @@ interface(`corenet_relabelto_bgp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the bitcoin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_bitcoin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the bitcoin port.
@@ -12932,112 +10600,6 @@ interface(`corenet_relabelto_bitcoin_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the boinc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_boinc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the boinc port.
@@ -13353,112 +10915,6 @@ interface(`corenet_relabelto_boinc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the boinc_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_boinc_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the boinc_client port.
@@ -13774,112 +11230,6 @@ interface(`corenet_relabelto_boinc_client_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the biff port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_biff_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the biff port.
@@ -14195,112 +11545,6 @@ interface(`corenet_relabelto_biff_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the certmaster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_certmaster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the certmaster port.
@@ -14616,112 +11860,6 @@ interface(`corenet_relabelto_certmaster_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the chronyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_chronyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the chronyd port.
@@ -15037,112 +12175,6 @@ interface(`corenet_relabelto_chronyd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the clamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_clamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the clamd port.
@@ -15458,112 +12490,6 @@ interface(`corenet_relabelto_clamd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the clockspeed port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_clockspeed_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the clockspeed port.
@@ -15879,112 +12805,6 @@ interface(`corenet_relabelto_clockspeed_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cluster port.
@@ -16300,112 +13120,6 @@ interface(`corenet_relabelto_cluster_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cma port.
@@ -16721,112 +13435,6 @@ interface(`corenet_relabelto_cma_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cobbler port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cobbler_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cobbler port.
@@ -17142,112 +13750,6 @@ interface(`corenet_relabelto_cobbler_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the commplex_link port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_commplex_link_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the commplex_link port.
@@ -17563,112 +14065,6 @@ interface(`corenet_relabelto_commplex_link_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the commplex_main port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_commplex_main_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the commplex_main port.
@@ -17984,112 +14380,6 @@ interface(`corenet_relabelto_commplex_main_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the comsat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_comsat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the comsat port.
@@ -18405,112 +14695,6 @@ interface(`corenet_relabelto_comsat_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the condor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_condor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the condor port.
@@ -18826,112 +15010,6 @@ interface(`corenet_relabelto_condor_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the couchdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_couchdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the couchdb port.
@@ -19247,112 +15325,6 @@ interface(`corenet_relabelto_couchdb_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cslistener port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cslistener_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cslistener port.
@@ -19668,112 +15640,6 @@ interface(`corenet_relabelto_cslistener_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ctdb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ctdb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ctdb port.
@@ -20089,112 +15955,6 @@ interface(`corenet_relabelto_ctdb_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cvs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cvs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cvs port.
@@ -20510,112 +16270,6 @@ interface(`corenet_relabelto_cvs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the cyphesis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_cyphesis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the cyphesis port.
@@ -20931,112 +16585,6 @@ interface(`corenet_relabelto_cyphesis_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the daap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_daap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the daap port.
@@ -21352,112 +16900,6 @@ interface(`corenet_relabelto_daap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dbskkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dbskkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dbskkd port.
@@ -21773,112 +17215,6 @@ interface(`corenet_relabelto_dbskkd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dcc port.
@@ -22194,112 +17530,6 @@ interface(`corenet_relabelto_dcc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dccm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dccm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dccm port.
@@ -22615,112 +17845,6 @@ interface(`corenet_relabelto_dccm_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dhcpc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dhcpc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dhcpc port.
@@ -23036,112 +18160,6 @@ interface(`corenet_relabelto_dhcpc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dhcpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dhcpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dhcpd port.
@@ -23457,112 +18475,6 @@ interface(`corenet_relabelto_dhcpd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dict port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dict_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dict port.
@@ -23878,112 +18790,6 @@ interface(`corenet_relabelto_dict_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the distccd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_distccd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the distccd port.
@@ -24299,112 +19105,6 @@ interface(`corenet_relabelto_distccd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dns port.
@@ -24720,112 +19420,6 @@ interface(`corenet_relabelto_dns_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the dropbox port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_dropbox_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the dropbox port.
@@ -25141,112 +19735,6 @@ interface(`corenet_relabelto_dropbox_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the efs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_efs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the efs port.
@@ -25562,112 +20050,6 @@ interface(`corenet_relabelto_efs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the embrace_dp_c port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_embrace_dp_c_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the embrace_dp_c port.
@@ -25983,112 +20365,6 @@ interface(`corenet_relabelto_embrace_dp_c_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the epmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_epmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the epmap port.
@@ -26404,112 +20680,6 @@ interface(`corenet_relabelto_epmap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the epmd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_epmd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the epmd port.
@@ -26825,112 +20995,6 @@ interface(`corenet_relabelto_epmd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the fingerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_fingerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the fingerd port.
@@ -27246,112 +21310,6 @@ interface(`corenet_relabelto_fingerd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ftp port.
@@ -27667,112 +21625,6 @@ interface(`corenet_relabelto_ftp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ftp_data port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ftp_data_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ftp_data port.
@@ -28088,112 +21940,6 @@ interface(`corenet_relabelto_ftp_data_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the gatekeeper port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_gatekeeper_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the gatekeeper port.
@@ -28509,112 +22255,6 @@ interface(`corenet_relabelto_gatekeeper_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the gdomap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_gdomap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the gdomap port.
@@ -28930,112 +22570,6 @@ interface(`corenet_relabelto_gdomap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the gds_db port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_gds_db_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the gds_db port.
@@ -29351,112 +22885,6 @@ interface(`corenet_relabelto_gds_db_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the git port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_git_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the git port.
@@ -29772,112 +23200,6 @@ interface(`corenet_relabelto_git_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the glance_registry port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_glance_registry_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the glance_registry port.
@@ -30195,22 +23517,66 @@ interface(`corenet_relabelto_glance_registry_server_packets',`
 
 ########################################
 ## <summary>
-##	Send and receive TCP traffic on the gopher port.
+##	Bind TCP sockets to the glusterd port.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
 ##	Domain allowed access.
 ##	</summary>
 ## </param>
-## <infoflow type="both" weight="10"/>
+## <infoflow type="none"/>
 #
-interface(`corenet_tcp_sendrecv_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_tcp_bind_glusterd_port',`
+	gen_require(`
+		type glusterd_port_t;
+	')
+
+	allow $1 glusterd_port_t:tcp_socket name_bind;
+	
 ')
 
 ########################################
 ## <summary>
-##	Send UDP traffic on the gopher port.
+##	Bind UDP sockets to the glusterd port.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_glusterd_port',`
+	gen_require(`
+		type glusterd_port_t;
+	')
+
+	allow $1 glusterd_port_t:udp_socket name_bind;
+	
+')
+
+########################################
+## <summary>
+##	Make a TCP connection to the glusterd port.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`corenet_tcp_connect_glusterd_port',`
+	gen_require(`
+		type glusterd_port_t;
+	')
+
+	allow $1 glusterd_port_t:tcp_socket name_connect;
+')
+
+
+########################################
+## <summary>
+##	Send glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -30219,13 +23585,17 @@ interface(`corenet_tcp_sendrecv_gopher_port',`
 ## </param>
 ## <infoflow type="write" weight="10"/>
 #
-interface(`corenet_udp_send_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_send_glusterd_client_packets',`
+	gen_require(`
+		type glusterd_client_packet_t;
+	')
+
+	allow $1 glusterd_client_packet_t:packet send;
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to send UDP traffic on the gopher port.
+##	Do not audit attempts to send glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -30234,13 +23604,17 @@ interface(`corenet_udp_send_gopher_port',`
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_send_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_send_glusterd_client_packets',`
+	gen_require(`
+		type glusterd_client_packet_t;
+	')
+
+	dontaudit $1 glusterd_client_packet_t:packet send;
 ')
 
 ########################################
 ## <summary>
-##	Receive UDP traffic on the gopher port.
+##	Receive glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -30249,28 +23623,36 @@ interface(`corenet_dontaudit_udp_send_gopher_port',`
 ## </param>
 ## <infoflow type="read" weight="10"/>
 #
-interface(`corenet_udp_receive_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_receive_glusterd_client_packets',`
+	gen_require(`
+		type glusterd_client_packet_t;
+	')
+
+	allow $1 glusterd_client_packet_t:packet recv;
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to receive UDP traffic on the gopher port.
+##	Do not audit attempts to receive glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit.
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_receive_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_receive_glusterd_client_packets',`
+	gen_require(`
+		type glusterd_client_packet_t;
+	')
+
+	dontaudit $1 glusterd_client_packet_t:packet recv;
 ')
 
 ########################################
 ## <summary>
-##	Send and receive UDP traffic on the gopher port.
+##	Send and receive glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -30279,14 +23661,14 @@ interface(`corenet_dontaudit_udp_receive_gopher_port',`
 ## </param>
 ## <infoflow type="both" weight="10"/>
 #
-interface(`corenet_udp_sendrecv_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_sendrecv_glusterd_client_packets',`
+	corenet_send_glusterd_client_packets($1)
+	corenet_receive_glusterd_client_packets($1)
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the gopher port.
+##	Do not audit attempts to send and receive glusterd_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -30295,10 +23677,159 @@ interface(`corenet_udp_sendrecv_gopher_port',`
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_sendrecv_gopher_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_sendrecv_glusterd_client_packets',`
+	corenet_dontaudit_send_glusterd_client_packets($1)
+	corenet_dontaudit_receive_glusterd_client_packets($1)
 ')
 
+########################################
+## <summary>
+##	Relabel packets to glusterd_client the packet type.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`corenet_relabelto_glusterd_client_packets',`
+	gen_require(`
+		type glusterd_client_packet_t;
+	')
+
+	allow $1 glusterd_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+##	Send glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_glusterd_server_packets',`
+	gen_require(`
+		type glusterd_server_packet_t;
+	')
+
+	allow $1 glusterd_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to send glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain to not audit.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_glusterd_server_packets',`
+	gen_require(`
+		type glusterd_server_packet_t;
+	')
+
+	dontaudit $1 glusterd_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##	Receive glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_glusterd_server_packets',`
+	gen_require(`
+		type glusterd_server_packet_t;
+	')
+
+	allow $1 glusterd_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to receive glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_glusterd_server_packets',`
+	gen_require(`
+		type glusterd_server_packet_t;
+	')
+
+	dontaudit $1 glusterd_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##	Send and receive glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_glusterd_server_packets',`
+	corenet_send_glusterd_server_packets($1)
+	corenet_receive_glusterd_server_packets($1)
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to send and receive glusterd_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain to not audit.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_glusterd_server_packets',`
+	corenet_dontaudit_send_glusterd_server_packets($1)
+	corenet_dontaudit_receive_glusterd_server_packets($1)
+')
+
+########################################
+## <summary>
+##	Relabel packets to glusterd_server the packet type.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`corenet_relabelto_glusterd_server_packets',`
+	gen_require(`
+		type glusterd_server_packet_t;
+	')
+
+	allow $1 glusterd_server_packet_t:packet relabelto;
+')
+
+
+
+
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the gopher port.
@@ -30614,112 +24145,6 @@ interface(`corenet_relabelto_gopher_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the gpsd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_gpsd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the gpsd port.
@@ -31035,112 +24460,6 @@ interface(`corenet_relabelto_gpsd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the hadoop_datanode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_hadoop_datanode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the hadoop_datanode port.
@@ -31456,112 +24775,6 @@ interface(`corenet_relabelto_hadoop_datanode_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the hadoop_namenode port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_hadoop_namenode_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the hadoop_namenode port.
@@ -31877,112 +25090,6 @@ interface(`corenet_relabelto_hadoop_namenode_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the hddtemp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_hddtemp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the hddtemp port.
@@ -32298,112 +25405,6 @@ interface(`corenet_relabelto_hddtemp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the howl port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_howl_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the howl port.
@@ -32719,112 +25720,6 @@ interface(`corenet_relabelto_howl_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the hplip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_hplip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the hplip port.
@@ -33140,112 +26035,6 @@ interface(`corenet_relabelto_hplip_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the http port.
@@ -33561,112 +26350,6 @@ interface(`corenet_relabelto_http_server_packets',`
  #8443 is mod_nss default port
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the http_cache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_http_cache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the http_cache port.
@@ -33982,112 +26665,6 @@ interface(`corenet_relabelto_http_cache_server_packets',`
  # 8118 is for privoxy
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the i18n_input port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_i18n_input_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the i18n_input port.
@@ -34403,112 +26980,6 @@ interface(`corenet_relabelto_i18n_input_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the imaze port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_imaze_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the imaze port.
@@ -34824,112 +27295,6 @@ interface(`corenet_relabelto_imaze_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the inetd_child port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_inetd_child_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the inetd_child port.
@@ -35245,112 +27610,6 @@ interface(`corenet_relabelto_inetd_child_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the innd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_innd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the innd port.
@@ -35666,112 +27925,6 @@ interface(`corenet_relabelto_innd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the interwise port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_interwise_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the interwise port.
@@ -36087,112 +28240,6 @@ interface(`corenet_relabelto_interwise_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ionixnetmon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ionixnetmon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ionixnetmon port.
@@ -36508,112 +28555,6 @@ interface(`corenet_relabelto_ionixnetmon_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ipmi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ipmi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ipmi port.
@@ -36929,112 +28870,6 @@ interface(`corenet_relabelto_ipmi_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ipp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ipp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ipp port.
@@ -37350,112 +29185,6 @@ interface(`corenet_relabelto_ipp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ipsecnat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ipsecnat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ipsecnat port.
@@ -37771,112 +29500,6 @@ interface(`corenet_relabelto_ipsecnat_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ircd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ircd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ircd port.
@@ -38192,112 +29815,6 @@ interface(`corenet_relabelto_ircd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the isakmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_isakmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the isakmp port.
@@ -38613,112 +30130,6 @@ interface(`corenet_relabelto_isakmp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the iscsi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_iscsi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the iscsi port.
@@ -39034,112 +30445,6 @@ interface(`corenet_relabelto_iscsi_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the isns port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_isns_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the isns port.
@@ -39455,112 +30760,6 @@ interface(`corenet_relabelto_isns_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the jabber_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_jabber_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the jabber_client port.
@@ -39876,112 +31075,6 @@ interface(`corenet_relabelto_jabber_client_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the jabber_interserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_jabber_interserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the jabber_interserver port.
@@ -40297,112 +31390,6 @@ interface(`corenet_relabelto_jabber_interserver_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the jboss_iiop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_jboss_iiop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the jboss_iiop port.
@@ -40718,112 +31705,6 @@ interface(`corenet_relabelto_jboss_iiop_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kerberos port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kerberos_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kerberos port.
@@ -41139,112 +32020,6 @@ interface(`corenet_relabelto_kerberos_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kerberos_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kerberos_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kerberos_admin port.
@@ -41560,112 +32335,6 @@ interface(`corenet_relabelto_kerberos_admin_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kerberos_master port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kerberos_master_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kerberos_master port.
@@ -41981,112 +32650,6 @@ interface(`corenet_relabelto_kerberos_master_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kismet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kismet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kismet port.
@@ -42402,112 +32965,6 @@ interface(`corenet_relabelto_kismet_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kdeconnect port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kdeconnect_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kdeconnect port.
@@ -42823,112 +33280,6 @@ interface(`corenet_relabelto_kdeconnect_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the kprop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_kprop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the kprop port.
@@ -43244,112 +33595,6 @@ interface(`corenet_relabelto_kprop_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ktalkd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ktalkd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ktalkd port.
@@ -43667,22 +33912,66 @@ interface(`corenet_relabelto_ktalkd_server_packets',`
 
 ########################################
 ## <summary>
-##	Send and receive TCP traffic on the l2tp port.
+##	Bind TCP sockets to the kubernetes port.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_tcp_bind_kubernetes_port',`
+	gen_require(`
+		type kubernetes_port_t;
+	')
+
+	allow $1 kubernetes_port_t:tcp_socket name_bind;
+	allow $1 self:capability net_bind_service;
+')
+
+########################################
+## <summary>
+##	Bind UDP sockets to the kubernetes port.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_kubernetes_port',`
+	gen_require(`
+		type kubernetes_port_t;
+	')
+
+	allow $1 kubernetes_port_t:udp_socket name_bind;
+	allow $1 self:capability net_bind_service;
+')
+
+########################################
+## <summary>
+##	Make a TCP connection to the kubernetes port.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
 ##	Domain allowed access.
 ##	</summary>
 ## </param>
-## <infoflow type="both" weight="10"/>
 #
-interface(`corenet_tcp_sendrecv_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_tcp_connect_kubernetes_port',`
+	gen_require(`
+		type kubernetes_port_t;
+	')
+
+	allow $1 kubernetes_port_t:tcp_socket name_connect;
 ')
 
+
 ########################################
 ## <summary>
-##	Send UDP traffic on the l2tp port.
+##	Send kubernetes_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43691,13 +33980,17 @@ interface(`corenet_tcp_sendrecv_l2tp_port',`
 ## </param>
 ## <infoflow type="write" weight="10"/>
 #
-interface(`corenet_udp_send_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_send_kubernetes_client_packets',`
+	gen_require(`
+		type kubernetes_client_packet_t;
+	')
+
+	allow $1 kubernetes_client_packet_t:packet send;
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to send UDP traffic on the l2tp port.
+##	Do not audit attempts to send kubernetes_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43706,13 +33999,17 @@ interface(`corenet_udp_send_l2tp_port',`
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_send_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_send_kubernetes_client_packets',`
+	gen_require(`
+		type kubernetes_client_packet_t;
+	')
+
+	dontaudit $1 kubernetes_client_packet_t:packet send;
 ')
 
 ########################################
 ## <summary>
-##	Receive UDP traffic on the l2tp port.
+##	Receive kubernetes_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43721,13 +34018,52 @@ interface(`corenet_dontaudit_udp_send_l2tp_port',`
 ## </param>
 ## <infoflow type="read" weight="10"/>
 #
-interface(`corenet_udp_receive_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_receive_kubernetes_client_packets',`
+	gen_require(`
+		type kubernetes_client_packet_t;
+	')
+
+	allow $1 kubernetes_client_packet_t:packet recv;
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to receive UDP traffic on the l2tp port.
+##	Do not audit attempts to receive kubernetes_client packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_kubernetes_client_packets',`
+	gen_require(`
+		type kubernetes_client_packet_t;
+	')
+
+	dontaudit $1 kubernetes_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##	Send and receive kubernetes_client packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_kubernetes_client_packets',`
+	corenet_send_kubernetes_client_packets($1)
+	corenet_receive_kubernetes_client_packets($1)
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to send and receive kubernetes_client packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43736,13 +34072,109 @@ interface(`corenet_udp_receive_l2tp_port',`
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_receive_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_sendrecv_kubernetes_client_packets',`
+	corenet_dontaudit_send_kubernetes_client_packets($1)
+	corenet_dontaudit_receive_kubernetes_client_packets($1)
 ')
 
 ########################################
 ## <summary>
-##	Send and receive UDP traffic on the l2tp port.
+##	Relabel packets to kubernetes_client the packet type.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`corenet_relabelto_kubernetes_client_packets',`
+	gen_require(`
+		type kubernetes_client_packet_t;
+	')
+
+	allow $1 kubernetes_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+##	Send kubernetes_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_kubernetes_server_packets',`
+	gen_require(`
+		type kubernetes_server_packet_t;
+	')
+
+	allow $1 kubernetes_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to send kubernetes_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain to not audit.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_kubernetes_server_packets',`
+	gen_require(`
+		type kubernetes_server_packet_t;
+	')
+
+	dontaudit $1 kubernetes_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##	Receive kubernetes_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_kubernetes_server_packets',`
+	gen_require(`
+		type kubernetes_server_packet_t;
+	')
+
+	allow $1 kubernetes_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##	Do not audit attempts to receive kubernetes_server packets.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_kubernetes_server_packets',`
+	gen_require(`
+		type kubernetes_server_packet_t;
+	')
+
+	dontaudit $1 kubernetes_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##	Send and receive kubernetes_server packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43751,14 +34183,14 @@ interface(`corenet_dontaudit_udp_receive_l2tp_port',`
 ## </param>
 ## <infoflow type="both" weight="10"/>
 #
-interface(`corenet_udp_sendrecv_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_sendrecv_kubernetes_server_packets',`
+	corenet_send_kubernetes_server_packets($1)
+	corenet_receive_kubernetes_server_packets($1)
 ')
 
 ########################################
 ## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the l2tp port.
+##	Do not audit attempts to send and receive kubernetes_server packets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
@@ -43767,10 +34199,32 @@ interface(`corenet_udp_sendrecv_l2tp_port',`
 ## </param>
 ## <infoflow type="none"/>
 #
-interface(`corenet_dontaudit_udp_sendrecv_l2tp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
+interface(`corenet_dontaudit_sendrecv_kubernetes_server_packets',`
+	corenet_dontaudit_send_kubernetes_server_packets($1)
+	corenet_dontaudit_receive_kubernetes_server_packets($1)
+')
+
+########################################
+## <summary>
+##	Relabel packets to kubernetes_server the packet type.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`corenet_relabelto_kubernetes_server_packets',`
+	gen_require(`
+		type kubernetes_server_packet_t;
+	')
+
+	allow $1 kubernetes_server_packet_t:packet relabelto;
 ')
 
+
+
+
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the l2tp port.
@@ -44086,112 +34540,6 @@ interface(`corenet_relabelto_l2tp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ldap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ldap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ldap port.
@@ -44507,112 +34855,6 @@ interface(`corenet_relabelto_ldap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the lirc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_lirc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the lirc port.
@@ -44928,112 +35170,6 @@ interface(`corenet_relabelto_lirc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the llmnr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_llmnr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the llmnr port.
@@ -45349,112 +35485,6 @@ interface(`corenet_relabelto_llmnr_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the lmtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_lmtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the lmtp port.
@@ -45770,112 +35800,6 @@ interface(`corenet_relabelto_lmtp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the lrrd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_lrrd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the lrrd port.
@@ -46191,112 +36115,6 @@ interface(`corenet_relabelto_lrrd_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mail port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mail_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mail port.
@@ -46612,112 +36430,6 @@ interface(`corenet_relabelto_mail_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the matahari port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_matahari_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the matahari port.
@@ -47033,112 +36745,6 @@ interface(`corenet_relabelto_matahari_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the memcache port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_memcache_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the memcache port.
@@ -47454,112 +37060,6 @@ interface(`corenet_relabelto_memcache_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the milter port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_milter_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the milter port.
@@ -47875,112 +37375,6 @@ interface(`corenet_relabelto_milter_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mmcc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mmcc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mmcc port.
@@ -48296,112 +37690,6 @@ interface(`corenet_relabelto_mmcc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mon port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mon_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mon port.
@@ -48717,112 +38005,6 @@ interface(`corenet_relabelto_mon_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the monit port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_monit_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the monit port.
@@ -49138,112 +38320,6 @@ interface(`corenet_relabelto_monit_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the monopd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_monopd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the monopd port.
@@ -49559,112 +38635,6 @@ interface(`corenet_relabelto_monopd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mountd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mountd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mountd port.
@@ -49980,112 +38950,6 @@ interface(`corenet_relabelto_mountd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the movaz_ssc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_movaz_ssc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the movaz_ssc port.
@@ -50401,112 +39265,6 @@ interface(`corenet_relabelto_movaz_ssc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mpd port.
@@ -50822,112 +39580,6 @@ interface(`corenet_relabelto_mpd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the msgsrvr port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_msgsrvr_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the msgsrvr port.
@@ -51243,112 +39895,6 @@ interface(`corenet_relabelto_msgsrvr_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the msnp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_msnp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the msnp port.
@@ -51664,112 +40210,6 @@ interface(`corenet_relabelto_msnp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mssql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mssql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mssql port.
@@ -52085,112 +40525,6 @@ interface(`corenet_relabelto_mssql_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ms_streaming port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ms_streaming_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ms_streaming port.
@@ -52506,112 +40840,6 @@ interface(`corenet_relabelto_ms_streaming_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the munin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_munin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the munin port.
@@ -52927,112 +41155,6 @@ interface(`corenet_relabelto_munin_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mxi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mxi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mxi port.
@@ -53348,112 +41470,6 @@ interface(`corenet_relabelto_mxi_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mysqld port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mysqld_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mysqld port.
@@ -53769,112 +41785,6 @@ interface(`corenet_relabelto_mysqld_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the mysqlmanagerd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the mysqlmanagerd port.
@@ -54190,112 +42100,6 @@ interface(`corenet_relabelto_mysqlmanagerd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the nessus port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_nessus_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the nessus port.
@@ -54611,112 +42415,6 @@ interface(`corenet_relabelto_nessus_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the netport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_netport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the netport port.
@@ -55032,112 +42730,6 @@ interface(`corenet_relabelto_netport_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the netsupport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_netsupport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the netsupport port.
@@ -55453,112 +43045,6 @@ interface(`corenet_relabelto_netsupport_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the nfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_nfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the nfs port.
@@ -55874,112 +43360,6 @@ interface(`corenet_relabelto_nfs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the nfsrdma port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_nfsrdma_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the nfsrdma port.
@@ -56295,112 +43675,6 @@ interface(`corenet_relabelto_nfsrdma_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the nmbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_nmbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the nmbd port.
@@ -56716,112 +43990,6 @@ interface(`corenet_relabelto_nmbd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ntop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ntop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ntop port.
@@ -57137,112 +44305,6 @@ interface(`corenet_relabelto_ntop_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ntp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ntp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ntp port.
@@ -57558,112 +44620,6 @@ interface(`corenet_relabelto_ntp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ntske port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ntske_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ntske port.
@@ -57979,112 +44935,6 @@ interface(`corenet_relabelto_ntske_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the oa_system port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_oa_system_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the oa_system port.
@@ -58400,112 +45250,6 @@ interface(`corenet_relabelto_oa_system_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the oracledb port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_oracledb_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the oracledb port.
@@ -58821,112 +45565,6 @@ interface(`corenet_relabelto_oracledb_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ocsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ocsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ocsp port.
@@ -59242,112 +45880,6 @@ interface(`corenet_relabelto_ocsp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the openhpid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_openhpid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the openhpid port.
@@ -59663,112 +46195,6 @@ interface(`corenet_relabelto_openhpid_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the openvpn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_openvpn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the openvpn port.
@@ -60084,112 +46510,6 @@ interface(`corenet_relabelto_openvpn_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pdps port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pdps_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pdps port.
@@ -60505,112 +46825,6 @@ interface(`corenet_relabelto_pdps_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pegasus_http port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pegasus_http_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pegasus_http port.
@@ -60926,112 +47140,6 @@ interface(`corenet_relabelto_pegasus_http_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pegasus_https port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pegasus_https_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pegasus_https port.
@@ -61347,112 +47455,6 @@ interface(`corenet_relabelto_pegasus_https_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pgpkeyserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pgpkeyserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pgpkeyserver port.
@@ -61768,112 +47770,6 @@ interface(`corenet_relabelto_pgpkeyserver_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pingd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pingd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pingd port.
@@ -62189,112 +48085,6 @@ interface(`corenet_relabelto_pingd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pktcable_cops port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pktcable_cops_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pktcable_cops port.
@@ -62610,112 +48400,6 @@ interface(`corenet_relabelto_pktcable_cops_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pop port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pop_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pop port.
@@ -63031,112 +48715,6 @@ interface(`corenet_relabelto_pop_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the portmap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_portmap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the portmap port.
@@ -63452,112 +49030,6 @@ interface(`corenet_relabelto_portmap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the postfix_policyd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_postfix_policyd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the postfix_policyd port.
@@ -63873,112 +49345,6 @@ interface(`corenet_relabelto_postfix_policyd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the postgresql port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_postgresql_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the postgresql port.
@@ -64294,112 +49660,6 @@ interface(`corenet_relabelto_postgresql_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the postgrey port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_postgrey_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the postgrey port.
@@ -64715,112 +49975,6 @@ interface(`corenet_relabelto_postgrey_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pptp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pptp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pptp port.
@@ -65136,112 +50290,6 @@ interface(`corenet_relabelto_pptp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the prelude port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_prelude_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the prelude port.
@@ -65557,112 +50605,6 @@ interface(`corenet_relabelto_prelude_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the presence port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_presence_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the presence port.
@@ -65978,112 +50920,6 @@ interface(`corenet_relabelto_presence_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the printer port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_printer_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the printer port.
@@ -66399,112 +51235,6 @@ interface(`corenet_relabelto_printer_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ptal port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ptal_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ptal port.
@@ -66820,112 +51550,6 @@ interface(`corenet_relabelto_ptal_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pulseaudio port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pulseaudio_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pulseaudio port.
@@ -67241,112 +51865,6 @@ interface(`corenet_relabelto_pulseaudio_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the puppet port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_puppet_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the puppet port.
@@ -67662,112 +52180,6 @@ interface(`corenet_relabelto_puppet_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the puppetclient port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_puppetclient_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the puppetclient port.
@@ -68083,112 +52495,6 @@ interface(`corenet_relabelto_puppetclient_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pxe port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pxe_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pxe port.
@@ -68504,112 +52810,6 @@ interface(`corenet_relabelto_pxe_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the pyzor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_pyzor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the pyzor port.
@@ -68925,112 +53125,6 @@ interface(`corenet_relabelto_pyzor_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the radacct port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_radacct_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the radacct port.
@@ -69346,112 +53440,6 @@ interface(`corenet_relabelto_radacct_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the radius port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_radius_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the radius port.
@@ -69767,112 +53755,6 @@ interface(`corenet_relabelto_radius_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the radsec port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_radsec_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the radsec port.
@@ -70188,112 +54070,6 @@ interface(`corenet_relabelto_radsec_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the razor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_razor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the razor port.
@@ -70609,112 +54385,6 @@ interface(`corenet_relabelto_razor_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the redis port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_redis_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the redis port.
@@ -71030,112 +54700,6 @@ interface(`corenet_relabelto_redis_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the repository port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_repository_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the repository port.
@@ -71451,112 +55015,6 @@ interface(`corenet_relabelto_repository_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ricci port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ricci_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ricci port.
@@ -71872,112 +55330,6 @@ interface(`corenet_relabelto_ricci_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ricci_modcluster port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ricci_modcluster_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ricci_modcluster port.
@@ -72293,112 +55645,6 @@ interface(`corenet_relabelto_ricci_modcluster_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rlogind port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rlogind_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rlogind port.
@@ -72714,112 +55960,6 @@ interface(`corenet_relabelto_rlogind_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rndc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rndc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rndc port.
@@ -73135,112 +56275,6 @@ interface(`corenet_relabelto_rndc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the router port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_router_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the router port.
@@ -73556,112 +56590,6 @@ interface(`corenet_relabelto_router_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rsh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rsh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rsh port.
@@ -73977,112 +56905,6 @@ interface(`corenet_relabelto_rsh_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rsync port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rsync_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rsync port.
@@ -74398,112 +57220,6 @@ interface(`corenet_relabelto_rsync_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rtorrent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rtorrent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rtorrent port.
@@ -74819,112 +57535,6 @@ interface(`corenet_relabelto_rtorrent_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rtsp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rtsp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rtsp port.
@@ -75240,112 +57850,6 @@ interface(`corenet_relabelto_rtsp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the rwho port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_rwho_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the rwho port.
@@ -75661,112 +58165,6 @@ interface(`corenet_relabelto_rwho_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the salt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_salt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the salt port.
@@ -76082,112 +58480,6 @@ interface(`corenet_relabelto_salt_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the sap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_sap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the sap port.
@@ -76503,112 +58795,6 @@ interface(`corenet_relabelto_sap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the servistaitsm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_servistaitsm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the servistaitsm port.
@@ -76924,112 +59110,6 @@ interface(`corenet_relabelto_servistaitsm_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the sieve port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_sieve_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the sieve port.
@@ -77345,112 +59425,6 @@ interface(`corenet_relabelto_sieve_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the sip port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_sip_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the sip port.
@@ -77766,112 +59740,6 @@ interface(`corenet_relabelto_sip_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the sixxsconfig port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_sixxsconfig_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the sixxsconfig port.
@@ -78187,112 +60055,6 @@ interface(`corenet_relabelto_sixxsconfig_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the smbd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_smbd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the smbd port.
@@ -78608,112 +60370,6 @@ interface(`corenet_relabelto_smbd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the smtp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_smtp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the smtp port.
@@ -79029,112 +60685,6 @@ interface(`corenet_relabelto_smtp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the snmp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_snmp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the snmp port.
@@ -79450,112 +61000,6 @@ interface(`corenet_relabelto_snmp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the socks port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_socks_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the socks port.
@@ -79871,112 +61315,6 @@ interface(`corenet_relabelto_socks_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the soundd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_soundd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the soundd port.
@@ -80292,112 +61630,6 @@ interface(`corenet_relabelto_soundd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the spamd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_spamd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the spamd port.
@@ -80713,112 +61945,6 @@ interface(`corenet_relabelto_spamd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the speech port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_speech_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the speech port.
@@ -81134,112 +62260,6 @@ interface(`corenet_relabelto_speech_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the squid port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_squid_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the squid port.
@@ -81555,112 +62575,6 @@ interface(`corenet_relabelto_squid_server_packets',`
  # snmp and htcp
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ssdp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ssdp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ssdp port.
@@ -81976,112 +62890,6 @@ interface(`corenet_relabelto_ssdp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ssh port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ssh_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ssh port.
@@ -82397,112 +63205,6 @@ interface(`corenet_relabelto_ssh_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the stunnel port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_stunnel_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the stunnel port.
@@ -82818,112 +63520,6 @@ interface(`corenet_relabelto_stunnel_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the svn port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_svn_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the svn port.
@@ -83239,112 +63835,6 @@ interface(`corenet_relabelto_svn_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the svrloc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_svrloc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the svrloc port.
@@ -83660,112 +64150,6 @@ interface(`corenet_relabelto_svrloc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the swat port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_swat_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the swat port.
@@ -84081,112 +64465,6 @@ interface(`corenet_relabelto_swat_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the syncthing port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_syncthing_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the syncthing port.
@@ -84502,112 +64780,6 @@ interface(`corenet_relabelto_syncthing_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the syncthing_admin port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_syncthing_admin_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the syncthing_admin port.
@@ -84923,112 +65095,6 @@ interface(`corenet_relabelto_syncthing_admin_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the syncthing_discovery port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_syncthing_discovery_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the syncthing_discovery port.
@@ -85344,112 +65410,6 @@ interface(`corenet_relabelto_syncthing_discovery_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the sype_transport port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_sype_transport_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the sype_transport port.
@@ -85765,112 +65725,6 @@ interface(`corenet_relabelto_sype_transport_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the syslogd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_syslogd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the syslogd port.
@@ -86186,112 +66040,6 @@ interface(`corenet_relabelto_syslogd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the syslog_tls port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_syslog_tls_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the syslog_tls port.
@@ -86607,112 +66355,6 @@ interface(`corenet_relabelto_syslog_tls_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the tcs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_tcs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the tcs port.
@@ -87028,112 +66670,6 @@ interface(`corenet_relabelto_tcs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the telnetd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_telnetd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the telnetd port.
@@ -87449,112 +66985,6 @@ interface(`corenet_relabelto_telnetd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the tftp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_tftp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the tftp port.
@@ -87870,112 +67300,6 @@ interface(`corenet_relabelto_tftp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the tor port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_tor_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the tor port.
@@ -88291,112 +67615,6 @@ interface(`corenet_relabelto_tor_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the traceroute port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_traceroute_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the traceroute port.
@@ -88712,112 +67930,6 @@ interface(`corenet_relabelto_traceroute_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the transproxy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_transproxy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the transproxy port.
@@ -89133,112 +68245,6 @@ interface(`corenet_relabelto_transproxy_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the trisoap port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_trisoap_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the trisoap port.
@@ -89554,112 +68560,6 @@ interface(`corenet_relabelto_trisoap_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the trivnet1 port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_trivnet1_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the trivnet1 port.
@@ -89975,112 +68875,6 @@ interface(`corenet_relabelto_trivnet1_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the ups port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_ups_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the ups port.
@@ -90396,112 +69190,6 @@ interface(`corenet_relabelto_ups_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the utcpserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_utcpserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the utcpserver port.
@@ -90817,112 +69505,6 @@ interface(`corenet_relabelto_utcpserver_server_packets',`
  # no defined portcon
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the uucpd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_uucpd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the uucpd port.
@@ -91238,112 +69820,6 @@ interface(`corenet_relabelto_uucpd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the varnishd port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_varnishd_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the varnishd port.
@@ -91659,112 +70135,6 @@ interface(`corenet_relabelto_varnishd_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the virt port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_virt_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the virt port.
@@ -92080,112 +70450,6 @@ interface(`corenet_relabelto_virt_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the virtual_places port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_virtual_places_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the virtual_places port.
@@ -92501,112 +70765,6 @@ interface(`corenet_relabelto_virtual_places_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the virt_migration port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_virt_migration_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the virt_migration port.
@@ -92922,112 +71080,6 @@ interface(`corenet_relabelto_virt_migration_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the vnc port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_vnc_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the vnc port.
@@ -93343,112 +71395,6 @@ interface(`corenet_relabelto_vnc_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the wccp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_wccp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the wccp port.
@@ -93764,112 +71710,6 @@ interface(`corenet_relabelto_wccp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the websm port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_websm_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the websm port.
@@ -94185,112 +72025,6 @@ interface(`corenet_relabelto_websm_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the whois port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_whois_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the whois port.
@@ -94606,112 +72340,6 @@ interface(`corenet_relabelto_whois_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the winshadow port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_winshadow_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the winshadow port.
@@ -95027,112 +72655,6 @@ interface(`corenet_relabelto_winshadow_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the wsdapi port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_wsdapi_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the wsdapi port.
@@ -95448,112 +72970,6 @@ interface(`corenet_relabelto_wsdapi_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the wsicopy port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_wsicopy_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the wsicopy port.
@@ -95869,112 +73285,6 @@ interface(`corenet_relabelto_wsicopy_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the xdmcp port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_xdmcp_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the xdmcp port.
@@ -96290,112 +73600,6 @@ interface(`corenet_relabelto_xdmcp_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the xen port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_xen_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the xen port.
@@ -96711,112 +73915,6 @@ interface(`corenet_relabelto_xen_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the xfs port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_xfs_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the xfs port.
@@ -97132,112 +74230,6 @@ interface(`corenet_relabelto_xfs_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the xserver port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_xserver_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the xserver port.
@@ -97553,112 +74545,6 @@ interface(`corenet_relabelto_xserver_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zarafa port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zarafa_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zarafa port.
@@ -97974,112 +74860,6 @@ interface(`corenet_relabelto_zarafa_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zabbix port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zabbix_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zabbix port.
@@ -98395,112 +75175,6 @@ interface(`corenet_relabelto_zabbix_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zabbix_agent port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zabbix_agent_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zabbix_agent port.
@@ -98816,112 +75490,6 @@ interface(`corenet_relabelto_zabbix_agent_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zookeeper_client port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zookeeper_client_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zookeeper_client port.
@@ -99237,112 +75805,6 @@ interface(`corenet_relabelto_zookeeper_client_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zookeeper_election port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zookeeper_election_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zookeeper_election port.
@@ -99658,112 +76120,6 @@ interface(`corenet_relabelto_zookeeper_election_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zookeeper_leader port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zookeeper_leader_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zookeeper_leader port.
@@ -100079,112 +76435,6 @@ interface(`corenet_relabelto_zookeeper_leader_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zebra port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zebra_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zebra port.
@@ -100500,112 +76750,6 @@ interface(`corenet_relabelto_zebra_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zented port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zented_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zented port.
@@ -100921,112 +77065,6 @@ interface(`corenet_relabelto_zented_server_packets',`
 
 
 
-########################################
-## <summary>
-##	Send and receive TCP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_tcp_sendrecv_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="write" weight="10"/>
-#
-interface(`corenet_udp_send_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_send_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Receive UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="read" weight="10"/>
-#
-interface(`corenet_udp_receive_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to receive UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_receive_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Send and receive UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain allowed access.
-##	</summary>
-## </param>
-## <infoflow type="both" weight="10"/>
-#
-interface(`corenet_udp_sendrecv_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
-########################################
-## <summary>
-##	Do not audit attempts to send and receive
-##	UDP traffic on the zope port.
-## </summary>
-## <param name="domain">
-##	<summary>
-##	Domain to not audit.
-##	</summary>
-## </param>
-## <infoflow type="none"/>
-#
-interface(`corenet_dontaudit_udp_sendrecv_zope_port',`
-	refpolicywarn(`$0() has been deprecated, please remove.')
-')
-
 ########################################
 ## <summary>
 ##	Bind TCP sockets to the zope port.

diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
index e2c7dc6c5..4796d0bf5 100644
--- a/policy/modules/kernel/corenetwork.te
+++ b/policy/modules/kernel/corenetwork.te
@@ -606,6 +606,14 @@ portcon tcp 9191 gen_context(system_u:object_r:glance_registry_port_t,s0)
 portcon udp 9191 gen_context(system_u:object_r:glance_registry_port_t,s0)
 
 
+type glusterd_port_t, port_type, defined_port_type;
+type glusterd_client_packet_t, packet_type, client_packet_type;
+type glusterd_server_packet_t, packet_type, server_packet_type;
+typeattribute glusterd_port_t unreserved_port_type;
+portcon tcp 24007 gen_context(system_u:object_r:glusterd_port_t,s0)
+portcon tcp 24009 gen_context(system_u:object_r:glusterd_port_t,s0)
+
+
 type gopher_port_t, port_type, defined_port_type;
 type gopher_client_packet_t, packet_type, client_packet_type;
 type gopher_server_packet_t, packet_type, server_packet_type;
@@ -910,6 +918,17 @@ portcon udp 517 gen_context(system_u:object_r:ktalkd_port_t,s0)
 portcon udp 518 gen_context(system_u:object_r:ktalkd_port_t,s0)
 
 
+type kubernetes_port_t, port_type, defined_port_type;
+type kubernetes_client_packet_t, packet_type, client_packet_type;
+type kubernetes_server_packet_t, packet_type, server_packet_type;
+typeattribute kubernetes_port_t unreserved_port_type;
+portcon tcp 2379-2381 gen_context(system_u:object_r:kubernetes_port_t,s0)
+portcon tcp 6443 gen_context(system_u:object_r:kubernetes_port_t,s0)
+portcon tcp 10248-10250 gen_context(system_u:object_r:kubernetes_port_t,s0)
+portcon tcp 10256-10257 gen_context(system_u:object_r:kubernetes_port_t,s0)
+portcon tcp 10259 gen_context(system_u:object_r:kubernetes_port_t,s0)
+
+
 type l2tp_port_t, port_type, defined_port_type;
 type l2tp_client_packet_t, packet_type, client_packet_type;
 type l2tp_server_packet_t, packet_type, server_packet_type;


^ permalink raw reply related	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-12-13 20:55 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-12-13 20:55 [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/ Kenton Groombridge
  -- strict thread matches above, loose matches on Subject: below --
2022-09-03 19:54 Jason Zaman
2021-02-01  2:10 Jason Zaman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox